91f463d4411d12ad73f7fa4d7755490612c146e4b30041b86415b34423159e27841545b0b5f4514d720165e7dfe93921b35c009e324f55d78181b69657beb2f782a75b0db36b2c7b5c69fe37cd9725eaed1b0e2c0971fd4debac2e6fff8f55a33452cf7028181088632c8d57f1c4701f1905129a77219db79ff7f620ea85c20c41eb86829cf02ab6ccd559cd7a730763d1f74a88b7fe2115e9b2a7041545f29b2a023abdc1a32d0a57c9d5ebfe6e360869ad616966e176bf6947c866ec194c3fc20d9416c553f16140d01878a2641996fdbfd4937b0ad8b55deec02ce553bae06743db2a0e45d37be900cad4d7753f1f642dd3983de290c2f061d4ba3061589c66169db8ecb578dc6e11a3f94829b7ab0d388d16f6fb51b32438a83a6d319c10c5b84b5f9af30f119e814ac0b1877c5764748228ce7bc9324fc7a8582303f5a644e6b03478587d8f14890c79c4ed4a4cfa40b7737370a202cf53dc0fec1fbf396e21998e678c04d427ee3e8a4b9845dff5a578df0b949ed36d3fcaa2638a79a3e58d3b3bbd4d8842d64201996987ea9ff359cead69dd08e32fdcc7065ff1138f62d07a38e6c3eb32923c51484f1e58a76524a013d1f8c7b247ee9623a38f9892c017760021e787275298bed70867c3ba40461b234f8d5680f2e57f6173d3451aa80bed25a9be5ef6466debc67c39ac390045c35b34452561048205433b830389d35e577c07bd424b3f6300469d0c48fb84f2267a26897ccb1471ba8ebcfc3103ea21c09e1ed1ceebb1c2d9149c84a6dd7b3bdaa149099408e3ea9e10f760c654c39247c6044aafb1b4177f37b613be9c903312b88917097352abe3f6a5c8e6dc405d15f890851d15f9caa054653525d2fbb4064c8fa94568e9da33629fe9c0c9f53a562ed45de211d4d226aa8c9cac2dffe62b6e8b132409c48dd959581b7f6d474e6681189659644d2d14959d85dc00ab71fc83aae310d6dfc0ab51d8a4c18cfa3495c92be2812bdfd54688e714aeb198d3b2ed22be9f271f49b8a95dca7404a6c6c8b8147a4422554cb2fad47b371711f393a523cad447a9ed72000b6fd4d73b3a0285fe614f7c2bda6e03b1718b6d3734c7bd5e7e7cab9207c9ec60ea4b0a081908ebcd18ebbd9b2cea5df2d6932fc2bfb43ba8f6872bda71efbf6857650e205665e8e61c857d09aebf768537802a81962b84a8950c9f1389d1b0990faf24b32eecfe6d01f47885f5a52b"}, @enc_lim={0x4, 0x1, 0x1}]}}}, @rthdrdstopts={{0x30, 0x29, 0x37, {0x4, 0x2, '\x00', [@hao={0xc9, 0x10, @mcast1}]}}}], 0x1090}}, {{&(0x7f0000000ec0)={0xa, 0x4e22, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1}, 0x1c, &(0x7f0000001340)=[{&(0x7f0000000f00)="2a49ad8242f013b01aa4c608a23993d1079d46a36779adfec2daf1bb9829b7293d00b45dbf4a2245ff6410aeb838c51e4af7e91e84b6327214a05ecab5ee6aa978a91261b7943ed30e703aaa00756a20e221314769675d747432961c5d73ff1d5212ebe70a9ae78b2c7a680efd6684fa36c11e631739fbdc4ed47ec614", 0x7d}, {&(0x7f0000000f80)="fe11924a044c85ae34e9a4e6a6cf4351dfd15323a58b51243d57792498dda21b8e5e3138f03c3ab0e45dfa07edcd98c5376cf815906554e4b2992d0c7e8aff0ef1fbf989c15389d8133242ebe14b0213d06ebce10a3417d9a81288eacd08ea4084622851605e14d56c92ddc2cde90427b6a1932cdec12665e85daad4a79ece88449246b07004b7853e676f584f444858b4e15d6c1fd3242668a3bbd07cf4e576c8ac652d7fa8d7c3f6525f0fd192f4587ea236da2fbafe28928f0d5617a113f980", 0xc1}, {&(0x7f0000001080)="e779f188a0e9fe40dc89c091530446be8fb77a6a429a835fb4c503437a3b3db1b5b1b6c4f68dc9ef80aaa113b2f097c7e8b50be40fd65e79e5dc26304c0f66e0f0116d91a57ab6fff1f36cb149e62541fb9c1f389b57a7430dc518fcfb3d9cc8284b521adc51d1bd47ed2a551562d9684f012fce550828ce4e96bb0ac543dccceccca05669b1fb7d89a9646d11a36d84f7f887519672b1be977353cbff305907ec134d1fc5762a73a7", 0xa9}, {&(0x7f0000001140)="9d7738bb80231ec810148865eda75af4e61ef8f83bff188b4dcf7a2f51b04c8efecac9c6dbf19be209e7fd7cf863ce19084df00c91d2011025d6a5af4902ea8aa1e709d92094764bceea3498512033f86704a37cc5ba0113c9d22dc83a01d5aede6a0622ce26f153ac4a878e71b506ebda018788afa268940e09a3259847960ae1c0dea52b63af789ee849621938d4de14674d56120afa0b48208416b2aafa7127362dea962284813203456ced5c9de45b5c48dcd53a702ea8d602a8b977e6fb1e2c85062f85c0c74d726d2f30470b7c670149e402", 0xd5}, {&(0x7f0000001240)}, {&(0x7f0000001280)="2534d391f2cce4a7f305e8a8ee2be7770f14f46b637f", 0x16}, {&(0x7f00000012c0)="d07ca6bc3a3a59578edbc4329d5353fe933d378a773e9ac2514a84c334cfaf28f8bad303260b1b7633856d9260de33895e8fe3cb257bdbf8ba51be3d89f7538a1965caaf154bd2dec8fa769e88c52ffa40a8abaa22adc172b834426eedc93969383569e2ddacac01825648ea99fa30813eec", 0x72}], 0x7, &(0x7f00000013c0)=[@dontfrag={{0x14}}, @dstopts={{0x30, 0x29, 0x37, {0x3a, 0x2, '\x00', [@calipso={0x7, 0x10, {0x0, 0x2, 0xff, 0x6, [0x7fffffff]}}, @enc_lim={0x4, 0x1, 0x9}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x800}}, @rthdr={{0x28, 0x29, 0x39, {0x2f, 0x2, 0x0, 0x5, 0x0, [@dev={0xfe, 0x80, '\x00', 0x2e}]}}}], 0x88}}], 0x6, 0xc028) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x66, 0x40, 0x0, @private0, @mcast2, 0x10, 0x8000, 0x7fffffff, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', r7, 0x2f, 0x0, 0x7, 0x7, 0x0, @mcast1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40, 0x80, 0xc0, 0x24}}) sendmmsg$inet(r0, &(0x7f0000001780)=[{{&(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10, 0x0}}, {{&(0x7f0000000380)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="00000000000000000000000700000010000000000000001100000007000000"], 0x20}}], 0x2, 0x0) r8 = syz_open_dev$evdev(&(0x7f0000000280), 0x1000, 0x20100) ioctl$BTRFS_IOC_SUBVOL_CREATE(r8, 0x5000940e, &(0x7f0000001800)={{r0}, "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"}) [ 45.818639][ T4555] loop5: detected capacity change from 0 to 1 02:21:46 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d11", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="020040000100030078179cb6040000000000000008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="1000000000000000200000000000"], 0x34, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) chdir(&(0x7f0000000040)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x800) ftruncate(r0, 0x2) lseek(r2, 0x0, 0x2) open(&(0x7f0000000180)='./file0\x00', 0x6800, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 45.885601][ T4581] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4581 comm=syz-executor.0 [ 45.924083][ T4597] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 45.941735][ T4599] loop1: detected capacity change from 0 to 16 [ 45.948370][ T4604] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4604 comm=syz-executor.0 [ 45.975228][ T4611] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 02:21:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9e27bacb) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000380)=0xff, 0xfffffffffffffd51) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0xffffffffffffff99) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000003c80)={0x0, &(0x7f0000003c40)}, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) socket$netlink(0x10, 0x3, 0xa) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x4, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x10001, 0x40}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000004c0)='cpu\xfa\xf5\xde\x8d\x98\x13\xdb2<\x1a\xd2\x1frc%\t&\"6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0Z\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xcc\xfd\x13L\xa7/&\x7f\x00\x00\x00\x00\x00\x00\x00\xa7\xb04G8\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12') ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) timer_create(0x3, &(0x7f00000002c0)={0x0, 0x1, 0x1, @tid=r3}, &(0x7f0000000300)=0x0) timer_settime(r4, 0x2, &(0x7f0000000200)={{0x0, 0x1c9c380}}, &(0x7f0000004f80)) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000b00)) timer_settime(r4, 0x3, &(0x7f0000000bc0)={{0x0, 0x989680}}, &(0x7f0000000340)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0xb729f85e0f95469, &(0x7f0000000280)=@fragment={0xc, 0x0, 0x53, 0x734, 0x0, 0x80, 0x66}, 0xffffffffffffffc5) sendto$inet(r0, 0x0, 0x0, 0x200007fc, &(0x7f0000000b40)={0x2, 0x4e26, @broadcast}, 0xffffff7c) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000040), 0x4) clone(0x21020017f6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x2, 0x2, 0x5) close(0xffffffffffffffff) r5 = syz_open_dev$loop(&(0x7f00000003c0), 0x5, 0x105082) r6 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r6, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000003fc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000003f80)={&(0x7f0000001780)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800) sendfile(r5, r6, 0x0, 0x80003) 02:21:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x2, 0x2, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0xf, &(0x7f0000000040), &(0x7f0000000080)=0x8) socket(0x1d, 0x5, 0xfffffaaf) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='iocharset=a']) 02:21:46 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) connect$unix(r0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e21}, 0x6e) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) socket$inet6(0xa, 0x3, 0x8) r1 = dup(r0) mount$9p_fd(0x0, &(0x7f0000000200)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000002080), 0x0, &(0x7f00000020c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}}) 02:21:46 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 02:21:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x147140, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f0000000040)) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x401, 0x7}) 02:21:46 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') sendmmsg(0xffffffffffffffff, &(0x7f0000004300)=[{{&(0x7f0000000240)=@l2tp6={0xa, 0x0, 0x200, @private1, 0x4, 0xffffffff}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000640)="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", 0x1000}], 0x1, &(0x7f0000001640)=[{0xd0, 0x111, 0x4, "12b7e01e2f1cc7c953c86d2f33b89d504d76473029c08f5ad208c624139fe75b146f18cb65f313c0cbfbe3d93d64fa1c489f1e57abcc121d5f0d5f929063f7088cdfbc0befe2e531c4acb8f09f13fa1f9109b603e8ebe81d8a63dee690a4a5896d25fc0504fc36712f25956cd980017fe51c93277e6017003bf983294f9abcc5ba9bf6b0cf19fa1dd7dad366eb722aa2d6c1a940dd056fd535dbde1923f973134cec1165e6cfedc8f3a4137cbcc655883f512dd09205d5e7f663912f"}, {0xc0, 0x118, 0x4000, "e308fba49bde9e4121b5362a8c670bd42af3a942dc29cee61bcacbea8c4dd21af97670949e9ff2d731bfa70034608314a051ffacfef0748f6602fea5d522e5d62fe5dc3fbf9929a170aeee088cce182150165b0ea78da4408d14a9371c65791188bd82503f08ee7607d6ed267dd58f7d561d1ccf4e720a5a6942fdd70aea8378a1359bc03cd63572df8f91a2e95f83343f429bf0707a9d6a6ceed0095e974d26d5027780670f13e66bbd6bd0ed9d"}, {0x18, 0x10f, 0x40, "c413f6"}, {0xc0, 0x2a4c12f84848f15f, 0x3f, "c1b14e06b609dd5022f495a1f23a6bb1605f1d2b4e2943eafe5e3fe3e9e69f02d513ef5b859707104d35841d6e6dce72c5b22b9bbcd970d1c386ad4f33086389c85920ec1770f3a1b1f638fef87ea0f7f6d9e4f43d38114d1ea01ec11155514c2d9d57e6d37658083eee817f7a3ee5ebbddd3a2ac54c99d94d5e0dd4bb6a144e70f4fbf3953851c0f6488e06eb54d4b135605b87f5687cd2b970f0c75e17bdc493ee08b910e0feadd7fcfd6ea92e3c"}, {0xd8, 0x29, 0xfffffffc, "6eb8a03637f8ee39a2c249e8088426285ce57d4f8e15910eac596b3c27f06472fb3940bef1e59b96af606430a0134be9a25edb7b7e2bb2d1b17f91b899f546cbcf9a24e25f1c054acfd6305662572b4621e9b64f816fbbb09434387ab59540c1088fc0844421b5494b0648d98d21d08e02e56d570b9c07d91026ccb4bc9d7c27b6859c538962994312439cf8d2f3fb12206915eea45a3998731b0aef4ac6079d6962a1cf404a37d3de53c97313ef67429991d45e4262b1136c45afc71a6c85fab5"}, {0x28, 0x117, 0x3, "bbb02a09d503fc351310bc063e50ad3614"}], 0x368}}, {{&(0x7f0000000300)=@in={0x2, 0x4e21, @broadcast}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000400)="63b3cdf02dfed88e5ed89407e2faf82447919c0e9c056d208cfc421eacd0da072c6e6da815c59dfaeddf78e42fbe376a02681b7fa6f0fec47f163827845d7807bf80a2c6e5fe7ff945cdcbc6dd4228d1cd39e167caf28602a0f72e552035ef13639b1e0d2f3dc85e0321d9c1b3cf038cc7065ec0ebc160ff4c537e93bbaff5d8dcb1790a5eeeb1108553a99d96006323480e6af4813d775a72aafdc3de214a081d2f50449a0128655d570997949287b1edc0e30bc89d650c889e2924e73f6cbb9d3e5b9d0c", 0xc5}, {&(0x7f00000019c0)="54ff2d7d0c5d124ea625837774601776a16ef1dcb6d767a209182444d72d55c5e6ec9fe8818c74b1b6253705989cd915272b681d29b5982c01f0e5a986818ccf4b60c820004e5a47e325c42342792b76e645ac0a60eb39e7a6c70bdaf387c34b5ab6c18fb8851e3914012ad8bc633692f6e074b136efb580f90953705357265e20060ca0a45617e8f787dfb983aa916d01feddacc58a1924ce3be310a32ad681105e20ea8fd662b0821c", 0xaa}], 0x2, &(0x7f0000001a80)=[{0x100, 0x3a, 0x200, "ad83ad4e01526faca5bebabbac1367d315f237fc438a47bfe5b7d93daa4c4cc6a7eae673acf0480cf23bb65cd46716d7b85433a3b6077235348760f9ebbdced3d777328c385815a1bcd6a4da7d7f2ec42dfedfe22e35eaf55a48070b2d2da0518c93da831167f186c73ba69953548f588fb478cd3ac699d72a8898bb758886d21f3b25a9f3d6718842355768efbd35956491b5e9d1b85fae9f293b33f0b69ce074fa2265a52b3fe22cf57325cc71349d7dcfc66a0642142e6ac87c40e38ff33c11363ee8786a74e2a31688986cb8a76d23eedd0749be92e908f60ddd4b1b7b9bc5780db85c39f04695"}, {0x60, 0x108, 0x4cd, "627d537cccbb6add8f1fefc45119e32219e279aa9a8001a2f794052d2a9e4cc5d286e4cd431833b3d3e875dbd8357b3ccf158bab941b657b1a86a70fb4d8f9af90403a475bec4ce7cbb1"}, {0x1010, 0x109, 0x8, "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"}, {0x98, 0x10a, 0x6, "a976cc2533d5a5775daacce78d8822d795c303aa571a64b140e4d5350b8e698ec88a2492580f8997518d9291a21c54f680d86d7e43eec29aa90b0e80705610e2a0b6784815a2cd834dd4e14f0abc1805ed2c1f676b5efb15a645a509408fe8fbd106fbcc9735b178dd121f1ca04d835e0ac2ed8b49277c9dfc9d27e58457b82c8b"}, {0x1010, 0x10a, 0x5, "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"}], 0x2218}}, {{&(0x7f0000000580)=@vsock={0x28, 0x0, 0x2710, @host}, 0x80, &(0x7f0000000500)=[{&(0x7f00000001c0)="b8d8640c22a8663422e1b5ba6d5bc18045f78fd4a41ff1b054d8ce1518b278077ec77430250cec74eb33708e84445a20a5b0117256ae91ea4e", 0x39}, {&(0x7f0000000380)="ae61dc2ad0bd4e1c5c29177687847b50bc15ad94e5d71b67026c2c98eca02a3eff1b", 0x22}, {&(0x7f0000003cc0)="63e1c5a244eeebc178f1af1c4fbea7ce259c2fe8a93a4e067d911c63b681d0bf85635cd0599bc7c399873716f1f50a69765ad53f09b1a369450ec4bedc80d3fe971caff42f7835ddbe4771ff74dd119dc690698db2175ac079f9cf7fbc2f2e84cf53a0e6d502922c2799c34961bc02e597152128569cc9f0ccc76aff883e1822cd9b04ea4acb96a0caf8e2eabed145bd9519dda3f2ccf9f48caf6d363118b4c9ca13cfa1dc7b59177bd2a5d75bcd842df0241b43b603cd26d1ca887a97b5136383ec", 0xc2}, {&(0x7f0000003dc0)="46b2d6e5d453cf5ec73e9de9854f4ec62e17e58e84947d7b41487941ff4bfba7f537019ecba95cdc925c03b42a88ebb90e025e7b0157b9c70df0feadb94013a42e3f4fe28e05544f777bddcf293b6fefcafb378511cb270835cc79df2258b28af7acec1d6835f65d24db37ee01270d8025abb08e2cd39048802a4f63ec68c61538cce64ee6ba1eba18ea0605459edc6ad1580d55214691b32c745c2ea0839016591575f121fe08ab956fb2e02f0b57f8ab2699d540a39efe59a37a8ccb963034694663809aa2ecb05ed272de3a440e966da0b7c1f276dc817fce98d04e71c86f1001dfd5", 0xe4}], 0x4, &(0x7f0000003ec0)=ANY=[@ANYBLOB="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"], 0x408}}], 0x3, 0x880) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r4, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) sendmmsg(r4, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000004840)='/proc/stat\x00', 0x0, 0x0) io_submit(0x0, 0x5, &(0x7f00000049c0)=[&(0x7f0000004580)={0x0, 0x0, 0x0, 0x0, 0x9, 0xffffffffffffffff, &(0x7f0000004480)="155a2804b79511b645a6d6aa2e8b87d2c3a05585bfbce732af49db4f28c8a0c14a52ebbbed81c2a84dff50efc58f457829189142e4d0056729b4b5543ea6356216e70ccebf62ce77ccd0f12bd1b281e2320a671020300a5fe459847cdfa097e53ca96b4feb4ee9e042741b27e071a13358a4e50fd43c9e5b01738643fb93e2847b89e71dcf24cf6e3a27a4fe0fb9885fd563fad58691357503995fd905b93138153641c42232b28086bfe41ce2f320763d1e5aa85f78ea2782f4f63ad191945edd714a8804a6a354904b43ab448cc6e610a32d94f4bc4599472f656ae6d1a5c8e5a8523fc4426ad0b76e0c3801c68474eace", 0xf2, 0x8aae}, &(0x7f00000046c0)={0x0, 0x0, 0x0, 0x5, 0x40, 0xffffffffffffffff, &(0x7f00000045c0)="f8f1d01f7f9e34c0e8287ea1e15ae73bee9ffdb53f535e678377fb7e0f4cde4d504b8095d29878c5fd0a510f98d65c5150b9bb29f7acf2a7995c74f2a1523998e9169c40f3a4177b47afb784db1084c86ba4c074df8f44b6d6872e6886186f47ab496798ab3f8ddcd2f707ab8bf2e5583fef65c411d13d4df1e447971bbb7173a20064867f9d7519565598c377bca36a95b601559835db40509dba8bd9ffc40d839f87c2522506583ff8d4ecec01621af0f06edf19dcabf6df3caa71b1f39fe591c6d5b356e104aed66daf51944f35dc216207e2cbbc76fed912c9b41f7c19c0f7e9caeaaffe4c0b955d92b6", 0xec, 0x4, 0x0, 0x3}, &(0x7f0000004780)={0x0, 0x0, 0x0, 0x1, 0x1ff, r4, &(0x7f0000004700)="4a9f481c8bcdbbf1a6b1acaa48263deaf9834a70a46f2f3086e9d33c3671308bba49d6b1aaf28e2e290dfbfefe5d6e481f9e4dcdde454abea11dbc2d081b903843a2547de752", 0x46, 0x7f}, &(0x7f0000004880)={0x0, 0x0, 0x0, 0x8, 0xff, 0xffffffffffffffff, &(0x7f00000047c0)="c13aaceaf7123b43079f61e959e533c3139ec1ce1c68d9f2ab9ba162207ba640ffcd0ea71653b929d232e0d31466a79d1050044c2e1cf09a3b0d12b49605c8a023c29927f7666280dcb0379d25a1d25390748b9b56f48df0c26973ce7646ec91b0ee302615937312da0833342fdc7597ad", 0x71, 0x63, 0x0, 0x0, r5}, &(0x7f0000004980)={0x0, 0x0, 0x0, 0x782807f99b62796a, 0x9b8, r0, &(0x7f00000048c0)="dddfb207f32d367e76eb41e0afdebf1f0350ceb3dd051aefbe5eb61316255b89a13e3a758d4ba2d773fb00b18ece094efb446bf9df9a54ce438337640bb32694a267512ff273ac996a475011fee1662fd191b5f435abdcd4a44c48c4f79b2c5e192bb59cca8abc8fea5d9443d8f04f8b9919c90560c54ab1c1e5b37f94b9cf497af0f582d82855751c5f74a8d525fc0d5e743fc2920cd1bd4d6bfef3c8601aa7ee2c9fba690eff55e4b3c365a11d71a109c92b1b8ed44daaa0", 0xb9, 0x7, 0x0, 0x1, r1}]) ftruncate(r3, 0x10099b8) sendmsg$GTP_CMD_GETPDP(r3, &(0x7f0000004a80)={&(0x7f0000004400)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000004a40)={&(0x7f0000004a00)={0x2c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @loopback}, @GTPA_FLOW={0x6, 0x6, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast2}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc884}, 0x8080080) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f00000043c0)='\x00', 0x0, r1) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x13, r3, 0x4d903000) io_submit(r2, 0x2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x16000}]) [ 46.357485][ T4632] PM: suspend entry (deep) [ 46.381158][ T4632] Filesystems sync: 0.019 seconds [ 46.389593][ T4641] loop2: detected capacity change from 0 to 16 [ 46.398888][ T4632] Freezing user space processes ... [ 46.399504][ T4643] loop4: detected capacity change from 0 to 136 [ 46.525043][ T4632] (elapsed 0.126 seconds) done. [ 46.530017][ T4632] OOM killer disabled. [ 46.534067][ T4632] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 46.543574][ T4632] printk: Suspending console(s) (use no_console_suspend to debug) 02:21:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0xfffffffe, 0x5, 0x0, 0x0, 0x2000000000003, 0x3f}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$unix(0x1, 0x5, 0x0) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x5, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x40a40, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) sched_setattr(r3, &(0x7f0000000040)={0x38, 0x6, 0x1c, 0x6, 0x0, 0x80000001, 0x6, 0x8, 0x4, 0x5}, 0x0) socket$packet(0x11, 0x3, 0x300) [ 46.586934][ T8] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 47.124253][ T4632] ACPI: Preparing to enter system sleep state S3 [ 47.124313][ T4632] PM: Saving platform NVS memory [ 47.124317][ T4632] Disabling non-boot CPUs ... [ 47.128837][ T4632] smpboot: CPU 1 is now offline [ 47.131187][ T4632] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 47.131316][ T4632] ACPI: Low-level resume complete [ 47.131390][ T4632] PM: Restoring platform NVS memory [ 47.131398][ T4632] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 47.141512][ T4632] Enabling non-boot CPUs ... [ 47.141688][ T4632] x86: Booting SMP configuration: [ 47.141744][ T4632] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 47.141994][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 47.142934][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 47.144357][ T4632] CPU1 is up [ 47.144654][ T4632] ACPI: Waking up from system sleep state S3 [ 47.258745][ T4632] OOM killer enabled. [ 47.259419][ T4632] Restarting tasks ... [ 47.277645][ T4632] done. [ 47.288222][ T4632] PM: suspend exit 02:21:47 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x147140, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f0000000040)) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x401, 0x7}) [ 47.302214][ T4641] attempt to access beyond end of device [ 47.302214][ T4641] loop2: rw=34817, want=184, limit=16 [ 47.309527][ T4669] PM: suspend entry (deep) [ 47.310608][ T8] attempt to access beyond end of device [ 47.310608][ T8] loop2: rw=1, want=256, limit=16 02:21:47 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x0, 0x4, 0x40, 0x4, 0x0, 0x0, 0x4c400, 0x12, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xbf1, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x40000, 0x20, 0x6, 0x4, 0x2, 0x6, 0x3, 0x0, 0xc7, 0x0, 0x3f}, 0x0, 0x5, r0, 0x2) r2 = socket$inet6(0xa, 0x1, 0x0) listen(r2, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000080), 0x4) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) [ 47.414382][ T4640] loop5: detected capacity change from 0 to 1032 [ 47.430649][ T4669] Filesystems sync: 0.120 seconds [ 47.432774][ T4669] Freezing user space processes ... (elapsed 0.149 seconds) done. [ 47.584052][ T4669] OOM killer disabled. [ 47.584907][ T4669] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 47.587860][ T4669] printk: Suspending console(s) (use no_console_suspend to debug) 02:21:48 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000b00)=[{{&(0x7f0000000040)={0x2, 0x4e20, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast2, 0x3}, 0x1c, 0x0}}], 0x2, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="8e814ec5a367b8f064a69c51b2d07aad9e586a41bb695a4ed46c9c9c9d6d229b114f09384871433dc0a5711b4f3317d22b83ada45fb2e6940a3145e1cea9ace26757a55ace27ed943b95546b4d493da21f7606225dd0d7b53d62fc7a88a0eb122da1d2965f947bef8f3f16f514d7c24e2d249f27f8ab23e22318a90465137429a2f26a252eda4c385ff405a3dc85ab6d0062b5bd8fa713c521fd1761fddc23676cbcd0c9006567e34f1064118adc073d268bd167aeaabd630bb357c60135c6d1ed2e3637ce794359721928c87b660b5a6ef036582800c9f973db3c3ac987427e69287989f44f572139ac1701978109ba0628eb", 0xf3, 0x4040844, &(0x7f0000000180)={0xa, 0x4e24, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0xfffffffb}, 0x1c) 02:21:48 executing program 3: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x1, 0x7fff) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190014c04800000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) 02:21:48 executing program 0: mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x105881, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x1, 0x5, 0x5, 0x9, 0x0, 0x8, 0x24200, 0x10, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x6, @perf_bp={&(0x7f0000000000), 0x8}, 0x200, 0x45, 0x400, 0x3, 0xb4c8, 0x0, 0x2, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0x4, r0, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 47.878048][ T8] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 48.420416][ T4669] ACPI: Preparing to enter system sleep state S3 [ 48.420478][ T4669] PM: Saving platform NVS memory [ 48.420481][ T4669] Disabling non-boot CPUs ... [ 48.424215][ T4669] smpboot: CPU 1 is now offline [ 48.426622][ T4669] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 48.426683][ T4669] ACPI: Low-level resume complete [ 48.426750][ T4669] PM: Restoring platform NVS memory [ 48.426837][ T4669] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 48.437678][ T4669] Enabling non-boot CPUs ... [ 48.437830][ T4669] x86: Booting SMP configuration: [ 48.437833][ T4669] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 48.438024][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 48.438908][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 48.440254][ T4669] CPU1 is up [ 48.440441][ T4669] ACPI: Waking up from system sleep state S3 [ 48.557043][ T4669] OOM killer enabled. [ 48.557775][ T4669] Restarting tasks ... done. [ 48.576097][ T4669] PM: suspend exit 02:21:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9e27bacb) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000380)=0xff, 0xfffffffffffffd51) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0xffffffffffffff99) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000003c80)={0x0, &(0x7f0000003c40)}, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) socket$netlink(0x10, 0x3, 0xa) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x4, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x10001, 0x40}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000004c0)='cpu\xfa\xf5\xde\x8d\x98\x13\xdb2<\x1a\xd2\x1frc%\t&\"6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0Z\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xcc\xfd\x13L\xa7/&\x7f\x00\x00\x00\x00\x00\x00\x00\xa7\xb04G8\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12') ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) timer_create(0x3, &(0x7f00000002c0)={0x0, 0x1, 0x1, @tid=r3}, &(0x7f0000000300)=0x0) timer_settime(r4, 0x2, &(0x7f0000000200)={{0x0, 0x1c9c380}}, &(0x7f0000004f80)) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000b00)) timer_settime(r4, 0x3, &(0x7f0000000bc0)={{0x0, 0x989680}}, &(0x7f0000000340)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0xb729f85e0f95469, &(0x7f0000000280)=@fragment={0xc, 0x0, 0x53, 0x734, 0x0, 0x80, 0x66}, 0xffffffffffffffc5) sendto$inet(r0, 0x0, 0x0, 0x200007fc, &(0x7f0000000b40)={0x2, 0x4e26, @broadcast}, 0xffffff7c) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000040), 0x4) clone(0x21020017f6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x2, 0x2, 0x5) close(0xffffffffffffffff) r5 = syz_open_dev$loop(&(0x7f00000003c0), 0x5, 0x105082) r6 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r6, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000003fc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000003f80)={&(0x7f0000001780)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800) sendfile(r5, r6, 0x0, 0x80003) 02:21:48 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 02:21:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000040)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='shortname=winnt']) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') sendfile(r0, r2, 0x0, 0x800000080004103) 02:21:48 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) preadv(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 02:21:48 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) ioctl$INCFS_IOC_CREATE_FILE(0xffffffffffffffff, 0xc058671e, &(0x7f0000000380)={{}, {0x2}, 0x2, 0x0, 0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)="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", 0xfd, 0x0, &(0x7f00000020c0)=ANY=[@ANYBLOB="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"], 0x10db}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000040)=0x3b21, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet(0x2, 0x806, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x1000, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xb01001f1}, 0x2) sendmsg$nl_xfrm(r0, &(0x7f0000001b40)={&(0x7f0000001a80)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001b00)={&(0x7f0000001ac0)=ANY=[@ANYBLOB="400000001e00020027bd7000fbdbdf25ff020000000000000000000b80000001000004d30a002b00ff0200000000000000000000000000010500000004350000"], 0x40}, 0x1, 0x0, 0x0, 0x44080}, 0x10000802) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f00000001c0)=0x4, 0x4) recvmmsg(r2, &(0x7f00000019c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002080)=""/1, 0x1}}, {{&(0x7f00000005c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/171, 0xab}, {&(0x7f0000000700)=""/216, 0xd8}, {&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/4, 0x4}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/39, 0x27}], 0x6, &(0x7f0000001980)=""/41, 0x29}, 0x1}], 0x3, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') [ 48.821518][ T4711] PM: suspend entry (deep) [ 48.828991][ T4711] Filesystems sync: 0.006 seconds [ 48.831253][ T4711] Freezing user space processes ... (elapsed 0.037 seconds) done. [ 48.870897][ T4711] OOM killer disabled. [ 48.871732][ T4711] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 48.875517][ T4711] printk: Suspending console(s) (use no_console_suspend to debug) 02:21:49 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) set_mempolicy(0x4000, 0x0, 0x4) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_netfilter(0x10, 0x3, 0xc) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) set_mempolicy(0x2, &(0x7f0000000000)=0x100, 0x575) [ 49.160740][ T1799] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 49.685729][ T4711] ACPI: Preparing to enter system sleep state S3 [ 49.685784][ T4711] PM: Saving platform NVS memory [ 49.685788][ T4711] Disabling non-boot CPUs ... [ 49.689370][ T4711] smpboot: CPU 1 is now offline [ 49.691830][ T4711] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 49.691900][ T4711] ACPI: Low-level resume complete [ 49.691969][ T4711] PM: Restoring platform NVS memory [ 49.691976][ T4711] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 49.702286][ T4711] Enabling non-boot CPUs ... [ 49.702492][ T4711] x86: Booting SMP configuration: [ 49.702497][ T4711] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 49.702673][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 49.703542][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 49.705008][ T4711] CPU1 is up [ 49.705237][ T4711] ACPI: Waking up from system sleep state S3 [ 49.815596][ T4711] OOM killer enabled. [ 49.816160][ T4711] Restarting tasks ... done. [ 49.838027][ T4711] PM: suspend exit [ 49.842203][ T25] audit: type=1400 audit(1622946109.984:10): avc: denied { create } for pid=4716 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 02:21:50 executing program 1: close(0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0xe) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, &(0x7f0000000040)) set_mempolicy(0x2, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x1) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190014c04800000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) shmget$private(0x0, 0x3000, 0x100, &(0x7f0000ffc000/0x3000)=nil) r1 = shmget$private(0x0, 0x4000, 0x200, &(0x7f0000ffc000/0x4000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x6000) 02:21:50 executing program 4: syz_read_part_table(0x0, 0xa, &(0x7f0000001740)=[{&(0x7f0000000000)="854bdecbf4c943d3488aa08916ba44ea6129b4ac740ad53855874633b341dbcca2a6f56ce4da2a9676e202c56d7706ef0a3fb5bb3905e0659ff60df3a9e958b3fc14053b29ca85136bce53bd8404581795fe8bec869c52e5d4a660cead955262230a99dfb16fcfaf14c2c3cc5e5ebb0e2a5fca2aa0f32d9bbeb413f7e18aa4dcfe4b6a620bcc483a86adc60ade44be7f5bce601f251c63faed7123870fcca1ff1ab8065d3fa4f9817a7de470fd8bd1038c5f1bb22a4a6daf7ba1552cc3e7f80f6682fa13882e3c0782c47dad0c4733585d9784c54097663c694ca5afae69f5642e1677a0c61f4e99da0c0d425572", 0xee, 0xffffffff}, {&(0x7f0000001540)="0300a0f1436d62009bbccc2d855bb7f7ee4a5e34618fb16f0cbffe4383a0fee2a2eda966b4c40d28b70e044ea5924517bf2e558089a4b5414a98fa20bbdc43ba42110144c1d8bc334ddeefc24917d9d1fd76a6504c8250b143db6ec8e5f87c834a787f9de02ace33bdb505956afec5930b7b10fda5225066c4b0784ab649d34caca2a42fb0457dd9920d7993f9336b45db4936741e49f87d2556c31aac8c163a02cfcd91f5365d1122cb75e1e11e70d865faa305049d260d68124bbdb7d7fa3d0356a54ce9e70dadae06a0994c1ef4098a0f75dcd8cde6", 0xd7, 0x81d9}, {&(0x7f0000000140)="60571f1276c00e4154d9fb7397aed9f65cf76587d9450e61d487a5c4c5879ff141afc59fe85ec6452b42bfe7a2adf13411b8bb1a3d90eeeca04a7ed649fceda2a5c702b7e7394686d2f60d92ae4015aa2689dbe7af2856a4325306b061a505d04e5ba764c86e9cdc9cdae01e880020f1310a7bcbdce2ad9f2ba1b460241c730e7870b31f4387770949a3320febe9a6d91d6a76ddfee5f3aef0556ac86433985179b5f576b0ad5605f1b5091b17ac51ed80a017a7332dd059d44a7b2b50e7be2b8e0a9a3437cb5094f8a3c3e11d14bc0c5eb6ff53b95280a9dfe637ebd8d55db6ecafd2b16915ba633955ed8a438e64", 0xef, 0x5}, {&(0x7f0000000240)="c6094d9a0bb930dd1a2d3f2ee44707d3635e2896a78bba3811a84556f835cc83575838183ccbc67febe6fd4f166ece1c8a9761d6378b535b82d72774a58ff6707be6be9e4f2c60c0c5e0ba5c96860e06d3c2352bea08ec04", 0x58, 0x6fc}, {&(0x7f00000002c0)="db5a3d4145f01be14ccd7e48cb8a53ec1b1555cc1ed9a8f4da8e500000004f027b93e7d4c77158d4ee450fb7f5a767c10bf9f572e429748aa476fb9fa62804553efed48e6eb5a37f00000027c2eea67bd9802016a3daf2c3a54801fca2502debcc0b7ab300750ae08210820994a53d875c6a", 0x72, 0x3f}, {&(0x7f0000000340)="bc2716bd5d935e4b02245dcaa7e863a761434bca84dbb3836adfdaab194e2a8673fffe52fd3e1195ce8c1117b9c67710738bd6b3a9879e39a0c8743c563a232d75d65bce99fcecd2f13245267f20399f2281d37e45a66a3a1b7001c77af8b65b1d94f3a12aebae676a301dd2b1bc1230d19fb8a01ace8baec6dcb2252fa0a3f4a22f23e1f26f3a326358d7ced5ef1ee777d9b254578edaeb2873c0da1b53bdcaeda4a02df9c264137a443b7a8a82b9a5698ca95f4c", 0xb5, 0xff}, {&(0x7f0000000400)="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", 0xff6, 0x20000}, {&(0x7f0000001400)="fb040000007c550cbaf76f4275cc5d5798ed814ddd864e23bcd966442d4cc6165cea2d4d2c1393dda22842a1abb7d27789b5ec361d2f0ea28f22249560e639c7", 0x40, 0x43dc}, {&(0x7f0000000100)="d84bdc7e52e5a37fd1122f6288be8a47c447a7e2c0b8d8cee558c553bfa88c3407ae56f41c26d1030800"/52, 0x34, 0x1000}, {&(0x7f0000001640)="bc0d91421126c282b8e0495036becbb16f555307a1d02cc565fe640f6672122623cf6f0e0bd947a72177f104ed832edb5a93a33f2c317f92870a41f66f01288f54978b69134bb0b4a00a25c122fd4e879889a21586eb3d9105ca1b27768d8a74cf5ff51c19cf3ce026c0fdb900e91bb2e3a3a8cea8cd7bc64d77cbae71ca705b1f29741bbab12dd1aff26624a50c4abedcf5dbe98039faf271030302ad4fef464940948d9b9f6f3298db8ce02b4967bfb56e898e7b497bcab08c454c62ae16b7e7ce9db7e3048e192234ced5bc6a9c308e2ccc4eed2ea65b8f9d0c7994614b2fc23250b3e71b8b", 0xe7, 0x9}]) [ 49.852868][ T4726] loop3: detected capacity change from 0 to 6 [ 49.858147][ T4726] FAT-fs (loop3): Directory bread(block 6) failed 02:21:50 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000000, 0x810, r1, 0xa7f52000) write$binfmt_script(r1, &(0x7f0000000340)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = syz_open_pts(r0, 0x2000) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000280)={0x3, 0x59, "0d823e74ce694cc72a5df29b7a1d9844164e63ca22e05f5945183fafbb0f72b35fb13eaf944e7d746059258513dd44201670aa0d3c1b51fb64229de895e35e4a44f120803895045c32707c00e9976095b1405cdb38b685a723"}) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x7fff, 0x8}, {0x2, 0xff}]}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f00000000c0)) setsockopt$packet_add_memb(r3, 0x107, 0x1, 0x0, 0x0) ioctl$KDSETLED(r3, 0x4b32, 0x5) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGWINSZ(r4, 0x5413, &(0x7f0000000000)) fsetxattr$security_ima(r0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 49.974445][ T4751] loop4: detected capacity change from 0 to 264192 02:21:50 executing program 1: close(0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0xe) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, &(0x7f0000000040)) set_mempolicy(0x2, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x1) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190014c04800000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) shmget$private(0x0, 0x3000, 0x100, &(0x7f0000ffc000/0x3000)=nil) r1 = shmget$private(0x0, 0x4000, 0x200, &(0x7f0000ffc000/0x4000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x6000) 02:21:50 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x8500, 0x0) sendmmsg$inet6(r0, &(0x7f0000004a00), 0x0, 0x20040082) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={@empty, 0x3b}) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendmmsg$inet6(r2, &(0x7f0000000480), 0x0, 0x20000000) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r3, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r4, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r4, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) fsetxattr$security_evm(r4, &(0x7f00000004c0), &(0x7f0000000500)=@v1={0x2, "e0d4117d8ea99c96"}, 0x9, 0x1) [ 50.013502][ T4752] loop5: detected capacity change from 0 to 1032 02:21:50 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0xc, 0x1e1441) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x52, 0x2}, @ramp={0x0, 0x0, {0x0, 0x0, 0x20}}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) 02:21:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="34000000000277a900000000000000000a0000cbf30b6680240004000380440001801800028014000180040001007f0000010800020000000000"], 0x34}}, 0x0) 02:21:50 executing program 2: set_mempolicy(0x3, &(0x7f0000000100)=0x3, 0x8000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x5, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0x1) close(r0) sendto$inet6(r0, 0x0, 0x0, 0x240500c2, &(0x7f0000000380)={0xa, 0x4e20, 0x3, @loopback, 0x40000000}, 0x1c) r1 = syz_open_dev$vcsa(&(0x7f00000000c0), 0xffffffff, 0x80001) sendto$inet6(r1, &(0x7f0000000140)="23ea0091a997195fffd8c1451c739c2ddea9594e65068f9e3ea5408c1a18901150c4bcc106e9f5ecf7a26953485cffae280e23144ba5096c8447363cc88e6f2369d3c30663584e1f7898247a711f385122a616186b44aeba7cc313975190b30d93f59bbc51061ecdb01516c62c", 0xffffff96, 0x200028c1, 0x0, 0x0) 02:21:50 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0xf, 0x8, 0x0, r0, 0x0}]) open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x10) 02:21:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) syz_read_part_table(0x0, 0x20000000, &(0x7f00000003c0)) 02:21:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x40000, 0x4) open(&(0x7f0000004c80)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000004f80)='./file0\x00', 0x0) 02:21:50 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x80002, 0x0) socket$inet6(0xa, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="240000001e0007041dfffd946f610500070000001f00000000", 0x19}], 0x1}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfcfa) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_START_AP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x74, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, {@wo_ht={{}, {}, @broadcast, @device_a, @from_mac}, 0x0, @default, 0x1, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_AUTH_TYPE={0x8}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x74}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r6, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="05910a036cd5000f00000008000300000000", @ANYRES32=r7, @ANYBLOB="28000e0080000000ffffffffffff0802110000000802110000000000000000000000000064000100080026006c09000008000c006400000008000d00000000000a0034000202020202020000080035000000000004000501"], 0x74}}, 0x0) sendmsg$NL80211_CMD_SET_PMK(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, r4, 0x400, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x28}}, 0x240088d4) sendmsg$NL80211_CMD_LEAVE_MESH(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x10011) 02:21:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@updpolicy={0x13c, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x84, 0x5, [{{@in=@remote, 0x0, 0x3c}}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @private}}]}]}, 0x13c}}, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r2, 0x4008f510, &(0x7f0000000080)=0x7) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0xef85) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r2, 0x0, 0xffffff38) 02:21:50 executing program 0: syz_read_part_table(0x4000000000000, 0xaaaabf7, &(0x7f0000000080)) [ 50.358048][ T4809] loop0: detected capacity change from 0 to 16 02:21:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x7f, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x6, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xe, 0x5ee}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="2000000040000000000000000500000001440c0600000037e1b4c64fce340d00057605b7be1da467a5778a4194fc384ba7341fb873b6176c820eb6ee9f5c2e11b1ba1498b8a5b03caed093ed1b36644bf506ea8ff3beccf5"], 0x20}, 0x0) getsockopt$inet6_buf(r2, 0x29, 0xd2, &(0x7f00000000c0)=""/8, &(0x7f0000000100)=0x8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) recvmmsg(r2, &(0x7f0000000a00)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000003c0)=""/233, 0xe9}, {}, {&(0x7f00000004c0)=""/217, 0xd9}, {&(0x7f00000005c0)=""/138, 0x8a}, {&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000000680)=""/118, 0x76}], 0x6, &(0x7f0000000780)=""/163, 0xa3}, 0xfffff297}, {{&(0x7f0000000840)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000008c0)=""/205, 0xcd}], 0x1, &(0x7f00000009c0)=""/31, 0x1f}, 0xfffffffa}], 0x2, 0x0, &(0x7f0000000a80)={0x77359400}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r3, r4, 0x0, 0x800000080004103) accept(0xffffffffffffffff, &(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000180)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000140)={@dev={0xfe, 0x80, '\x00', 0x26}, 0x97f, 0x2, 0x1, 0x8, 0x5, 0x800}, 0x20) r5 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r5, 0x0, 0x5cc, 0x0, &(0x7f00000001c0), 0x14) 02:21:50 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x4d}, {0x16}]}) vmsplice(r0, &(0x7f0000002300)=[{&(0x7f0000000100)="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", 0x1000}, {&(0x7f0000000000)="4891bd667d18a7dac0ac540b5e175e10a11d42f624a208409b9154e7cdac8c2f39d303d9da73e215c67baf54a741180a19a928de845f46285130571cf727707ac25b977fc23be6bf43f7e0fe9a8f71dfe697412d38c72abf6f883048801fa65a2134464aba96e2d19b2aedfc808b3d8b0b0004e10b5e27c9f0c983", 0x7b}, {&(0x7f0000001100)="62c135981eff235deb6ee162acc957980bd9915789", 0x15}, {&(0x7f0000001140)="889f310d36004b0d7ea9d34ab58b5cf541157387d89100059126054972ba03264e825ad29cf87ec4630111749c46f4219cc3654bbe039943ef4217c7d297817105745273a04b5ff17d983060b86326d5af872b47237a588c98fc2dbe92b8739fa8fd9430e57ec40a9ac05a366dd7fffaf65993aaa0756aa412680aa10fc29fcf2ff30750eeedca2cc11cfc17085749a358a44f2b4fa026fcaf5000b116e9b2b085a198aaa0a3556779ce99c9667e92d91bc0fc1c2e908a367dd13b508e7a72f7f2de0c8aff41f8c1", 0xc8}, {&(0x7f0000001240)="1a481e0a21754c2db11d6f09d0d48ebf921f451610162b2690130e436786e47674ec308b56fc0e8ad3eb1dd657ceb69aa0bcf8cda7b75d461661d5330d1c26f97668f745e7b19792c0cba5f849eea4095f4d1154cb35a59e3c27dcf3da19706118eefe2cb7946d1a11a7bda8abfaec977229e1c84f7bd228eeb683c87793b9d84ea8c71477cf04788488b00f61886640e879dcc5e10c6815e64deb4c66e6", 0x9e}, {&(0x7f0000001300)="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", 0x1000}], 0x6, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 50.417728][ T4836] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. 02:21:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c5340a706347e5ee1d91c0000", @ANYRES16=r3, @ANYBLOB="010000ff0280"], 0x1c}}, 0x0) sendfile(r2, r1, 0x0, 0x7ffff000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) [ 50.464529][ C0] hrtimer: interrupt took 27473 ns [ 50.472871][ T25] audit: type=1326 audit(1622946110.613:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4843 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 02:21:50 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x80541, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0, 0x0, 0xc61}], 0x0, &(0x7f0000000240)={[{@data_journal}]}) pwritev2(r0, &(0x7f0000000000)=[{&(0x7f0000000180)="ce6ce95e80dde6ba592ea88cd0c3a9937eb6b565780d194319a6cd4a090a5ae6ba34eb45ca5e9fd75a6c61bb58074cda9f87865438a1e395d7056c1c1dd9cb1dc2e6c5c5b33c602e75673382c21e1b98a541f7510bd22fe810a4d287410782620087289683c62ba1aca756a3c25d3407d576e34782f0d68d40f4ba51aa59bee050a2403515681387d2215bd6b22f061743e23f2151e9f482f619ab8f426dc6173fda1b1223", 0xa5}, {&(0x7f0000000080)="3c0bc10892c27711a6a2ba9ba554ef2772e94873b1319f4c62a369a30d6fdc4d51b8caec56b4cab4043b0b38b4a282e32a33562b5aeb1f71811b88f72f75ee7dec9efd93231de5a689ce5a7d183885c99bc6eb06df7d", 0x56}, {&(0x7f00000007c0)="ec7a4200cc3fae88fdc7dc28002aebd12bb16eb3b1afb5d0696205b09873730b0c84f2f22e40b58db57969260ab4de5320438c7592088fd501572b14ac117e0fb17408504432bb502aef4c965bfc475a2b77d7bcdac9da9285d8312fba7fe78381f69d8c6c98421f850b94250bcf8408d9ba5a91772042992e2c00257b585d6c6eb2f1233f045dbc8ea7da55df3838c83f5de8151a337f9bef19bec2969e7d8302d26920cde0faba79a483bc02a71064f026b68f8579652b57766590d6f0d1816427b7bc341d67b934c5ff185404616da54790a4abf9fcb0f3f8a6e7df1a63635e188c6b82d5a0aecfbe84a91c79614f9a35ff72f5b8e903bd25eab11fb0f7832e6d9e54edd53c942033c2775a0562e24a7292e1d8934830f5551efd58f84b9b4e5a8bcb4a58bda04a49025602bdff71340920ecc2bf960491b1529202a368a180cb57e8276d0fcada505d0ccb55ff9d2b823d0d2cbe9d4120e9f9052f01cbb44489f8b4a39423083b11a8f5d94dfe9e39e76faaa6afb2e9edd0149f80f18ab8f31f85b9304e7baffbea85087155f7e4f2c2ea9207d4dc6328abc4b321fcfa1f8e0510257548a8e6cf72dcdcdd2f43bf7b54dd3b4fb5f19f8d00e58a3e65a8978d86aa7dba26250d81fa38c3c5ddc54865aca9a892c25d5c74857058d6355404aedb5cf9b733cb1d0ccaaad5edf65d45a2806a766004cbba5a5f01f27033b93b6bad59b2844cf5f4c5c6b7ac283056993ec913f343144725dc93e4f316a767064cee8001bd26e401fbe2acd2c80cfc87a6870f2d4d2d82f0f776a4ed76743f1afa2c3896db40ac340125d46f78a82c37fbfde3906df109d5b6e12fdbf910feec186d82094cdb479b09fd11f92f1ad2f665b23daa6458648c6a40c141684c590a222cd99eea5b3d676257f61f545e45aafb809417c1c0247c0727fe3219f065a959fa132ec4c3240652754220b06857259766c1ebee4fdb2ebf00a1965cc5b2c5b618e049d492d576aa2226f15ac26d8251e817229efdc05439821fb31b224933fa56cfe9acf07eec034eda4f910efd946197f0762c37cebb37ca8c40736b7960170ca137565bbf455fdd1b049a8097aa62213cde2bea774c6b2a568e9cfab2bbc1f5864710aace7cebdbab39f778140d4ddc922bfabad7d8f9a1c98bec2b705b9f33f39102eedc52ae7b20c067d7c3da50fa9f2e4fc5446a5aecd6f3206f2c5ba49a51d066a985290878588ae15bf3485faa4f5a9c950c3cf127fb6af27ab52151f07d870222f8afd66d97c4ff68be8d1343189c5d815fcf19b4e9f9c2bc00c5755368bb84d08afecc6533ca88198e902b96083fed620445f04b7a71217b1d9caf8f1b657f1157164067f57be45a63ecac25c387f9867bc247bfc2a6e2e47b61a1d6a1487119adbb3ebf8a910913073bf6e5e9d7bd8853a797c801fb4c8c2e8b9972bc65bfd51d9d2d13a66a6fb72bf4b4f547f0ec48fa4d4645685a69421725310c9ff70551f7f947a3ed1c6b624217676b9e18096e0742015b34816e4c7cc3e8a9d64a5ec6d8e3a2a376b7814a7013dc0aa95496cea836b1b06d91f321132e87a9ac237a44ba09301298ff2477096a25b78d95e5aecf61bded6c6e3148623f36dfab0d808196071e9df9c377ef015ca9601ecbb48412ef267a5b0d383e82b8b94bd9f3dd0ab661f5ee2461a2eff3fbc259e4d6ac8da641dffc402ddb8605a6feada0541b34fe0d420245a98bf471824eec397fbde49ec25701a95ec73d65861886c3ade237eedd193ede1605288e77e136ed63089596b4e23df1a3826ebc61360914ae9ae28fa51cd9e8b164a4b2c5f25b5daab59b04dc9ecfaa032f227ce10c953f1c83c1bfa46f6c36c21dd7c4690d482e3df5c5a5317b6656093eb5963c6e37544b09885a0a91dcaac5906ce0de5ad82003812d810fad2fe4ea22fbaa881f7d4100af55130814cdb407128acb7550c488d70df191253487a035fad632ca60abff9e40b32aba3c682763e74656af1cc90ba5c8575990a8e728e6efe74ba18f9cf220b991d7c06b473ac2e5fc18d3b2587a29b82174104dcbe144d1ce4b9896142a4b8032b7afb938862289cece65514d083dea2771f0353e6c37244116c373cc743ba1b694742feec6a8c685cb78c93122212e420607920337a0d305ed03cb4af2723493946319160779bd11ffe8f83e4901119f277ff1964b0a2d814061540dc0ddbc0db14444944a8e5e930e2806cf1c39a3fe840663321319a69838663faf919f57a280e3f005f8601c46f18c21580f12d35c2ff1d392d8f751bff87a50163ee0d89ecbae23549953a24def5f7e676e2d48a9a3594d7c271e4a29b0fc82f0bb8d2904ebd8c822a30c983cee9a36fec4090c47f62c1570ea96b064093e59f2136a6ca03bfc331f9faa3060fb27ac39f188ef62c88870d9d82de3f92ba07d5f7cf46d722ba522e6cb06bcdb38705023aa0ff94f93749d26a6b86aeb0e0544fc5b89bf802e908d2f01e327269dbf23929728c0b4a5baee8afbfee7493e84c4a324ff2be5a3fcf5b765d990c701b05caf209f00dad4735f5a43e2ffc2b7fd96999364360fad6a813740d6ff9e048e4e8e8d7ec15bcf0846eef311ccc31927aeca7dff7092dc9e44424818413410199c2d129935ed576321e2a97aced9a827963606a9f463024ccbbc443c9b0484ead6aec1f37bdc7b6a7ecd57c9761e2ffcf5bd83f1ef074e12c6843e44f50e93bd45b12eb052ce36663f1f2be2c12e795dd28a49cd9166528709c0367b02914263177af69497edb0e82b1809c1a5dbe81aa4ed39a0de036adc5525e1eab8af6e7c64053789e6fe975f2dc31bc5ddeea6981b4fc2eac22309cfddc5898efec19b2ace4fa223e11910d678b615f1cb72c82d5c16b350ba97741102284de1faff1df1dd3eccdd21a0f5f0c8d7fc37a8db5f97c586fba0d1b78a8eabe67ccdb0ce27094b9fd67d8ca8ffe2a8ed6f65181662785ac2ca2f3456cffff70c97b997973be258d1ebac4277996fa17ce21c1e2e38db648ea0462cc9507179285c668bcdc1a066e03717491ce2f4e316c672bedb65d9f7978b7e002c21c0fec85bb55c844735cc12f627ef740db244d99de5dd2e75d36cd6508553d3b2266c377f4829b3bb9bb5e19c1d2ac157251ae1b7883afb0b937a555ace33639cd33dc46bab0f953a6682121b824a815db8597d432b1468abf16c2092608ed1d76081d0cfb402cc89dc97df59ce31b9501f40c75b3af207fff51de1b90ec41c1544f517614551c69974664e9ea2b38220e5eada5631da259f9a5059333a504c4517d693deb812e04bafbb6f96f4f0642c28b4529ee7b8bed36c05a62896feba388d11aad1968cb5d5850af2eb8ae3da11bd89f30a7e03d51c00867dd11691e5738f26075573e31fde958b842da121013db0cbbd0a5c2943cb5839f9456e27f687642b23edc611c26ab46784154dd9d03567aef1da287976acf600491167b9cc1252f48df2de1aed4811017e708572aa36d30915b24e21d1da51d1bc8b90802c0d23e15f1e538cbfe5e2413c49d5abaecd1aa0958ee2ca3f91302406040b899894233c98c2393aa725f0a29ad1e52fc438167fadb391e27b295c66e1adea34844059e076435ecb356b176f147551fc7405405cffd9062039e13e62a0ee7da51d5f760bccc40ee049a1049f87e31a38e8ac72dbf259bba7b87967ff7d595818fa3409ed3ee19da854e9a2bca8ca0aaf0e91b044279b9c0854e3329cbd42a52258eb13e6d7d4057e20c6f93e525bf2b686d63c67223efe4e43b7a41b8625ff58ab8fe897488abb2b514c16f71077d11627d82f529a8905dc733bc57731b34aa3a9cf2c7345ab71bfb55804c7ebf653df533bb3ced7a9100c52c9aca0a1c59d4ec31baffc657c3e1be372413209d3d4ad6321f039a8d1dc2ef298dd79ccbb4a02cd6fcce2fc4beb6711755d421b2df47f974ad9fdd97da067af7a92c7f31f24b9e2eba44efff6dd449e17df3d03fed7ab8ca95a3a98fe7e59d7c8e66dc9e2a9b498474305c8abe99c5ba063517d2238ff02d5b8f34ff7d8768c3a0e2432e872eb10482d43aaa65c8730951146594c8b12681974d14878d3a5a849078376b78e26c45387c7a56dec63a2c94a803b60f528423ed6ed3c09ae2b1dba1752728cab3ffc9eaccf45da51df9af27213b17a166385d3433b3630427affbd52bd1fa6758c4eb4eada233015bbb2f945b762bc9724b46759207ec4ae47dbb5df829801873953e261bb244a8d2febe75431ce42e69e8b73e76d06c2a582e73cac3a7777fbca34c74c14266fe29f99a600628f19941a38341dbdbd24c461130775a75483e6c091e93f66efb7978dafc17b11377992cfefb5f5ba004d18af1fefe89bc9947f04b9af8bb959eb8b3d3fb90922b69f8e5782b2e8d893aa75282d8bc4695588abd193261151b68832809c7ddca8f51817372426c8dbf73b89d8b18cfcf2f343800f52c2f9eb14a6430910bfb91bf9c7b3022c05b087a0ac8d2644e12bea6fb8061387b849a2b24be9f8cd215a9f358cc594eb6f799f2901810a5801f2f06d0a9310978ec0811cd3d99764a17afa872956841efff91176c0396a9ee59503fa08deef10c84d30f48442cf0ed5f431dd8bb80e0f8f4a84fa2298d0e68f03da56cd9b912d740b30f7c1edf6cefd33bdb2488e22a36419e79d2c4b55da5e1d3116d9bd3de965a863692ee479ba18cf609da8623afb45b71610ffc3ea575b611dd6d4c756ea9fb25a363e69fb216021f26f9e41e225aae9348b351a7dd51d32d6de00a15bc74e95e4237e11879d8bcee0964907431c6d23eace56f0e1fa2f44d0c819d1f922c874c7d1d48027ef90cafff1cbef0db9adfd91e993001ad1f72d83fea27c4b4a6f0a78328948e9c7a732a80da8b808e840ac989a8bc27632db468c88a878d5dc19b224458588b29f6a474b3cf81cfb2a0c5f09faf07881e06b25f0b116501ad7a5c69e7e6223dc33e865d063ef30212de6b68a39a3af6089252766be88cbb5adbc5f8f5e4b0133c359a3b4556d31206571b041603a3becb421bb536427d4ddd78e3e3d18b3e7fe4e201580eeadfd72a4428527271775bf2e999a686224e1b61c5d00db609e2fafd1ab8d305fbc7253cad20cb81cdcc05038ce9b996a6b6975a972be10a36dd4b323d57fc2ef721bda90e40b5208e8e0258e123222637d0a982c5bd412a266e49fa376407c495be9c0af18837414e9839f17d82c939370cfa8bd4566567d74d03fd3db1ae3228dfafefe32479e23a8b275758b108831b9794c2ffa916220cc0b5ff30f843ba49fdf9cfca5f5a960cf5d393f9b5c3b8fbd086fbe24f774af3df9894199871eb864187d1f882d674a0c8967bd5ed3d5896903b8da768869d6239b7d82e4c55df3841cb624275b8890e0555a34b64910", 0xf01}], 0x3, 0x5, 0x0, 0x0) fallocate(r1, 0x2, 0xffffffff80000001, 0x2) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) [ 50.696705][ T4858] loop1: detected capacity change from 0 to 12 [ 50.699276][ T4858] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 02:21:50 executing program 1: r0 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6900) mkdirat(r0, 0x0, 0x102) ftruncate(r1, 0x800) lseek(r1, 0x1200, 0x0) close(0xffffffffffffffff) r2 = open(&(0x7f0000002000)='./bus\x00', 0x14b042, 0x0) ftruncate(r2, 0x2008002) sendfile(0xffffffffffffffff, r2, 0x0, 0x20004c) fcntl$lock(r2, 0x6, &(0x7f00000000c0)={0x2, 0x2, 0x100000000, 0x400}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) chdir(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000280)={0xfffffffffffffffc, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_ATTR_DFS_REGION={0x5, 0x92, 0xff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) symlink(&(0x7f0000000080)='./bus\x00', &(0x7f0000000180)='./bus\x00') [ 50.773219][ T4866] loop1: detected capacity change from 0 to 264192 [ 50.781453][ T4866] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 02:21:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file1\x00', 0x10001, 0x6, &(0x7f00000006c0)=[{&(0x7f00000001c0)="c15758cdef4fc7e333c307ec0021c4a22561b845370cf8556f090a6dbb8851c6a2d937cd39640d9586dc961f9fd7acf596de7827434e10bcbb09e50c33285fa03a55928e839db12ee9bfb06e52ea295eb952ac97dc072b96fe52029362e87b96b4a50d6e453d7563f0364c2e3640d02670a0d7be9ca90849ac774c9c833f34cd251f5be83a6ff1a3c5aeade48aaf11399c865034873631032e31524ff4003a02231c85a7fd3785d1bed25cb49b83d3d39cb678f63963c96bfea3aa076a81d8264decdbee635d7150fbfabae7", 0xcc, 0x4}, {&(0x7f00000002c0)="6b1edfab917fb2a8cdea2f55679c6900fcb8b3b3066ffc79", 0x18, 0x592}, {&(0x7f0000000400)="1e69a919ee162f8adbea91635510c137d62c60111d1f1efed78b79a3b3122288a6820ea290bbd3239939e2ae8c98ccc3a804f4b73f5234fd293e830d603002b31c2731768d2da554f99477a96b319fe550ee10af3182e5fa6bd1a52248c7c3dd083e2305cef190ee9925bd6246a819533bd5d5df193bd7bf91b63c8e899aa830336d5210ee5a372fc8ec6740cf9fb080e2c67be6da56f5f6d2a43a5dc35d0128c7890a34d7fe72a04bb5fa2e887ef29dda7e8e029ad0e0368c1790aa9240ee7ac13ee9290cf1d44cbffe44f2d5089a9d4f7c34b0ac5e26ca7e1929b601f96fe4ff1ac35619c86bfc676ae7cf24", 0xed, 0x8}, {&(0x7f0000000300)="27943141cad58be6b6ab04232ac7ffab7868fe961f225afc1599c8265af86fe7166ff481e391d0f7864c8f4bcd3ea93d59a157857c683a68dc670a52616dbe65a9ded364c7d107e941fa860f56ed16ce237c33aaaa6aec03d0b6ce6d49c1df5733c2e66c5fc9b8dac56411dfa2a943595509a738ff3793fd7b16b712a5ec71e70dbbf2b1b23c4a1f1a8cdf264c9044dee987f75f11585816c556d30d", 0x9c, 0x2}, {&(0x7f0000000500)="0edbbd8346b8f6e3fe909e8184cbe7891d5573df90ef52e19edaf573cae445515ccaa96e4ddb1f5afac9707ce1052e32c8b122cb35b800862cf0252f20753a28151de56ee4ca93a544a59928acfc49e266fe4c3e4812ea34ded6a2e07104fd521a0ea1066d1f59dbb395ee294aef7789317bccf8a86b5ea93ba8fb85d2072c03826af2bf10750cd22cefc6f613921dda755a0adfbcd275b0ecbd1d3aa4f840f2fc3f93c4b1814785e9fef3ec700d76c903b92e6e71e93db339c25c5d124873a5fb5c5c7df83481a3ecd6f3dace6e624dc156f02d0dea879be70c03ba607873087fc379da470f9e9f5e94b48e02a3e0df8bea95ead7b7e74f87", 0xf9, 0xfffffffffffffbff}, {&(0x7f0000000600)="65b946c80af0346e3f805c4c63f3a25367ee7858dc33eda14eb307b1e1f5effb962858b22fe9ddfefb42bc7534eb81880cb5f5f47395cf9e4f961cddedc47eeeb055d06030b99943351d7aac69f00184263e847a13870a207f0302f240b40a38a902a61313fb67e0d7b76f769e9ed009cf8feb12f7b53123f0c41bcfad15480b778ae85ad86a79922592c3dc79c380aee5941910", 0x94, 0x7ff}], 0x20001, &(0x7f0000000780)={[{@delalloc}, {@auto_da_alloc}, {@noload}, {@init_itable_val={'init_itable', 0x3d, 0x9}}, {@barrier_val={'barrier', 0x3d, 0x1000}}], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@seclabel}, {@euid_lt={'euid<', r1}}, {@euid_eq={'euid', 0x3d, r3}}, {@context={'context', 0x3d, 'root'}}]}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, &(0x7f0000000040)=ANY=[@ANYBLOB="83d836068915e94240"]) 02:21:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind$inet(0xffffffffffffffff, &(0x7f000099e000)={0x2, 0x4e20, @local}, 0x10) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000000140)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$inet(r1, &(0x7f0000000200)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x734, 0x0, 0xffffffffffffff39) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000240)={0x8, 0x2, 0xfffffffb, 0xafc, 0x9}) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r3, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e1d, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, 0x1c) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040)) [ 50.963221][ T1790] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 02:21:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) syz_read_part_table(0x0, 0x20000000, &(0x7f00000003c0)) 02:21:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x5, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x101}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c, 0x0}}], 0x2, 0x0) 02:21:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x8, &(0x7f0000000380)={&(0x7f0000000a40)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="e54167000008000100", @ANYRES32, @ANYBLOB="04000280"], 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000540)={0x244, r1, 0x100, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0x228, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1d0feb92}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xaae2}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffb}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x3, 0x46, 0x3ff}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}]}, 0x244}, 0x1, 0x0, 0x0, 0x4080}, 0x20000001) set_mempolicy(0x3, &(0x7f0000000000)=0x5, 0x5) syz_io_uring_setup(0x627f, &(0x7f0000000080)={0x0, 0xaac7, 0x2, 0x1, 0x2f2}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) set_mempolicy(0x0, &(0x7f0000000040)=0x7, 0xdbb8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000180)=0x401, 0x81, 0x0) 02:21:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x109000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)='/\x00') io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000140)=0x7, 0x3) [ 51.283393][ T4909] PM: suspend entry (deep) [ 51.291879][ T4909] Filesystems sync: 0.007 seconds [ 51.293939][ T4909] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 51.302592][ T4909] OOM killer disabled. [ 51.303233][ T4909] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 51.305745][ T4909] printk: Suspending console(s) (use no_console_suspend to debug) [ 51.343365][ T1820] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 51.893157][ T4909] ACPI: Preparing to enter system sleep state S3 [ 51.893304][ T4909] PM: Saving platform NVS memory [ 51.893308][ T4909] Disabling non-boot CPUs ... [ 51.897087][ T4909] smpboot: CPU 1 is now offline [ 51.899450][ T4909] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 51.899509][ T4909] ACPI: Low-level resume complete [ 51.899583][ T4909] PM: Restoring platform NVS memory [ 51.899591][ T4909] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 51.909738][ T4909] Enabling non-boot CPUs ... [ 51.909901][ T4909] x86: Booting SMP configuration: [ 51.909905][ T4909] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 51.910076][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 51.911020][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 51.912328][ T4909] CPU1 is up [ 51.912540][ T4909] ACPI: Waking up from system sleep state S3 [ 52.022300][ T4909] OOM killer enabled. [ 52.023048][ T4909] Restarting tasks ... [ 52.026627][ T25] audit: type=1326 audit(1622946112.171:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4843 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 52.035297][ T1035] synth uevent: /devices/virtual/block/loop1: failed to send uevent [ 52.036712][ T1035] block loop1: uevent: failed to send synthetic uevent [ 52.063544][ T4909] done. [ 52.066967][ T4909] PM: suspend exit [ 52.076582][ T4909] PM: suspend entry (deep) [ 52.095695][ T4909] Filesystems sync: 0.018 seconds [ 52.097664][ T4909] Freezing user space processes ... (elapsed 0.015 seconds) done. [ 52.114462][ T4909] OOM killer disabled. [ 52.115267][ T4909] Freezing remaining freezable tasks ... (elapsed 0.003 seconds) done. [ 52.119928][ T4909] printk: Suspending console(s) (use no_console_suspend to debug) 02:21:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002889e0c2b00cc4371036a7c893f280045010036", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000008500000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x32800, 0x105) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 52.415122][ T1820] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 52.945601][ T4909] ACPI: Preparing to enter system sleep state S3 [ 52.945664][ T4909] PM: Saving platform NVS memory [ 52.945667][ T4909] Disabling non-boot CPUs ... [ 52.949608][ T4909] smpboot: CPU 1 is now offline [ 52.951591][ T4909] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 52.951649][ T4909] ACPI: Low-level resume complete [ 52.951742][ T4909] PM: Restoring platform NVS memory [ 52.951750][ T4909] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 52.961529][ T4909] Enabling non-boot CPUs ... [ 52.961652][ T4909] x86: Booting SMP configuration: [ 52.961685][ T4909] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 52.961859][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 52.962908][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 52.964281][ T4909] CPU1 is up [ 52.964524][ T4909] ACPI: Waking up from system sleep state S3 [ 53.072216][ T4909] OOM killer enabled. [ 53.072861][ T4909] Restarting tasks ... done. [ 53.097835][ T4909] PM: suspend exit [ 53.119413][ T4923] loop1: detected capacity change from 0 to 1030 [ 53.121225][ T4923] EXT4-fs (loop1): unsupported descriptor size 54 02:21:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) ftruncate(r2, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000140)=""/116, 0x74}, {&(0x7f0000000200)=""/59, 0x3b}, {&(0x7f0000000240)=""/225, 0xe1}, {&(0x7f0000000340)=""/41, 0x29}, {&(0x7f0000000380)=""/175, 0xaf}, {&(0x7f0000000440)=""/2, 0x2}, {&(0x7f0000000480)=""/113, 0x71}, {&(0x7f0000000500)=""/39, 0x27}, {&(0x7f0000000540)=""/166, 0xa6}], 0x9}, 0x15c}, {{&(0x7f00000006c0)=@phonet, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000840)=""/184, 0xb8}, {&(0x7f0000000e00)=""/149, 0x95}, {&(0x7f00000009c0)=""/243, 0xf3}, {&(0x7f0000000ac0)=""/205, 0xcd}, {&(0x7f0000000bc0)=""/23, 0x17}], 0x5, &(0x7f0000000c80)=""/155, 0x9b}, 0xfffffffa}], 0x2, 0x10000, &(0x7f0000000dc0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x80000001) 02:21:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) syz_read_part_table(0x0, 0x20000000, &(0x7f00000003c0)) 02:21:53 executing program 4: r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x154, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0xffffff12}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x36) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) wait4(r1, &(0x7f0000000080), 0x20000002, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:21:53 executing program 2: r0 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000001c0)="000001337c17360750960fc1bad988d700", 0x11, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='\x00', r0) keyctl$chown(0x4, r1, 0xffffffffffffffff, 0xee00) [ 53.154406][ T4923] loop1: detected capacity change from 0 to 1030 [ 53.156068][ T4923] EXT4-fs (loop1): Unrecognized mount option "" or missing value 02:21:53 executing program 5: io_setup(0x4, &(0x7f0000000340)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) io_submit(r0, 0x1, &(0x7f0000000400)=[&(0x7f0000000040)={0xfffffffffffffdef, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000001740)="73500600a2", 0x5, 0xff}]) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000001700)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) r3 = openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000002c0), 0x2, 0x0) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e24, 0x0, @remote, 0x4}, 0x1c) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000003c0), 0x800, 0x0) io_submit(0x0, 0x6, &(0x7f00000016c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, r1, &(0x7f0000000440)="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", 0x1000, 0x40, 0x0, 0x0, r1}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x3, r2, &(0x7f0000000080)="ec5b29fff2662c5b069d68429db5590f0d23a2f5af589b018d881a3fd88da666b587fcaf5f2ad211930662a8c389c3202a70cc8f8cc30ba4dde4bb8145", 0x3d, 0x2ac9, 0x0, 0x1, r1}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2, 0x6, r1, &(0x7f0000000180)="be545cc0ec8e7f68d1b24ff2b52a89ce79ebd5d461f5580b1840a7273188ddfc5ed79b0fcc2cfb41c5fdbebdeb9bffb3e6be295377806c4f30b8f92007f763ae7a5c53aabc0971d11ddd50f3ab9ea5a6a7ef6f52c409ed07871ebf2a66ad45d85cf940442c4080cf67540edb6e73d51808e1720ee92b4ba0b4722d6f85a4007dd5638efa7908184c0ab3737f9f2008f105c0904e7ea1ff26fcc41cff3417ecb751445947a1a140261b02d12024d886d45ee219eeb3949ca8702c1441568b45d8b1e919286483a1e5fe143837d5c60f9a39a39086d0ff5e2e", 0xd8, 0x100, 0x0, 0x2, r1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0x0, r3, &(0x7f0000001440)="a3efaf60bed409ee848fbfd55f35184026a9207496ed19b447e0fe03291ce037a0e91823fc5266d203a67769d23bb5b37e766673f4fa4af4ff1c7bd4c2b4f43e390ba20a0a0a0be500819b1f578b61558d979116343c6d94960bcfcafed40d27b2f48bfa89075f7cf619b4416e3ad0b9750e8160ec108ae38881f6b8acea1538e2477af0e90f1c447cf56ceb221aea9292e4b43c", 0x94, 0x5, 0x0, 0x1, r1}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x8000, r4, &(0x7f0000001500)="4d1075c97b4d5d64c1ef61fddceb41d3dde7ff6821b637806a194df4c6dad752c7ed8ad90e9453b035ec439df274895490b2a1fdc0ff8fc39f8a8078bf0f1149a166182fe1e03a9dec9f7dc0ea0022cdff8349dc4838423716411f91d4123b85b0908c0db4c907caa07c432a27e7eb281ca0df29e5cf48750248a571e702aa5a4af9ad99292f78d9f1dd80d39d4b3ab3cafd649cad56da52c3e51c1b30c2b6e2bfe52f0583c5ed17abaf56fc3b8d25782571e7c68c555b06a0cd967bcf1787a0c6640955651cee8b1552beb33520201c5e361493", 0xd4, 0x0, 0x0, 0x1, r1}, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x3, 0xfda, r1, &(0x7f0000001600)="235bf08542c0752a1608b1310c02bcf99abc61f99bb72dd2d1bbd233b4f112f1a15eac88742e4f0b45187749a6edaa64027390f99ab465e25391b30d687546d9b680132908142537a749f849898b8b5723798da3b61015d489", 0x59, 0x2, 0x0, 0x2, r5}]) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) gettid() r6 = gettid() tkill(r6, 0x10000009) 02:21:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000080)=""/169, &(0x7f0000000140)=0xa9) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, &(0x7f00000014c0)) r1 = socket$inet6(0xa, 0x800000003, 0xd3) r2 = dup(r1) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/233, 0xe9}, {&(0x7f0000001280)=""/218, 0xda}, {&(0x7f0000001380)=""/203, 0xcb}], 0x4, 0x9, 0x1) sendto$inet6(r2, &(0x7f0000000040)="241f0e14e4483379baa32e9b9630149f63d0ed0c808c03931755aad5d4e7416c2bc03a8d471f2002", 0x28, 0x4005, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0xac141403}, 0x2000000}, 0x1c) 02:21:53 executing program 1: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lchown(&(0x7f0000000080)='./bus\x00', 0xee00, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000b00)={'sit0\x00', &(0x7f0000000ac0)=@ethtool_modinfo}) write$P9_RREADLINK(r0, &(0x7f0000000080)=ANY=[], 0xffffffe3) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)) 02:21:53 executing program 4: sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000080)=[{{&(0x7f0000000040)={0x2, 0x4e20, @remote}, 0x1f, 0x0}}, {{&(0x7f0000001340)={0x2, 0x4e20, @remote}, 0x10, 0x0}}], 0x4000000000001f8, 0x0) 02:21:53 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0xdc2, 0x1c010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r2 = signalfd4(r0, &(0x7f00000000c0)={[0x4]}, 0x8, 0x800) sendmsg$IPSET_CMD_GET_BYINDEX(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0xf, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x10000005}, 0x4000040) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) [ 53.303084][ T4960] PM: suspend entry (deep) [ 53.328619][ T4960] Filesystems sync: 0.024 seconds [ 53.330558][ T4960] Freezing user space processes ... (elapsed 0.123 seconds) done. [ 53.455883][ T4960] OOM killer disabled. [ 53.456538][ T4960] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 53.459474][ T4960] printk: Suspending console(s) (use no_console_suspend to debug) 02:21:54 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[], 0x8) unshare(0x40080) clone(0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x12060000) close(r0) 02:21:54 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x200, 0x20100) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000140)) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000001640), 0x200, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) socketpair(0x1d, 0x5, 0xd85, &(0x7f0000001680)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f00000016c0)=[{0xffffffffffffffff, 0x407}, {r1, 0x10000}, {r2, 0x1a2}, {r3, 0x4010}], 0x4, 0x6) shmctl$IPC_RMID(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000001700)="08ca4dbdaaabdd614cf9174fe5e4a0c43aa124115fcf98effe0ffd8eb3c3ca62c6e8b28e2f859239f89cad71aef047a641e5b36025c6d9d17de86edc2736814b8fee009d117524d3eeab8238aee78332be90878cf236815bd2e1abdf1c2a9cc0f8b33656480bbdda1d18a51ed86b2f7763c74cf88c33cfb837af6b0f30bab16f65cc95c7f9059ce58bfc4ba6df288d109ea43d06da5afb2a69c144c04d0b2895ec2cdfc1e1896e152ba638c098e6b1680369047ff235edb2f0", 0xb9, 0x2}], 0x0, &(0x7f0000001700)=ANY=[]) pwritev(0xffffffffffffffff, &(0x7f0000001580)=[{&(0x7f0000000280)="5fcac6c8e846f0ea00954bd19e4e1de554cc3f949e9d0ceee250d961f64b912407cc098c900dd5835cd8b363b68ec71204724568fb3a9b69bf74314240e105e417c2a66a193dfbf94c69b1d3d020cc7f9ffdd0c91b6ae431469330c816c4d7a3c66f2b23d4ff69d0e34f20e8eb32daa5025e350eb353e85f164606b9290e992563d43495b15e", 0x86}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="428f8e37e318b06d2aaba8c52309c0010fe5d9b01ce5f7de1f3b4bce42e30fde1dd378e1c82209dfbc42d0a0d1a00297deb9e6e06ac3f4df4601747a3a4ed0a22f23dc7e60704f04193808d2881e56216eb05996821d8f0dcf2e085d76915581bbef12a94fbaec044716d6b0a95936956b30e1b6b9537820b7eb8842307cb1ffa3afd31d52edc03632eafb7309", 0x8d}, {&(0x7f0000001400)="dbbf940ac9c9e8c4714dd007d0e27654d717e381b4d275f423324077173d8a08d0b5aebbc4ad3f45843a328f9b3c0b5ab6a8c0b5df6b0d920f29bf04b359aca12b6a174de21466d7108f816ba7f4ac27695be9217aed48e9bff499e47e0fbf8b4be05eb0a85f8cb4b501c80d65693cecb9557077cec4042245fd25fae7d2acf0f649808f1303148a0612c1e6e7f505bd1dbc58cc758c24b5b35c81a681cada8ca551ea79e258713f982236ff2aaef9554f8a7b21d3d50857aa3b4ab515735093ccc78b7a74fb62d44e3c448d5a22e6b657f4", 0xd2}, {&(0x7f0000000180)="84c2b38e3eda", 0x6}, {&(0x7f0000001500)="734fd9de8955b9730ea8ca4ccda13a999820137dd0649c2a7eae089603f4a6b83a111584c309ccd2f0afc644116f34887513d7d477717f98370b7874f7376f08d0f4db0841a4b061aecc98f4d0d0cf232565b1c735b01e44fd51f8", 0x5b}], 0x6, 0xde5, 0x7f) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r4, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r4, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) fsetxattr$security_selinux(r4, &(0x7f00000001c0), &(0x7f0000001600)='/usr/lib/telepathy/mission-control-5\x00', 0x25, 0x0) [ 53.496229][ T1790] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 54.021082][ T4960] ACPI: Preparing to enter system sleep state S3 [ 54.021149][ T4960] PM: Saving platform NVS memory [ 54.021153][ T4960] Disabling non-boot CPUs ... [ 54.023858][ T4960] smpboot: CPU 1 is now offline [ 54.026446][ T4960] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 54.026504][ T4960] ACPI: Low-level resume complete [ 54.026572][ T4960] PM: Restoring platform NVS memory [ 54.026602][ T4960] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 54.037431][ T4960] Enabling non-boot CPUs ... [ 54.037572][ T4960] x86: Booting SMP configuration: [ 54.037575][ T4960] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 54.037761][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 54.038696][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 54.040081][ T4960] CPU1 is up [ 54.040287][ T4960] ACPI: Waking up from system sleep state S3 [ 54.170509][ T4960] OOM killer enabled. [ 54.171053][ T4960] Restarting tasks ... [ 54.180462][ T1035] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 54.182620][ T1035] block loop4: uevent: failed to send synthetic uevent 02:21:54 executing program 3: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfd14) ftruncate(r0, 0x1) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x6f52) fallocate(r0, 0x1, 0x1008, 0x28120001) [ 54.209797][ T4960] done. [ 54.215013][ T4967] loop4: detected capacity change from 0 to 264192 [ 54.217311][ T4967] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 54.223569][ T4960] PM: suspend exit [ 54.253153][ T4976] PM: suspend entry (deep) [ 54.259844][ T4967] SELinux: Context /usr/lib/telepathy/mission-control-5 is not valid (left unmapped). [ 54.260018][ T25] audit: type=1400 audit(1622946114.409:13): avc: denied { mac_admin } for pid=4965 comm="syz-executor.4" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [ 54.268301][ T25] audit: type=1400 audit(1622946114.409:14): avc: denied { relabelto } for pid=4965 comm="syz-executor.4" name="UDPv6" dev="sockfs" ino=15722 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=udp_socket permissive=1 trawcon="/usr/lib/telepathy/mission-control-5" [ 54.298715][ T4976] Filesystems sync: 0.044 seconds [ 54.300778][ T4976] Freezing user space processes ... [ 54.302268][ T4983] loop4: detected capacity change from 0 to 264192 [ 54.316490][ T4976] (elapsed 0.015 seconds) done. [ 54.317418][ T4976] OOM killer disabled. [ 54.318013][ T4976] Freezing remaining freezable tasks ... (elapsed 0.000 seconds) done. [ 54.320402][ T4976] printk: Suspending console(s) (use no_console_suspend to debug) 02:21:54 executing program 0: r0 = msgget(0x2, 0xae) msgsnd(r0, &(0x7f00000001c0)={0x1, "ecd2505f6ead9d7c8780e7cbc631479be64685da31592632e8f2a52688203b38525cdc4b24a531e4fef039bf3be0bbfc11ffd6c7ced5e3fc575979011a5231a8adcd3f69f83cfa7714ad298fdf472b6167"}, 0x59, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000080)={0x0, "d1680c7afc49c58f171cbc29789a653dae9e5a67253b3d229483225b3ee0d2164574"}, 0x2a, 0x0) r1 = msgget$private(0x0, 0x83) msgrcv(r1, &(0x7f00000000c0)={0x0, ""/188}, 0xc4, 0x1, 0x1000) msgrcv(r1, &(0x7f0000000580)={0x0, ""/218}, 0xe2, 0x3, 0x1000) msgsnd(r1, &(0x7f00000002c0)={0x0, "ca546852fec5229be1a56dbc56c6e936952ae15267a214f46c9fd29d8cf63c0d1cc77f9c3fa2872c4a5a44a9cf1c218c65b7f5ba048710ebd6837857c253d4e116436aa393a20d13fdc9417b4ed4874b608dd4faefd725a450cd86f17912e533fce738c064ca3a67241ddddb45a90da1f5bd2f6c777c54b0e4f54bcb210fe022aefe21327a28f4ef5970790330e19e0876b473d3cd2f64d21b93d64d4a4932048341f038ef1e870c2c8dbc8ebc8dcf9f627c2d5fbaa9f92dd155a96be90a6abe54b225cbde469cb651fa6a55a1977c7f0cee53a60022e79032512de848e9524186dd57a933ed83"}, 0xef, 0x0) msgsnd(r1, &(0x7f00000003c0)={0x2, "4e5cbf903ab34f75babb38c417be35e14ab6327b493c3eecfbac4c1af68358b0e1700fdf5af63cc645d992c73361609f3b1be38f33fd61501bdeeaf5404b9bad60c29f21832a481c"}, 0x50, 0x800) msgsnd(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="0200000000000000dba3b7e681531b8f3cb87fda0cbc91da95acbc46311e35ef5de57753e4ce9b9a0416ed4682e7affc4a8281c3fc69e4a43997973c125e8173f1ff8b4cc4e69d162391d89d363bd6408108c4c265d680410cb61430fa53b4fa2a04632ebd94cf24635daa73d92a94450f2c68c60eeb98d8f34594612b4ff369340d8d51bb6bbfd1399338ae7c255848b60982a21823e10074bc0766685429b1c6d85eb294f7faeec9b92ae3ca05810f69b9569c0d26198c65cb2fc1fe3c370072c6f625cee952aadddff676e6ac41583d889605918fb0705a2a168cf4a56818d4a22bb730890c5ae2d971c7547c5f1cdc9ad8"], 0xf3, 0x800) msgrcv(r1, &(0x7f0000000540)={0x0, ""/3}, 0xb, 0x1, 0x1000) 02:21:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r3, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000000040)={@remote}, 0x14) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)='rpc_pipefs\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 02:21:55 executing program 5: r0 = syz_io_uring_setup(0xa53, &(0x7f0000000080), &(0x7f0000000000/0x11000)=nil, &(0x7f0000008000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000000040)) syz_io_uring_setup(0x0, &(0x7f0000000100), &(0x7f000018f000/0x2000)=nil, &(0x7f0000309000/0x3000)=nil, 0x0, 0x0) io_uring_enter(r0, 0x7, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) recvmmsg(r2, &(0x7f0000005d80)=[{{&(0x7f0000000200)=@xdp, 0x80, &(0x7f0000000440)=[{&(0x7f0000000280)=""/217, 0xd9}, {&(0x7f0000000380)=""/135, 0x87}], 0x2, &(0x7f0000000480)=""/166, 0xa6}, 0x2}, {{&(0x7f0000000540)=@nl, 0x80, &(0x7f0000002880)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f00000025c0)=""/32, 0x20}, {&(0x7f0000002600)=""/237, 0xed}, {&(0x7f0000002700)=""/132, 0x84}, {&(0x7f00000027c0)=""/39, 0x27}, {&(0x7f0000002800)=""/68, 0x44}], 0x7}, 0x20}, {{&(0x7f0000002900)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002980)=""/4096, 0x1000}, {&(0x7f0000003980)=""/53, 0x35}], 0x2, &(0x7f0000003a00)=""/120, 0x78}, 0x10000000}, {{&(0x7f0000003a80)=@generic, 0x80, &(0x7f0000005cc0)=[{&(0x7f0000003b00)=""/198, 0xc6}, {&(0x7f0000003c00)=""/116, 0x74}, {&(0x7f0000003c80)=""/4096, 0x1000}, {&(0x7f0000005ec0)=""/70, 0x46}, {&(0x7f0000004cc0)=""/4096, 0x1000}], 0x5, &(0x7f0000005d40)=""/64, 0x40}, 0x4}], 0x4, 0x40, &(0x7f0000005e80)={0x0, 0x3938700}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x0, 0xb02d, 0x1, &(0x7f00000001c0)={[0x3]}, 0x8) 02:21:55 executing program 3: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfd14) ftruncate(r0, 0x1) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x6f52) fallocate(r0, 0x1, 0x1008, 0x28120001) [ 54.418758][ T1799] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 54.937753][ T1319] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 54.951984][ T4976] ACPI: Preparing to enter system sleep state S3 [ 54.952109][ T4976] PM: Saving platform NVS memory [ 54.952112][ T4976] Disabling non-boot CPUs ... [ 54.954583][ T4976] smpboot: CPU 1 is now offline [ 54.957009][ T4976] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 54.957126][ T4976] ACPI: Low-level resume complete [ 54.957196][ T4976] PM: Restoring platform NVS memory [ 54.957204][ T4976] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 54.967511][ T4976] Enabling non-boot CPUs ... [ 54.967819][ T4976] x86: Booting SMP configuration: [ 54.967822][ T4976] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 54.967982][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 54.969006][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 54.970242][ T4976] CPU1 is up [ 54.970481][ T4976] ACPI: Waking up from system sleep state S3 [ 55.011651][ T4988] hwrng: no data available [ 55.399701][ T4976] OOM killer enabled. [ 55.400243][ T4976] Restarting tasks ... [ 55.400936][ T1035] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 55.403377][ T1035] block loop4: uevent: failed to send synthetic uevent 02:21:55 executing program 4: unshare(0x100) r0 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) unshare(0x10000) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x0) sendfile(r1, r0, 0x0, 0x0) [ 55.443351][ T1035] synth uevent: /devices/virtual/block/loop0: failed to send uevent [ 55.445026][ T1035] block loop0: uevent: failed to send synthetic uevent [ 55.452520][ T4976] done. [ 55.453382][ T4983] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 55.454483][ T4976] PM: suspend exit 02:21:55 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000001480), 0x121401, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000b40)={0x0, 0x1, 0x6, @link_local}, 0x10) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 02:21:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x80000a, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000180)={0x1}) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$lock(r2, 0x26, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x9}) preadv(r0, &(0x7f00000015c0)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/225, 0xe1}, {&(0x7f00000000c0)=""/101, 0x65}, {&(0x7f00000012c0)=""/199, 0xc7}, {&(0x7f00000013c0)=""/128, 0x80}, {&(0x7f0000001440)=""/250, 0xfa}, {&(0x7f0000001540)=""/125, 0x7d}], 0x7, 0xfffffffb, 0x3) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$lock(r3, 0x7, &(0x7f0000000080)={0x1, 0x0, 0x36d}) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$lock(r4, 0x7, &(0x7f0000000080)={0x1, 0x0, 0x36d}) close(0xffffffffffffffff) 02:21:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r2 = dup2(r0, r0) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0xe2d24000) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() clone3(&(0x7f0000000000)={0x40020400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000001380)=[r4], 0x1}, 0x58) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x17) wait4(0x0, 0x0, 0x0, 0x0) [ 55.528237][ T5008] PM: suspend entry (deep) [ 55.538005][ T5008] Filesystems sync: 0.008 seconds [ 55.542449][ T5008] Freezing user space processes ... (elapsed 0.003 seconds) done. [ 55.547134][ T5008] OOM killer disabled. [ 55.548005][ T5008] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 55.551397][ T5008] printk: Suspending console(s) (use no_console_suspend to debug) [ 55.651377][ T1790] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 55.811510][ T1319] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 65.459614][ T5008] ACPI: Preparing to enter system sleep state S3 [ 65.459708][ T5008] PM: Saving platform NVS memory [ 65.459711][ T5008] Disabling non-boot CPUs ... [ 65.463437][ T5008] smpboot: CPU 1 is now offline [ 65.465421][ T5008] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 65.465521][ T5008] ACPI: Low-level resume complete [ 65.465588][ T5008] PM: Restoring platform NVS memory [ 65.465596][ T5008] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 65.476152][ T5008] Enabling non-boot CPUs ... [ 65.476300][ T5008] x86: Booting SMP configuration: [ 65.476303][ T5008] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 65.476466][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 65.477543][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 65.479073][ T5008] CPU1 is up [ 65.479287][ T5008] ACPI: Waking up from system sleep state S3 [ 65.601922][ T5008] OOM killer enabled. [ 65.602654][ T5008] Restarting tasks ... done. [ 65.605426][ T5008] PM: suspend exit 02:22:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x0, 0x81, 0x8, 0x0, @tick=0xe97, {0x0, 0xfc}, {}, @connect={{0x7f, 0x9}, {0x5, 0x2}}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x34) ptrace$cont(0x1f, 0x0, 0x79, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 02:22:05 executing program 2: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x48, r0, 0x800, 0x70bd26, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x65}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x2}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x7f}]}, 0x48}, 0x1, 0x0, 0x0, 0x24000804}, 0x44000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r3, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) mmap(&(0x7f0000475000/0x2000)=nil, 0x2000, 0x4, 0x1010, r3, 0xa0500000) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="390000001300034700bb65e1c3e4ffff06000000010000000a00000025000d0004001400040037000200000000000006040000000000000000", 0x39}], 0x1) 02:22:05 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x2000c10, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r1, &(0x7f0000004f00)=[{{&(0x7f00000001c0)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000440)="0b1fa2bbbef990123e18d5162338f0d867ca2321b8fa5bf6575a6487ed3980be1af4d27c2352ee79e9b558756c0d8b0e2cdbdc510aa0f26c99f5109bcb845710addb459b66e9473e29f7dc951f05bd9d16c12bb93ea68589d49ac6e15b1571d41aa584cb2cb132f17d287b423a0557bc9fa2e67c184885965e679c6d607da8faab509f090a3338870b55e6dc1ec2d9be80d5004bfa9a0ffc50f3aef62870244336a912360194d93e1f20130f5444f044a78f26258fd12b5dfd6642c6d3bb4b6bb70bdecf44b09e327db0141dd2482efdb88614e3b1319ada56a76c8a61cced14d25ff7f488e9858f2226adfec4", 0xed}, {&(0x7f0000000240)="0430e03e873d85c1a2654d0b236de3b2658e874b4eda7463a762e18b4ff56aa8e3fcd3b07381318c7b8606609f87f91e0751c1162ae91958a5391f3884f98e7b5fb9288e7671932f2158daf247c9be7e000a7e0e932c0ec76c7a", 0x5a}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000000080)="2a13257c2738b3fc625364d2dfb7", 0xe}, {&(0x7f0000000100)="2346d3c5968ed062bdf170144b27f2519bdd47b468abf9e0bd135536b5dfd9279764a645ca1a", 0x26}], 0x5, &(0x7f00000002c0)}}, {{&(0x7f0000001540)=@ipx={0x4, 0xfffc, 0x5, "3de39e79fdef", 0xca}, 0x80, &(0x7f0000002cc0)=[{&(0x7f00000015c0)="4fafe917f4b5e8387f3b40b552b842c5ebce441a1b630ce6808d715f0cce424f4727b4ff3a8a35887914d02ece3df21d838f63dc4596c7752b21a82b3f37ab2e24ca0a0fe3cda752c700be3a2da1dc9a8a0b0963711ce91116d2bf1b9d7610443cfcab38d771806e2bf941fbce9f6c29d2bd5fb1b92d447fd8ac4f2929b919f876aa201b9e94fa91e62b2a16860c70d4b95de200043175495e60", 0x9a}, {&(0x7f0000001680)="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", 0x1000}, {&(0x7f0000003180)="51ae18ad18aca1665bab7a9681847ad38806228d5aa362d027f5d6ec39972eb39e15c10b72bde94d37a62444cd9b6217dcf5f7116b92a248b90964cfbe27377a801941917d00a95dc77b98f0a13d3045fd0f4183", 0x54}, {&(0x7f0000002680)="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", 0xfb}, {&(0x7f0000002780)="0db825498d620429ea6173e8b9411db283bdc715bbbcccb24c68522421caa41af2f2314f901431cad2bc06254c68396751daa5e8f1f1ad4488e641dfb8f902a91ded7b54218af2813850ed2d4dba355c87d67a34b27bda88a097f52a8f84c1912df061ffdd66d88344360c2c04fa80bead826a01956437a371bb8b816d4e47ea252af564628632e71e7ea7e0a29797977fb24c69833dad817855b8049c1bbf5e7d97406e44ee21eac8d4f5bfd6169b0dae9a78441cb7b8335feaf8b912f3ad5766242e737422687d6ca628d01a164b2cf62b36e733802bc60ff51401b9c298ea8ad5f81fb77a1570fa4a", 0xea}, {&(0x7f0000002880)="d0c3ea40c66215c7344335151535a21839d395f9b3846e56959153036481b0945fc92fd4b567391405a43b3e440b51b362633b49f1c1ef1503402b97128b933249a04ae7c970bda85fa6f8a574a26d413ae1f7ae505a5a0142a8c5f1a093e34614a57c409f72f627a991140f92f44ffe7495ff57e08f8a055b0c45c0ea6148d06c5c333cf86de0db325c141b59b83e25dab44c146882eb0a9830", 0x9a}, {&(0x7f0000002940)="390ab2d8078d122412d70d6628b762b0cdbc7e45bb4ce276f80e967f2a85b7a4be26205395c0c626a1fa3315f61f05e0ac5dc5a0954f04d41bf67de62fc316b053be7ef5d08c7a76ef4b60ef579b7bafd53d003420a2f37fec5bbee33275e555dcb1fe52a90ac1218a94ccd9c5c82f8cd9c62c470679f2168c6f002d78deb0f2185c4f2d04802afbfc2376a44cc13ed1b6a4c098bef614554562e5f0120595449d6c7ec1b455bc206d51cd17de3d38cf902a0a50dc4685ceabee06544c88eeb5380316b9ea994b341a0ccd74a002bab1dda71fdefeb23465e8ff582bd27c76827bad911b2718bc1ff54b46d10e59ad130f821275874e266e47fdf50dfc2e", 0xfe}, {&(0x7f0000002a40)="05a65e420627b95174dcb8ddb8a465def203b481257a8e79336100e860084fde1b77b4a242235caaab897007ca1dadcf4dabe1e4c2b127267f610c983b56110cb158455e42d16ed5b15ab589a07ea232c00cc6dff5b670da52d193d6761a238f78d498cca05440e86f996b65abca9d5978ccbeb026a10290cf83edc48e9c24", 0x7f}, {&(0x7f0000002ac0)="c755b4136a5aa827b860d8c8a8ac2b50fd856aa5586f7145df21b86866a1d0bb0cc5b4214b3c78e210b621fba945562616ac3f2bb54024cce288d987a6f82aface3a1d0ce7e373224989619d2457503dea4fe34ccfa270a15ec7a4663b627206e90ed3689c9ffd04fd6711c081d32e10f557710a7e0e0a4f86fda56c39a641cbb3c06e17972bf05d9b05a1a27390c03f8856f057811353b6857ece5937482406a831c2c4ec84a1dcf215f7f3fc9fdc900cb3f922b3e6af0696b5c8b57ef59fba071521ba1f0802b2bd20b4940e50328c0d9272ab5459e0498b72ad9f", 0xdc}, {&(0x7f0000002bc0)="981353f11ac947e8b8f94a3926e8e00dbe90e5ae174d4e7eefc4f11c4f89c479cb627e764d43fcc4e47a0dc96f4982124f71175a892e61d88f567c77891b662b20208affe094a3d0609d7b9d673da4a205dcaeb9330ea7fb5c15869c76d75a44a8d0216e61b5490dfd92abb766606c247201472c339956e4a19b273954b680a77e416b79df49f21915ed2006751ce0230bc5df2328adfe84ed1602fc555de652f0c54b139177cfdb222ec33575fc64b091a8fa453cc3853244aa24f357db76a67a2a22a124718de1c75787388037df6803055b6627adecddcdaf6e8b796eaa31f8b72470", 0xe4}], 0xa, &(0x7f0000002d80)=[{0x50, 0x6, 0xffffff39, "8f021dfd0faeebf1d61413f791ce14b92cfcc83698264416127eaaaf991a39ce8093fca8e8a05a5389050357c160d2080ac1f8d8eef78e0eca1fd770"}, {0x78, 0x109, 0x20000000, "da7bfbdb58aeb4e8c85ee0bb8d19f7fa19bbdc72f100154070bbe77563371395c1f6b5793ad17c03f91c7e4166c1c0513ad050270259f7c370f184cdfac22047dcb21049ecc8b55a978e427d9c0173f0e200e1d0a403ac10d24fba38f936a6896d17ed"}], 0xc8}}, {{&(0x7f0000002e80)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x2, 0x1, {0xa, 0x4e24, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8}}}, 0x80, &(0x7f0000003140)=[{&(0x7f0000002f00)="d8c302c7abf0da34c02f0c4d9cba275028", 0x11}, {&(0x7f0000002f40)="224eb47ebb5c9c8106ccbcd5b06dd3bbf27a9914508e6467d5537fe7be6b3b3f507fbb16f59d4e", 0x27}, {&(0x7f0000002f80)="58cadcfebb0434d99bfd984d4f29e294637559f5bcf171ff6ea4bf438dc0bf917870d1df4fa676761bf1314a722bae87e8ea21603d223f2947ffc696b2c6a0758645f22f09b7a39f6fae713a7ea10473091f7f9451489a6e0558de10daff4a1b8a81cf45076db66847088b8f915ec560bb03223e89f966d1d41978fc0c482b01f02e028da5751f1bd574d40ec611b9f277de89ad0f165f82f61b40aed501df5cdd8b0a662b12df992e69626dac489299", 0xb0}, {&(0x7f0000003040)="f9a08304d843a30760789856a9f5fb43edb864e0f71d6195710a5405b5ab31350071004c9806dd31158cf39f8d807263baa6be03457c78b4305901329874b61aec3058ed3724bd08a869db0d507ea189e3dcc82117d7434f76d42ec3a6b5b33104aba7e20188098911bbf95bdb4b88e6730dbb1ff3145f079a088dc8d4d3cdac61e26ca4862406e3085f86223f56fda44d5d0659d7508b16d9145c763990bf1472c306608b40c901fa4081f8c6d3db288a56492089659367a92fb16fa5ccafb26eb9cbca86e5fd6b660b8c391d0f70eceb9d69b4f3eacb1392b8e8bb1d01066f72488ceb8252e90a96047c8af4c4f4e182c98e57c644b66d", 0xf8}], 0x4, &(0x7f0000003640)=ANY=[@ANYBLOB="f00000000000000013010000090000005b4fb13e20bc927e6215209088e201a1d9b793ea615969faada10c153c729cda2ec4ea0289f7ef35852532a46597e1e13c3ddbd7b04000092985e82c8d425bc2ef84c3909e8060b0643abd470d67006905307f2057958e9d198c10faaabef861a6d33101587e1415b88e7733cb5697bc364838965f58b4822b74b7d59a2f0ad372cfbca41c0f5985aa833b801cd5e63d9b7594476f34daa2271468df8dad8514ee6b226b8b3912e6a7a81869e446286434b70dce046dbdcf76f7dffb89d817502422165c3c2dd0e47cc7498f2d24d7f469ee43e7169d8f01143059e6781748dee93ad81b415558f1ab71eafee2d9509825919f4bd371515bf9693945ccdfc09cbdf30a554dbe3a0a1d7b0742794674cbaaeccde6a42417c02cc5c090601a0a4de5497d20272e32238f81097ff71c3a62155f238aed887f839f8a72b573c8dc948c01e3f12ef37ce52e145e8a9a6de057934fd87528dad59f5318cd12cfede47246a41375a48b0476e2206355774a4d230745cbb7414396297d11f968d20256d8820a9c5ae3b76401ba8fc017081fbe5d9109a458a3627c439b9f677a573bbc432d12eaf33e009ab84ada0906737bd198fef7787507a5302b2f01da234f3236667ce4042d90408a5bb486040efdc0d7264d4a2dc4811c5f6ae2720bcf79f31ce0b2f7c950d94ebeb5a62ee8e6fcb14588f30fefd9fc099f11034220597166ac7b344d6fa3a3dd991b040ed2de125f7ada2847b5875c702c3013595fd69d7b2a416b73a9b12e7e00c1811341d9ec868dd9fd2a4a29098b19e9a3b7f77f455b175ee230ff8bae5303c63abf132a54003087f9b1c86a7ff445c6e87f0963b13862d06a71b095619119ca2e5478350a54793013d914fc20bb2d4840a45b3c00ef9e920c0a7eb3b27fc537db9415eaeffa89ab340160f430812ca63bf410032e502a95b32dc35b7fb6a1911c29967c1990fd6a4b451a1667386060967369bf9babd60a"], 0xf0}}, {{&(0x7f0000003280)=@qipcrtr={0x2a, 0xffffffff, 0x4000}, 0x80, &(0x7f0000003600)=[{&(0x7f0000003300)="36782aeb2c5a31c324883709ef9313438833cb64fc5c1e23c7487ac841b363851a56e80d1827e2e7df439ce51d4e818454a989eeb4d5ba52b49f328d5b5a29af2eb18b5b8e724e02d2b01443ea67130fd342bac519d7fd7debb0d88f9dde9434eb133f6ddb892c52f16fd9301ac0765d335ecb113f440c0d90f7b9ad3e84995c79c95f8ab516c33c443c175e33c046ed8fe83417ef9e99675ec589ffe534f48f2f5d939e75864b260015a54ea7cd3cc5706bd80a0c0bfba41efe237c845843b0f745a8afc45d583dbcfd92f85dc3823571697758f9680513ead24a7ffd61e522a0dda09bbb5eef34bfe08132c317b5c2ff716e", 0xf3}, {&(0x7f0000003400)="ed5c1fa764b3fa6a1fab7e2d2f67b4e487098a7623ce92ee017765f97e8a766d2432be640a30cfc36f3ccede7debed61f086ccf6f9ea6d0d6215f3d421b394fd254e4debcfd6022cbe6d6ff2123ee29ea0cde56d88eeaa5d619822763e76dee05c5899d62c9f", 0x66}, {&(0x7f0000003480)="f5929cd0128b5e8e6af96ad6017153b3e3af43c31f4737d9de90112c6cae7cd696eebc40ccb218fca0f7f15022a7eb25a571b63cfb65e3daad3fcd340793b8e57891f47f15f92cdc743e0e0689080fb9dcbcbca0ef60650b0eb79e", 0x5b}, {&(0x7f0000003500)="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", 0xff}], 0x4, &(0x7f0000005040)=ANY=[@ANYBLOB="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"/757], 0x2f0}}, {{&(0x7f0000003940)=@vsock={0x28, 0x0, 0xffffffff, @local}, 0x80, &(0x7f0000003c80)=[{&(0x7f00000039c0)="5afbcea8ebdb3eb76a7c6a89966485695d23ef36dee82316b9adc2fbd37082b441bdbf879b3b857abc10080be406", 0x2e}, {&(0x7f0000003a00)="b230d8531287c81a8172690145882b21c81dbf740438e3d19d8d14d31e6ad0153ead7d7aff69304ba0e6a0862f2188e8e7ea2a596677fd05187b46de16cf405204c1", 0x42}, {&(0x7f0000003a80)="e6584a895b1440d5f41da629834304cca740705579778c5fca4433e748f19b1a38e7ac64e5ddbb586b2e3c9a26a0da5ba30b3468ed668fd8281c219cf91e1a773e5ce53cfe5f87af75051d85a5daad1869eb2cdc21a42be395dad7ef512f2b73d132ff8983039a8763d918c00e9b4ef751e271125d3e466e41d093e99949f612d725e3f00a025914872db6aaca785f0ca0e7100d312ad5475ce64482", 0x9c}, {&(0x7f0000003b40)="0af22d2ff34214654f732a726be8e106c7aaf1b6fa945977339737278e5567704429b76a88a48bfa43dff66c08f89ce4e2cd59a9c28eddd6c5503e52cc4c4fa9a4270aebd47136d1b71259abbb8af65377033b37808fd399789205cdb876cedaa19ed1748024a84623171e8b40552411552fa7070e41b26d0dc56feeb940e8", 0x7f}, {&(0x7f0000003bc0)="782b2adfb207f0fc9d4fbf5c4ee553c867b0fa34876b010602fb9ddb640ff9f7fdbbe5d3138b051ead5a00d84d38a9266e626d1e8d5b29f5fc5766716189d308cd7def4d0ebb1eab34131e8dee397613dd1f44a19a44aea2e742f6f99f81fdd24dbc7e9ba3c9d10ef587b7e40920052a7e4de0c46b9bd40e37b4859a8fc25e6507451abed9d8725640691b2a6693011d3c2804983012a2fa78c9fa40b8336d493e35246d368f06689fd347dca39c4f0ee4b6", 0xb2}], 0x5, &(0x7f0000003d00)=[{0x1010, 0x104, 0x8, "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"}, {0xe8, 0x10c, 0x0, "81cdef7247c7de2034773ef9c8a1072e0d34dd47f2b9a2c7c1205c8c6bfa605ace073316be45bd118ddfe285478ca13ef29f24d7d951b9c613ee54e06c635d9ebe86584366a94f06d19cabd3a2859668c2ee60087c8b5e9023e168c63954e72078b021a5a2c1748540c0835f4a440370c7004e94832a5a36ea7ef7db7ca202ce1183a9b3e354c57db6f8e964caef911b78d5ebd92f7e35e149a8f80d3280a89aef8e249b2a34400dcb6e00fd2690148e9d138b60ea8e89d5aa0d1d4902531038ca0cb22ba15db9452d2a5d68ce701840ec39ed48b9"}, {0xe0, 0x111, 0x1, "dc3eaf6e4807b2ea6929b912449d74f13afc42ee9efc1987a87b4db837ad4ceba39cab0aae65faf52d8e4f36d69fecf583a236085a5f389585f0f64ddba0e4b0ecbbe36dad51875f91f04e9e3191fff0d9efc652139edc39eab5c30b4c326953123599ea5c0203b8e92bf2672251a0a60ce62d0b50eff29b76a5797d030c469756272ef066c18db629f1eaf8c7fe183b112afbfae2e951794325c0842b9f04a489583a1f16183b43e92d2a2ff68519a67a614b5a6db918edc0e53601d20dfab9553b96eaeef8ab9861c4"}], 0x11d8}}], 0x5, 0xd0) fcntl$setstatus(r0, 0x4, 0x4100) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r3, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) preadv(r3, &(0x7f00000065c0)=[{&(0x7f0000003200)=""/120, 0x78}, {&(0x7f0000000300)}, {&(0x7f0000005340)=""/180, 0xb4}, {&(0x7f0000005400)=""/167, 0xa7}, {&(0x7f00000054c0)=""/4096, 0x1000}, {&(0x7f00000064c0)=""/99, 0x63}, {&(0x7f0000006540)=""/74, 0x4a}], 0x7, 0xffffffff, 0x9) mmap(&(0x7f00001ec000/0x3000)=nil, 0x3000, 0x7000000, 0x2010, r1, 0xea018000) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r4, 0x0, 0x8400fffffffa) r5 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r5, 0x0) read(r5, &(0x7f0000000180)=""/19, 0xfffffe47) 02:22:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r3, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000000040)={@remote}, 0x14) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)='rpc_pipefs\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 02:22:05 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0xedb670eb7b7720f6) recvfrom$inet6(r0, &(0x7f0000000140)=""/21, 0x15, 0x40000163, &(0x7f0000000180)={0xa, 0x4e20, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x26e5}, 0x1c) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0xffffffffffffffa7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0xfffffff9}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x400) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 02:22:05 executing program 3: r0 = open(&(0x7f0000000000)='./file1\x00', 0x1750c0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) fcntl$setownex(r0, 0xf, &(0x7f00000000c0)={0x2, r1}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x6}, 0x1c) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) setxattr$system_posix_acl(&(0x7f0000000440)='./file1\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000680)={{}, {0x1, 0x3}, [], {}, [], {}, {0x20, 0x5}}, 0x24, 0x0) [ 65.748317][ T5025] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.2'. [ 65.750812][ T5025] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 02:22:05 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf32(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/433], 0x1a9) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee00) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x65) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x1c243911) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r5, r3, r7) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000040)={{0x1, r3, r7, r3, r4}, 0x2, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8000}) 02:22:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r2, 0xf503, 0x0) write(r1, &(0x7f0000000240)="3bcb742bd70c622f8774920ce0930921dcd6ff4df907ba8716f654526496bcda5d923f9601ed138be8e445996b7bf30cccf77ec2350344d7b99bd38a7fa87f60f5930f9af4e7488e5827ad1eab9b7fa64a122f622253584e2528a3e2ea8e5ad5185854162ca472964706c3e21ec10cc32755d7275f2fd6552b221c31e0a2afbc3120e5803a3d8271456d5a297fc6c4e483c3bd88e35cf247e4fd736c650999617e3574bb300d36e11339510647ddd2c20d5fc3fc3cece4ceac932b36e4f2ad84d96f7b6f7621", 0xc6) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0xfffffffffffffffc}, {&(0x7f0000000200)="80001c0000000000001cfffbffffffffffff7809140b283a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@dmode}]}) [ 65.790526][ T5036] loop0: detected capacity change from 0 to 87 02:22:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x1, 0x3, 0x0, 0xe000000000000000, r0}) sched_setattr(0x0, 0x0, 0x0) r1 = getpid() ptrace$setsig(0x4203, r1, 0x2, &(0x7f00000000c0)={0x23, 0x1f, 0x10000}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x2, 0x80000, 0xc7, &(0x7f0000000080)) dup3(0xffffffffffffffff, r3, 0x0) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x0, 0x9, 0x2, 0x3, 0x20c, 0xff, 0x4, 0xec1, 0x1}, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) tkill(0x0, 0x0) 02:22:06 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCXONC(0xffffffffffffffff, 0x540b, 0x0) lseek(r0, 0x1200, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x40}, 0x41100, 0x40000000, 0x0, 0x0, 0x9}, 0x0, 0x4, 0xffffffffffffffff, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x80082, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x20, 0x0, 0xfffffeff000) fallocate(r2, 0x0, 0x0, 0x10000101) [ 65.812896][ T5036] attempt to access beyond end of device [ 65.812896][ T5036] loop0: rw=0, want=94, limit=87 [ 65.817072][ T5036] attempt to access beyond end of device [ 65.817072][ T5036] loop0: rw=0, want=90, limit=87 [ 65.818779][ T5036] Buffer I/O error on dev loop0, logical block 44, async page read [ 65.826122][ T5036] attempt to access beyond end of device [ 65.826122][ T5036] loop0: rw=0, want=92, limit=87 [ 65.828611][ T5036] Buffer I/O error on dev loop0, logical block 45, async page read [ 65.844875][ T5036] attempt to access beyond end of device [ 65.844875][ T5036] loop0: rw=0, want=94, limit=87 [ 65.846794][ T5036] Buffer I/O error on dev loop0, logical block 46, async page read [ 65.856560][ T5049] ------------[ cut here ]------------ [ 65.857648][ T5049] trying to isolate tail page [ 65.857913][ T5049] WARNING: CPU: 1 PID: 5049 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 65.860204][ T5049] Modules linked in: [ 65.860761][ T5049] CPU: 1 PID: 5049 Comm: syz-executor.5 Not tainted 5.13.0-rc4-syzkaller #0 [ 65.862750][ T5049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 65.864962][ T5049] RIP: 0010:isolate_lru_page+0x360/0x370 [ 65.866047][ T5049] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 8e 1d f2 ff 48 c7 c7 df 20 3b 83 31 c0 e8 b0 57 da ff <0f> 0b e9 01 fd ff ff e8 74 1d f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 65.869443][ T5036] attempt to access beyond end of device [ 65.869443][ T5036] loop0: rw=0, want=90, limit=87 [ 65.869573][ T5049] RSP: 0018:ffffc9000087bb08 EFLAGS: 00010246 [ 65.871440][ T5036] Buffer I/O error on dev loop0, logical block 44, async page read [ 65.872525][ T5049] RAX: cec27d348e7e0300 RBX: 0000000000000001 RCX: 0000000000040000 [ 65.872538][ T5049] RDX: ffffc900077c6000 RSI: 00000000000004ce RDI: 00000000000004cf [ 65.877708][ T5049] RBP: ffffea00041de600 R08: ffffffff8129ab7c R09: 0001c9000087b8b7 [ 65.877980][ T5036] attempt to access beyond end of device [ 65.877980][ T5036] loop0: rw=0, want=92, limit=87 [ 65.879277][ T5049] R10: 0000000000000002 R11: ffff88812cbd3080 R12: ffffea00041de680 [ 65.879290][ T5049] R13: ffff8881077dc050 R14: ffffea00041de688 R15: 000000002000a000 [ 65.881694][ T5036] Buffer I/O error on dev loop0, logical block 45, async page read [ 65.883229][ T5049] FS: 00007fd10152d700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 65.887037][ T5049] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 65.888439][ T5049] CR2: 0000001b32622000 CR3: 0000000107178000 CR4: 00000000001506e0 [ 65.888742][ T5036] attempt to access beyond end of device [ 65.888742][ T5036] loop0: rw=0, want=94, limit=87 [ 65.889790][ T5049] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 65.889803][ T5049] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 65.891798][ T5036] Buffer I/O error on dev loop0, logical block 46, async page read [ 65.893475][ T5049] Call Trace: [ 65.893484][ T5049] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 65.897762][ T5049] ? swapin_walk_pmd_entry+0x320/0x320 [ 65.898529][ T5036] attempt to access beyond end of device [ 65.898529][ T5036] loop0: rw=0, want=90, limit=87 [ 65.898972][ T5049] __walk_page_range+0x93f/0x10e0 [ 65.901099][ T5036] Buffer I/O error on dev loop0, logical block 44, async page read [ 65.902019][ T5049] walk_page_range+0x111/0x2e0 [ 65.904000][ T5049] do_madvise+0x84e/0x1050 [ 65.904781][ T5049] ? __fpregs_load_activate+0x103/0x1b0 [ 65.905486][ T5036] attempt to access beyond end of device [ 65.905486][ T5036] loop0: rw=0, want=92, limit=87 [ 65.906741][ T5049] __x64_sys_madvise+0x5d/0x70 [ 65.908431][ T5036] Buffer I/O error on dev loop0, logical block 45, async page read [ 65.909456][ T5049] do_syscall_64+0x4a/0x90 [ 65.910948][ T5036] attempt to access beyond end of device [ 65.910948][ T5036] loop0: rw=0, want=94, limit=87 [ 65.911720][ T5049] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 65.913533][ T5036] Buffer I/O error on dev loop0, logical block 46, async page read [ 65.915113][ T5049] RIP: 0033:0x4665d9 [ 65.916420][ T5036] Buffer I/O error on dev loop0, logical block 44, async page read [ 65.916909][ T5049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 65.921866][ T5049] RSP: 002b:00007fd10152d188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 65.923249][ T5049] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 65.924641][ T5049] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 65.926081][ T5049] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 65.927726][ T5049] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 65.929165][ T5049] R13: 00007ffe6bd29aaf R14: 00007fd10152d300 R15: 0000000000022000 [ 65.930603][ T5049] ---[ end trace 533130789c2fd103 ]--- [ 65.931753][ T5049] ------------[ cut here ]------------ [ 65.932598][ T5049] trying to isolate tail page [ 65.932740][ T5049] WARNING: CPU: 1 PID: 5049 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 65.935919][ T5049] Modules linked in: [ 65.936759][ T5049] CPU: 1 PID: 5049 Comm: syz-executor.5 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 65.939029][ T5049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 65.940644][ T5049] RIP: 0010:isolate_lru_page+0x360/0x370 [ 65.941945][ T5049] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 8e 1d f2 ff 48 c7 c7 df 20 3b 83 31 c0 e8 b0 57 da ff <0f> 0b e9 01 fd ff ff e8 74 1d f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 65.945338][ T5049] RSP: 0018:ffffc9000087bb08 EFLAGS: 00010246 [ 65.946584][ T5049] RAX: cec27d348e7e0300 RBX: 0000000000000001 RCX: 0000000000040000 [ 65.947888][ T5049] RDX: ffffc900077c6000 RSI: 000000000003ffff RDI: 0000000000040000 [ 65.949114][ T5049] RBP: ffffea00041de600 R08: ffffffff8129ab7c R09: 0001c9000087b8b7 [ 65.950474][ T5049] R10: 0000000000000002 R11: ffff88812cbd3080 R12: ffffea00041de6c0 [ 65.951995][ T5049] R13: ffff8881077dc058 R14: ffffea00041de6c8 R15: 000000002000b000 [ 65.953430][ T5049] FS: 00007fd10152d700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 65.954848][ T5049] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 65.955808][ T5049] CR2: 0000001b32622000 CR3: 0000000107178000 CR4: 00000000001506e0 [ 65.957703][ T5049] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 65.958911][ T5049] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 65.960425][ T5049] Call Trace: [ 65.961201][ T5049] madvise_cold_or_pageout_pte_range+0x4b1/0x690 02:22:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0xffff, 0x8000) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.stat\x00', 0x26e1, 0x0) r3 = syz_open_pts(r0, 0x2) dup2(r0, r3) write$cgroup_type(r2, &(0x7f0000000140), 0xffffff1f) 02:22:06 executing program 3: r0 = io_uring_setup(0x233d, &(0x7f0000000000)) set_mempolicy(0x1, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000b40)=[0xffffffffffffffff], 0x300) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f00000000c0)={0x9, 0x0, &(0x7f0000000080)=[0xffffffffffffffff]}, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80000, 0x150) r1 = io_uring_setup(0x3479, &(0x7f0000000140)={0x0, 0x64df, 0x2, 0x2, 0x2c1, 0x0, r0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x800, 0x120) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r3, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) r4 = signalfd(r0, &(0x7f0000000240)={[0xffffffffffffbb5a]}, 0x8) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f00000002c0)={0x7, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, r2, r3, r2, 0xffffffffffffffff]}, 0x5) r5 = socket$nl_sock_diag(0x10, 0x3, 0x4) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000200)=[r0, r2, r3, r5], 0x4) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) [ 65.962783][ T5049] ? swapin_walk_pmd_entry+0x320/0x320 [ 65.963594][ T5049] __walk_page_range+0x93f/0x10e0 [ 65.964451][ T5049] walk_page_range+0x111/0x2e0 [ 65.965264][ T5049] do_madvise+0x84e/0x1050 [ 65.966205][ T5049] ? __fpregs_load_activate+0x103/0x1b0 [ 65.967326][ T5049] __x64_sys_madvise+0x5d/0x70 [ 65.968360][ T5049] do_syscall_64+0x4a/0x90 [ 65.969301][ T5049] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 65.970451][ T5049] RIP: 0033:0x4665d9 [ 65.971177][ T5049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 65.974275][ T5049] RSP: 002b:00007fd10152d188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 65.976051][ T5049] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 65.977359][ T5049] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 65.978610][ T5049] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 65.980218][ T5049] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 65.981718][ T5049] R13: 00007ffe6bd29aaf R14: 00007fd10152d300 R15: 0000000000022000 [ 65.983204][ T5049] ---[ end trace 533130789c2fd104 ]--- [ 65.990780][ T5051] loop2: detected capacity change from 0 to 16383 02:22:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x101a00, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x5) tkill(r3, 0x36) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) fcntl$setown(r1, 0x8, r3) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000200)={0x3, 0xff, 0x5, 0x7, 0x3, [{0x4, 0xfffffffffffffffc, 0x117, '\x00', 0x15c9}, {0x9, 0x200, 0x0, '\x00', 0x488}, {0x7ff, 0x81, 0x1ff, '\x00', 0x1583}]}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @empty}, 0x2a2}) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @multicast2}, {}, 0xab852ebbeefbd6b9}) 02:22:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x4}, 0x68) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f00000003c0), 0x0) vmsplice(r2, &(0x7f0000000040), 0x0, 0x2) close(r2) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="b80000001900"], 0xb8}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/exe\x00', 0x4000, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, '\x00', 0x40}}, 0xffffffffffffff2c) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000340)=""/114, 0x72}], 0x1, 0x4, 0x0) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) 02:22:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) preadv(r2, &(0x7f0000000680)=[{&(0x7f0000000040)=""/224, 0xe0}, {&(0x7f00000001c0)=""/152, 0x98}, {&(0x7f0000000280)=""/186, 0xba}, {&(0x7f0000000140)=""/16, 0x10}, {&(0x7f0000000340)=""/119, 0x77}, {&(0x7f00000003c0)=""/197, 0xc5}], 0x6, 0x0, 0x5) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newsa={0x144, 0x10, 0x713, 0x0, 0x0, {{@in6=@loopback, @in6=@remote}, {@in=@broadcast, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'cbc(des3_ede)\x00'}}}, @sec_ctx={0xc, 0x8, {0x8}}]}, 0x144}}, 0x0) 02:22:06 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x10200, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:06 executing program 0: io_setup(0x8, &(0x7f00000000c0)=0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e40)=ANY=[], 0x1378) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) ftruncate(r2, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000080)={0x31, 0x1a, 0x10, 0x14, 0x3, 0x0, 0x6, 0x4c}) io_submit(r0, 0x2, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000340)="9b", 0x1}, &(0x7f00000005c0)={0x0, 0x0, 0x2, 0x2, 0x0, r3, 0x0, 0x5900}]) 02:22:06 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0x3f) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f0000000280)=@v3, 0x18, 0x0) r1 = memfd_create(&(0x7f00000002c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q', 0x0) write(r1, &(0x7f0000002000)='/', 0x1) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r1, 0x8008f512, &(0x7f0000000180)) sendfile(r1, r1, &(0x7f0000000200), 0x87) sendfile(r1, r1, &(0x7f00000001c0), 0xfec) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x220c0, 0x25) fcntl$getownex(r2, 0x10, &(0x7f0000000640)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x400, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x9}, 0x10800}, 0x0, 0x1, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r1, 0x0) r3 = syz_open_procfs(0x0, 0x0) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="88fe532350ac085860f89d68a2a6e2a083da131618bf9c5d9f35e7eb77eed9088bd299b383d714f09cbcb305db636416d399c9b0f596fddb3e10a9181e29f759738133c3ef6aaa6b18738e2bcc275a14c4edd998271889b6d338389fd9613a9b510b5b3a8ae013a402ba531d8e4a4011914d2d901d2e968d69cc1bd7ad2b43832e821181bd4622d2d36e9a77fdc3ba"], &(0x7f0000000080)='.', 0x0, 0x5010, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000380)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@uname={'uname', 0x3d, '#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q'}}, {@noextend}, {@msize={'msize', 0x3d, 0xb5}}], [{@fowner_lt={'fowner<', r4}}]}}) write$P9_RREMOVE(r0, &(0x7f0000000200)={0x7}, 0x7) 02:22:06 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x10200, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 66.179422][ T5107] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 02:22:06 executing program 2: r0 = open(&(0x7f0000000100)='./bus\x00', 0x6e842, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) openat$incfs(r1, &(0x7f0000000040)='.pending_reads\x00', 0x200000, 0x112) mmap(&(0x7f0000445000/0x2000)=nil, 0x2000, 0x4, 0x13, r0, 0x2f982000) preadv(r1, &(0x7f0000000540)=[{&(0x7f0000000140)=""/105, 0x69}, {&(0x7f00000001c0)=""/97, 0x61}, {&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f00000000c0)}, {&(0x7f0000000340)=""/3, 0x3}, {&(0x7f0000000380)=""/215, 0xd7}, {&(0x7f0000000480)=""/177, 0xb1}], 0x7, 0xd9f, 0x0) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x5000}], 0x1, 0x600, 0x0, 0x3) fallocate(r0, 0x10, 0x0, 0x2) [ 66.243869][ T5123] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 02:22:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x1, 0x3, 0x0, 0xe000000000000000, r0}) sched_setattr(0x0, 0x0, 0x0) r1 = getpid() ptrace$setsig(0x4203, r1, 0x2, &(0x7f00000000c0)={0x23, 0x1f, 0x10000}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x2, 0x80000, 0xc7, &(0x7f0000000080)) dup3(0xffffffffffffffff, r3, 0x0) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x0, 0x9, 0x2, 0x3, 0x20c, 0xff, 0x4, 0xec1, 0x1}, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) tkill(0x0, 0x0) 02:22:06 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000023c0)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000800)=[{&(0x7f0000000140)=""/88, 0x58}, {&(0x7f00000001c0)=""/21, 0x15}, {&(0x7f0000000200)=""/246, 0xf6}, {&(0x7f0000000300)=""/150, 0x96}, {&(0x7f00000003c0)=""/118, 0x76}, {&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/242, 0xf2}, {&(0x7f00000005c0)=""/242, 0xf2}, {&(0x7f00000006c0)=""/138, 0x8a}, {&(0x7f0000000780)=""/110, 0x6e}], 0xa, &(0x7f00000008c0)=""/191, 0xbf}, 0x8001}, {{&(0x7f0000000980)=@isdn, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000a00)=""/20, 0x14}], 0x1, &(0x7f0000000a80)=""/22, 0x16}, 0x80000000}, {{&(0x7f0000000ac0)=@alg, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000b40)=""/167, 0xa7}, {&(0x7f0000000c00)=""/120, 0x78}, {&(0x7f0000000c80)=""/42, 0x2a}, {&(0x7f0000000cc0)=""/239, 0xef}, {&(0x7f0000000dc0)=""/38, 0x26}, {&(0x7f0000000e00)=""/101, 0x65}, {&(0x7f0000000e80)=""/43, 0x2b}], 0x7, &(0x7f0000000f40)=""/147, 0x93}, 0x9}, {{&(0x7f0000001000)=@rc, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001080)=""/105, 0x69}, {&(0x7f0000001100)=""/58, 0x3a}, {&(0x7f0000001140)=""/71, 0x47}], 0x3, &(0x7f0000001200)=""/216, 0xd8}, 0x9}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001300)=""/35, 0x23}, {&(0x7f0000001340)=""/45, 0x2d}], 0x2, &(0x7f00000013c0)=""/4096, 0x1000}, 0xc18}], 0x5, 0x12087, &(0x7f0000002500)={0x0, 0x3938700}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000002540)='./file0\x00', 0x100) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000040)={0x28, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x2}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x28}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f0000002600)={'ip6_vti0\x00', &(0x7f0000002580)={'ip6tnl0\x00', r5, 0x4, 0x9, 0x0, 0x3, 0x65, @dev={0xfe, 0x80, '\x00', 0x27}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x8000, 0x3, 0x800}}) r6 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r6, r6, &(0x7f0000000000)=0x7, 0x3) 02:22:06 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x10200, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 66.774464][ T5142] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 66.790569][ T5145] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 66.792487][ T5145] PM: suspend entry (deep) [ 66.807664][ T5145] Filesystems sync: 0.014 seconds [ 66.809443][ T5145] Freezing user space processes ... (elapsed 0.001 seconds) done. [ 66.812438][ T5145] OOM killer disabled. [ 66.813303][ T5145] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 66.816324][ T5145] printk: Suspending console(s) (use no_console_suspend to debug) [ 66.859861][ T1820] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 67.389600][ T5145] ACPI: Preparing to enter system sleep state S3 [ 67.389665][ T5145] PM: Saving platform NVS memory [ 67.389669][ T5145] Disabling non-boot CPUs ... [ 67.393744][ T5145] smpboot: CPU 1 is now offline [ 67.396189][ T5145] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 67.396249][ T5145] ACPI: Low-level resume complete [ 67.396318][ T5145] PM: Restoring platform NVS memory [ 67.396347][ T5145] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 67.407018][ T5145] Enabling non-boot CPUs ... [ 67.407198][ T5145] x86: Booting SMP configuration: [ 67.407204][ T5145] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 67.407392][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 67.408360][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 67.409951][ T5145] CPU1 is up [ 67.410158][ T5145] ACPI: Waking up from system sleep state S3 [ 67.519895][ T5145] OOM killer enabled. [ 67.520609][ T5145] Restarting tasks ... done. [ 67.537369][ T5145] PM: suspend exit [ 67.549034][ T5145] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 67.551129][ T5153] PM: suspend entry (deep) 02:22:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x1, 0x3, 0x0, 0xe000000000000000, r0}) sched_setattr(0x0, 0x0, 0x0) r1 = getpid() ptrace$setsig(0x4203, r1, 0x2, &(0x7f00000000c0)={0x23, 0x1f, 0x10000}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x2, 0x80000, 0xc7, &(0x7f0000000080)) dup3(0xffffffffffffffff, r3, 0x0) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x0, 0x9, 0x2, 0x3, 0x20c, 0xff, 0x4, 0xec1, 0x1}, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) tkill(0x0, 0x0) 02:22:07 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r3, &(0x7f0000000140)=[{&(0x7f0000000400)='[', 0x1}], 0x1) io_submit(r1, 0x2, &(0x7f0000000300)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x340f9b17c1ac4fd6, 0x90, r2, &(0x7f0000000080)="376e9660c44efb38597a2b9e6988313b5102050d1e11748693ee9f138a76f384", 0x20, 0x5, 0x0, 0x1}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x8, r2, &(0x7f00000001c0)="b6243d9a35c2ed8ae56623768df521090e5bf562b67db73ef075bbd53377da99c685ee2ee5dbc1b1fee63f40cd634cd500c30917d30452f8d2bc01048c2433754bb45c167b1be8187cde2ce5a8696eeb819daa435560b4dea6f58723b87f59ce14f311499152221ce73095f2317948f8e6717711ed8275b71d185840c7426aac1da457a8f773c02ac78b59b40d3dcaba73b35c2a7ddd1935c33a99d466583d8f20220c447877ebe7dffcfa7e323f99fa8df7eb73dc8972d427a866efe3befae94c183a5cea3f846b0e268228a614dc62d3a6f3ed2a82e5666ad0122c4a25055ebe961065995b216b595a658e408b", 0xee, 0xcd8a, 0x0, 0x1, r3}]) ftruncate(r2, 0x10099b8) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000, 0x2000}]) 02:22:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000001380)=[{&(0x7f0000000380)="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", 0x1fd, 0x3}], 0xc001, &(0x7f0000000180)=ANY=[@ANYBLOB="0023110f764019936a7c8c6d8d06ddf20f3ec984059258bdce5fc6ce85d74339c858f4acb98cb0cc1d6cc9b1ff77b167909b4c836826f75429f3b1413d6428b70e69b3db2917ecb78d9b53fd8ba79dcd7c2106f7e0edc79004e1c6da897d0d559bc8645b"]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000100)={[0x40]}, 0x8) mmap(&(0x7f00000e1000/0x4000)=nil, 0x4000, 0x2, 0x13, r1, 0x3d453000) renameat(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0/file0\x00') 02:22:07 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x10200, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:07 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1800003, 0x12, r1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x10200, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 67.640508][ T5162] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 02:22:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x1, 0x3, 0x0, 0xe000000000000000, r0}) sched_setattr(0x0, 0x0, 0x0) r1 = getpid() ptrace$setsig(0x4203, r1, 0x2, &(0x7f00000000c0)={0x23, 0x1f, 0x10000}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x2, 0x80000, 0xc7, &(0x7f0000000080)) dup3(0xffffffffffffffff, r3, 0x0) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x0, 0x9, 0x2, 0x3, 0x20c, 0xff, 0x4, 0xec1, 0x1}, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) tkill(0x0, 0x0) [ 67.690596][ T5153] Filesystems sync: 0.138 seconds [ 67.708265][ T5153] Freezing user space processes ... [ 67.708679][ T5171] loop2: detected capacity change from 0 to 1 [ 67.712811][ T5153] (elapsed 0.004 seconds) done. [ 67.713725][ T5153] OOM killer disabled. [ 67.714968][ T5153] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 67.717615][ T5153] printk: Suspending console(s) (use no_console_suspend to debug) [ 68.153959][ T1790] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 68.690732][ T5153] ACPI: Preparing to enter system sleep state S3 [ 68.690856][ T5153] PM: Saving platform NVS memory [ 68.690859][ T5153] Disabling non-boot CPUs ... [ 68.694633][ T5153] smpboot: CPU 1 is now offline [ 68.697197][ T5153] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 68.697264][ T5153] ACPI: Low-level resume complete [ 68.697335][ T5153] PM: Restoring platform NVS memory [ 68.697343][ T5153] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 68.708281][ T5153] Enabling non-boot CPUs ... [ 68.708488][ T5153] x86: Booting SMP configuration: [ 68.708491][ T5153] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 68.708657][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 68.709581][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 68.710969][ T5153] CPU1 is up [ 68.711184][ T5153] ACPI: Waking up from system sleep state S3 [ 68.833632][ T5153] OOM killer enabled. [ 68.834619][ T5153] Restarting tasks ... [ 68.843460][ T1035] synth uevent: /devices/virtual/block/loop1: failed to send uevent [ 68.845505][ T1035] block loop1: uevent: failed to send synthetic uevent [ 68.881215][ T5172] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 68.888362][ T5153] done. [ 68.890503][ T5153] PM: suspend exit 02:22:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x16200, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f00000003c0)='./file0\x00', 0x5a014, 0x1, &(0x7f0000000180)=[{&(0x7f0000000040)="eb3d90", 0x3}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="646f733178666c6f7070844100"]) recvmmsg(0xffffffffffffffff, &(0x7f0000001440)=[{{&(0x7f0000000100)=@phonet, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000240)=""/174, 0xae}], 0x1, &(0x7f0000000300)=""/161, 0xa1}, 0x4}, {{&(0x7f0000000400)=@ax25={{0x3, @rose}, [@default, @rose, @netrom, @rose, @remote, @null, @null, @null]}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000480)=""/177, 0xb1}, {&(0x7f0000000540)=""/49, 0x31}], 0x2}, 0x9}, {{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/102, 0x66}, {&(0x7f0000000640)=""/19, 0x13}, {&(0x7f0000000680)=""/101, 0x65}, {&(0x7f0000000700)=""/28, 0x1c}, {&(0x7f0000000740)=""/42, 0x2a}], 0x5, &(0x7f0000000800)=""/33, 0x21}, 0x782c}, {{&(0x7f0000000840)=@sco={0x1f, @none}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000008c0)=""/40, 0x28}, {&(0x7f0000000900)=""/139, 0x8b}, {&(0x7f00000009c0)=""/129, 0x81}, {&(0x7f0000000a80)=""/103, 0x67}, {&(0x7f0000000b00)=""/33, 0x21}], 0x5, &(0x7f0000000bc0)=""/186, 0xba}, 0x9}, {{&(0x7f0000000c80)=@x25={0x9, @remote}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000d00)=""/43, 0x2b}, {&(0x7f0000000d40)=""/11, 0xb}, {&(0x7f0000000d80)=""/71, 0x47}], 0x3, &(0x7f0000000e40)=""/69, 0x45}, 0xea97}, {{&(0x7f0000000ec0)=@caif=@rfm, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000f40)=""/55, 0x37}, {&(0x7f0000000f80)=""/189, 0xbd}, {&(0x7f0000001040)=""/77, 0x4d}, {&(0x7f00000010c0)=""/113, 0x71}, {&(0x7f0000001140)=""/115, 0x73}, {&(0x7f00000011c0)=""/213, 0xd5}, {&(0x7f00000012c0)=""/237, 0xed}], 0x7}, 0x1000}], 0x6, 0x40, &(0x7f00000015c0)={0x77359400}) 02:22:09 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1800003, 0x12, r1, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:09 executing program 4: set_mempolicy(0x1, &(0x7f0000000040)=0x3, 0x9b) r0 = getpgrp(0x0) clone3(&(0x7f0000000300)={0x28200000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) set_mempolicy(0x3, &(0x7f0000000080)=0x3, 0x250) r1 = fork() setpriority(0x0, r1, 0x101) [ 69.138404][ T5193] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 02:22:09 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 69.185192][ T5194] loop3: detected capacity change from 0 to 720 [ 69.191570][ T5171] loop2: detected capacity change from 0 to 1 [ 69.201348][ T5194] FAT-fs (loop3): Unrecognized mount option "dos1xflopp„A" or missing value 02:22:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000001380)=[{&(0x7f0000000380)="e0ee9330761c76694a341794261896e174bd268e56a7d6c7fdabc0de7ad73020588829fed8238d907a2fa7f17e9b611712a1b1f412e7940564b7c2d1d4440b151760a1ef65e4cb8f9fdb7d6bf7a3968a7ed59e9747982422e36606bbfb7f5926d0e5496bb5bb93a0c5e34480159e202010eeec6408760164df5f627ed8badf8e56dd09d496b0f7f72170b8e9407b2d61c670fb2045ab7524d6b86e0919b69d5171dcc56f00116c795a1e9717c292a8607f86e16da3c71a14a6f843a9a3c6d9f41303d0ad9dbb6dd9ea42c258acbd368be563715f43f03fe3f85cea4aa7960881eee789927fec227cd781948a55e56a252b6874fde8266fac2ac57c1eeb5ef6781c6a02df60c84b980102a7052be49a875bb218b3b4c3c0558d0e567ea41a53c7752e8d9dd801754f877b747e45e27bfb20593ecec6745ddb6d340acacd6d26a4f8af99fe6a8265cb371f1af2f331d92d0e9b2cb6512547cce60e164cbe7dbc88c8e9927a503511f7d16959ef94674582c31ad946d4e760c256770c35119109c6b8b5a03e3f94a58106ebbe9286f9feda08fbcf50f0392d4049948578f4a50284d7158faf570afc3ae2b124ea06d2264cae49a4bf044579a0dc57bb5d862b840a466253928296471314115d5bdfa1b63c44553913ea1db92eef07ff69b693af47c94b55fb58ab6b056296e0a6067e9aff86549d2602eb2d9ab998733b99", 0x1fd, 0x3}], 0xc001, &(0x7f0000000180)=ANY=[@ANYBLOB="0023110f764019936a7c8c6d8d06ddf20f3ec984059258bdce5fc6ce85d74339c858f4acb98cb0cc1d6cc9b1ff77b167909b4c836826f75429f3b1413d6428b70e69b3db2917ecb78d9b53fd8ba79dcd7c2106f7e0edc79004e1c6da897d0d559bc8645b"]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000100)={[0x40]}, 0x8) mmap(&(0x7f00000e1000/0x4000)=nil, 0x4000, 0x2, 0x13, r1, 0x3d453000) renameat(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0/file0\x00') 02:22:09 executing program 4: set_mempolicy(0x1, &(0x7f0000000040)=0x3, 0x9b) r0 = getpgrp(0x0) clone3(&(0x7f0000000300)={0x28200000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) set_mempolicy(0x3, &(0x7f0000000080)=0x3, 0x250) r1 = fork() setpriority(0x0, r1, 0x101) 02:22:09 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1800003, 0x12, r1, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:09 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1800003, 0x12, r1, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 69.294566][ T5205] loop3: detected capacity change from 0 to 720 [ 69.298107][ T5205] FAT-fs (loop3): Unrecognized mount option "dos1xflopp„A" or missing value [ 69.317516][ T5216] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 69.334551][ T5220] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 02:22:09 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:09 executing program 3: sysfs$3(0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) pwrite64(r1, &(0x7f00000002c0)='_', 0x1, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x401, 0x200) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r4, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x7, 0x6, 0x7fffffff, 0x4}) 02:22:09 executing program 2: creat(&(0x7f00000000c0)='./bus\x00', 0x1b) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r2, 0x6c7b2000) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r3, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r6, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000500)={0x2, {{0x2, 0x0, @multicast2}}, 0x1, 0x2, [{{0x2, 0x0, @empty}}, {{0x2, 0x0, @empty}}]}, 0x190) close_range(r5, r6, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f00000002c0)) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0xfffffd28) [ 69.353879][ T5227] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 69.366622][ T5223] loop2: detected capacity change from 0 to 1 02:22:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f00fdfdffff00000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x1c, 0x800) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)) chdir(&(0x7f0000000140)='./file0\x00') 02:22:09 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1800003, 0x12, r1, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:09 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:09 executing program 4: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000140)=0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@ipv4={""/10, ""/2, @loopback}}}, {{@in6=@empty}, 0x0, @in6=@private1}}, &(0x7f0000000180)=0xe8) getuid() syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000000)={[], [{@smackfsroot={'smackfsroot', 0x3d, 'ext3\x00'}}, {@context={'context', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'root'}}]}) 02:22:09 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x10, 0x8003, 0x8020001) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b) fdatasync(r2) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/3, 0x3}, {&(0x7f0000000340)=""/106, 0x6a}, {&(0x7f00000003c0)=""/109, 0x6d}], 0x3, 0x401, 0x7) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$RTC_EPOCH_SET(r4, 0x4008700e, 0x8) sendmsg$IPSET_CMD_TYPE(r1, &(0x7f0000000500)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)={0xa8, 0xd, 0x6, 0x3, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20}, 0x40000) fgetxattr(r0, &(0x7f0000000000)=@known='user.incfs.size\x00', &(0x7f00000000c0)=""/99, 0x63) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x3, 0x0, 0x9}) 02:22:09 executing program 3: sysfs$3(0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) pwrite64(r1, &(0x7f00000002c0)='_', 0x1, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x401, 0x200) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r4, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x7, 0x6, 0x7fffffff, 0x4}) 02:22:09 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:09 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:09 executing program 2: r0 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r0) perf_event_open(&(0x7f00000000c0)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc00000, 0x81}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(&(0x7f0000000340)='eth0\x00') mq_unlink(&(0x7f0000000000)=',\x00') 02:22:09 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 69.719804][ T5260] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 69.730933][ T5265] loop1: detected capacity change from 0 to 1051 [ 69.772734][ T5265] EXT4-fs (loop1): bad geometry: first data block 65535 is beyond end of filesystem (512) 02:22:09 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f0000190000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r4, 0x0) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r5, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r5, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) setsockopt$sock_int(r3, 0x1, 0x20, &(0x7f0000000180)=0xfff, 0x4) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r5, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e20, 0xfffffffc, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3ff}, 0x1c) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r6, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r6, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r6, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000240)={@empty, 0x2e7, 0x2, 0xa5b0a175c9415c0b, 0x5, 0x2}, &(0x7f0000000280)=0x20) socket$inet6(0xa, 0x1, 0x101) 02:22:10 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) preadv(r1, &(0x7f0000002280)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/1, 0x1}, {&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f0000002080)=""/28, 0x1c}, {&(0x7f00000020c0)=""/115, 0x73}, {&(0x7f0000002140)=""/232, 0xe8}, {&(0x7f0000002240)=""/35, 0x23}], 0x7, 0x8001, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = getpid() fork() setpriority(0x1, r2, 0x0) 02:22:10 executing program 5: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:10 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:10 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) syz_io_uring_complete(0x0) r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fremovexattr(r0, &(0x7f0000000000)=@random={'trusted.', '\x00\x00\x00\x00\x00\x00\xfa\x9e\xe7\x1e\x99<\xe6fs\x19\x8bD\xc4\xe9\x87\xe6\'H\x19\xe7m\x12K\x91\f\xc6r\xb7e\x92\xdf<\xfc\xe0L5#X\xb4\x9d\xa4\x9830\xad\xe4^T\v\xbc\xbb\xb1\x95(\xc9\xad\xa3\x882dge\xbb|\xd1I\xd9\xb8\xba\xfe\xb9b\xd3\xca\x90j\xe7\x15\x83\x9b\"\xcd\x17\xdc\x0e\\M\xff@\x06\x97'}) 02:22:10 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 69.922269][ T25] audit: type=1400 audit(1622946130.061:15): avc: denied { setattr } for pid=5313 comm="syz-executor.2" name="current" dev="proc" ino=16125 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1 02:22:10 executing program 3: sysfs$3(0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) pwrite64(r1, &(0x7f00000002c0)='_', 0x1, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x401, 0x200) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r4, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x7, 0x6, 0x7fffffff, 0x4}) 02:22:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000009200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)=ANY=[@ANYBLOB="240000002c000100000000000000000004000080040000000c00008005000000030000000b61caa7668e1c51ea5d09ccf76ba21a63b86319d6224c307fb9381eece54f82993328fec86d61fd2504c8449a3b51dd9c222f45ad3dbb04d2ada2205f87c55b85802e765fe80d821ca6bfbe3d6f05e08a97bfb6dd52cc8c97ff5bdbc69e47e9355333d86192c1e276e1ba7ed15353cde3badc3d8cd010f4f0e64f43884a37fca7ac2e5f140662b29902b77df055bca23cb2e227e31295425c57c3034275e4cbad46bb4421ddaf0a9a9e67ef79e40eca0e5a1c773a101abdc670d389d97f66b983dd7ea930af09ca"], 0x24}], 0x1}, 0x0) write$binfmt_misc(r2, &(0x7f00000001c0)=ANY=[], 0x1000000c8) splice(r1, 0x0, r3, 0x0, 0x10014, 0x0) 02:22:10 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000080)) creat(&(0x7f00000004c0)='./file0\x00', 0x40) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f00000002c0)=""/34, 0x22}], 0x2, &(0x7f0000000340)=""/241, 0xf1}, 0x40000000) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) socket(0x6, 0x0, 0x20) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) accept(r2, 0x0, &(0x7f0000000480)=0x26) chdir(&(0x7f0000000080)='./file0\x00') open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x40) 02:22:10 executing program 1: r0 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1fd, &(0x7f0000000400)=0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x7e00, 0x8000001}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000002c0)="da455864eeb9167c1ec76189e57e50c68e739ea84e4043521453c701ff8f874b7856a5a7434f6091814e0c7f4f80d24902643c3d4076752752ef6d2b215fa2a85b69f7e26f3abbc9a62fa52d09fd1f96d8ef9bb84710faa5b92bf6c168c6c46c66ee6c8e3fe567dd749027291261984989f79cee47a0d6f29044bbb70ef418a052f1dfe9aab165af7d3b7f7cd5e21cd5b2b3e62b7223290a2aaa95a4045fc2e6247ff36502396ca21c18a60fe6f4699dc563d8b40c84269a24486af086b392ce38e2c573d683282f3a9a345c8dcc7483eda3a26183108d8b16b0c4c651625c833462f9b5ad5e6b276ef0f6b2dadc5e48bc2f736a1e97e4496b770d515271e0c1a32713988e3e6086ca4694973913d27316b6e1d324b155314b217f991a23e3c04cdc00b1e6bf2a912d88", 0xa9f9, 0x7}]) sendfile(r0, r0, 0x0, 0x8080ffffff82) 02:22:10 executing program 5: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:10 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:10 executing program 0: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:10 executing program 5: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@loopback}, {@in6=@private1}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xf0}, 0x1, 0x1400000000000000}, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{}, {}, {0x0, 0x0, 0x0, 0x6}]}) setsockopt(r0, 0x0, 0x40, &(0x7f0000000040), 0x0) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) listen(r2, 0x81) [ 70.082084][ T5348] hugetlbfs: Unknown parameter './file0' 02:22:10 executing program 0: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:10 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:10 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="4d17f2ff5ee8d36cc41984bfb64d9064a402adca7461765e90ab26ab5ea1cc45710f6ccbb67b1fb4e3bdea03fb42ed29a083b781f6e84a8f1f7462700afb365bb6892fe3405abef845d410634c", 0x4d, 0x9e}], 0x0, &(0x7f00000000c0)) openat(r0, &(0x7f0000000040)='./file0\x00', 0xa0002, 0x0) [ 70.143394][ T5362] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=36168 sclass=netlink_route_socket pid=5362 comm=syz-executor.4 02:22:10 executing program 3: sysfs$3(0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) pwrite64(r1, &(0x7f00000002c0)='_', 0x1, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x401, 0x200) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r4, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x7, 0x6, 0x7fffffff, 0x4}) 02:22:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x18, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:11 executing program 0: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:11 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:11 executing program 2: pipe(&(0x7f00000006c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x260f00, 0x0) preadv(r0, &(0x7f0000000640)=[{&(0x7f0000000780)=""/190, 0xbe}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000002c0)=""/9, 0x9}, {&(0x7f00000004c0)=""/105, 0x69}, {&(0x7f0000000540)=""/10, 0xa}, {&(0x7f0000000580)=""/182, 0xb6}], 0x6, 0x80000000, 0x10001) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r3 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r3, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="6e02000000c4b0a850", @ANYRES64=r3, @ANYBLOB="2c756e616d653dc22c00"]) preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000180)=""/219, 0xdb}], 0x1, 0x9, 0x3) 02:22:11 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="e8d00f00", @ANYRES16=0x0, @ANYBLOB="000002fa365b348c936198a1644d15dbb9a144acbfef0576b2633271a3d399340898543b5dca393ee7fb3bf077953386ef7f7249041d"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) tkill(r0, 0x21) r2 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x8, 0x7, &(0x7f0000000640)=[{&(0x7f0000000180)="a598e3", 0x3, 0x985}, {&(0x7f0000000240)="c403be117557a7cb255c05740cc61810504c775e3c7c4a504def26252f9951d1f9c30e03dbeaab88b068", 0x2a, 0x101}, {&(0x7f0000000280)="c7e8c705c8d75b5628c2a8cec55fcc9bda72b7f2af858f35b231974af52bf3cf2086588aa371bcf05333df5d1634032ac86c19ad0568bc92c33d9f5cf0f52efddaec6e07bb9a728495d03e21c8fcd6e6cf9225cf513061675c72cb2cbd5ab13b8ab0f81654bcf191066d944dd9e05a3cd64746dbbdc4fe7904430ad986970b8281115ca353f139fd34fd7bbb525ec187cbbf2b51efd40f2095cb5f7a3fcd31c6adf836bbc0f494a845c7ea2b130c185e9077ee8b757b12ac2c64e4ec60e2e8cbcca30bc4e33d6f0d348e4ace08a490473b6d864d81360622c72b110ae7ff663cfbf5feddffdf9f563bf5cc4c26ec6e", 0xef, 0x778}, {&(0x7f00000003c0)="c565f48ef94f1f0db9b54c938d78b898f590458af8eefda5e0653dca9fc7ff4604c8b4a1363becf4c57d6fe780dfe7d69f5e485f3b0bacc31631ec25dd52150656a7d11d4f3fd02b5146074a7f85af37375162454611523edc5751aad984d7d501a838e0", 0x64, 0x7f}, {&(0x7f0000000440)="956a5b47455f93f3b8c72d998359e6630afda7dd9363fe15bc111ef5dbfe269a3b31796c27e2cfa7661dcaf5047082adbf", 0x31, 0x5}, {&(0x7f0000000480)="127fea7ecf45e116fec972e319776d3e2b19991abc4f3f80aae138a96bedd9dd817ad4ee079ab120dab37872d6f4582c9863ea8187c8afe738b1fa5e2ece868a9a7991ca8cfab0f240015822e19a3acb40c0fbf43ad2ee622cb68e9853157431b47d1a1e6a5bd28f26e691eecf2ac1b0ae5ca84c773876343d4813429cb734edfc9396", 0x83, 0x4100eb0a}, {&(0x7f0000000540)="79a5f44d614c6d4994438553f49db76e99acb369e93f618139150377459fa778cae05d42ab15fccfb8b246359af1176b5f1736d93b06e120280530ad9a7dcf6d97ac40421be453ddea5167489cf2913b8a87c2d84e852327cba3535d30863aa998023f847d37a3e167e22cff6e19c918d8fda4410939fcc00bf53154bfae985148726ae2120f4e2075427d5a3c3d0fd6d21f7ab5c99231110b3111b14ecdf745ce331a57c11bcac55eaf9adff7824c5c8b64ae1a754724dab9e8e46daf7619812d47126638bd1c7ccfbf12d6cdb89d21676b91eeb931affbc7820a717d79c467218d8f45f408a9dfd7e53b534b75db300caa7c", 0xf3}], 0x20040, &(0x7f0000000700)={[{'}.}@\xf3'}], [{@dont_measure}, {@obj_user={'obj_user', 0x3d, '-,/'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000740)) 02:22:11 executing program 3: creat(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="636f6e346578743d0019321b3f2c7c165e51e5cd4ae2744619b38c7173464a920a97889513f5711c6c616b134ed9d98fc0"]) 02:22:11 executing program 3: r0 = clone3(&(0x7f00000002c0)={0x183160000, 0x0, 0x0, &(0x7f0000000100)=0x0, {}, &(0x7f0000000280)=""/29, 0x1d, 0x0, 0x0}, 0xffffff57) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)=0x0) r3 = getpgid(r1) r4 = getpid() r5 = gettid() ptrace$setopts(0x4206, 0x0, 0x0, 0x5) tkill(r5, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) r6 = gettid() ptrace$setregs(0xd, r6, 0x3, &(0x7f00000013c0)="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") ptrace$setregs(0xffffffffffffffff, r5, 0x7fffffff, &(0x7f0000000080)) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x5) tkill(r7, 0x36) ptrace$cont(0x18, r7, 0x0, 0x0) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) r8 = openat(0xffffffffffffff9c, &(0x7f00000023c0)='./file0\x00', 0x400400, 0x120) tkill(0xffffffffffffffff, 0x11) clone3(&(0x7f0000001340)={0xd0020e00, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x21}, &(0x7f0000000340)=""/4096, 0x1000, &(0x7f0000000180)=""/87, &(0x7f0000000240)=[r1, r2, r1, r3, r4, r1, r5, r7], 0x8, {r8}}, 0x58) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 02:22:11 executing program 0: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) write(r2, &(0x7f00000001c0)="8cdaa195b232ab8595b227b5d61363d17b974c8f984399ad56a10c432c1c16779d9cf09e84746af27466802c65b8a372caa172b8605847990d135283a4fbdb6d3da22ae653b6475f6d577563ceb00549f34268b4af4c8140900849f731853cf4cb03248c216bcf0065f5715cf6bd67086ff16a4123be6266758f9ec48c1bb569f762b7c76a7f87298668f676f00b46c4786d95054e00bb4fba97b920d68b93a19a28fb91d983ef89", 0xa8) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r3, r3, &(0x7f0000000000)=0x7, 0x3) 02:22:11 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="390000006400034700bb65e1c3e4ffff06000000010200004500000025000000190013c00003000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101801, 0x60) [ 70.912168][ T5395] loop4: detected capacity change from 0 to 1051 [ 70.914300][ T5395] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 70.915898][ T5395] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 70.921102][ T5404] tmpfs: Unknown parameter 'con4ext' [ 70.938077][ T5395] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 70.940450][ T5395] EXT4-fs (loop4): get root inode failed [ 70.941509][ T5395] EXT4-fs (loop4): mount failed [ 70.943194][ T5410] 9pnet: Insufficient options for proto=fd [ 70.958772][ T5410] 9pnet: Insufficient options for proto=fd [ 70.999025][ T5423] loop4: detected capacity change from 0 to 1051 [ 71.001124][ T5423] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 71.005476][ T5423] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 71.012853][ T5423] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 71.012996][ T5426] PM: suspend entry (deep) [ 71.015235][ T5423] EXT4-fs (loop4): get root inode failed [ 71.016861][ T5423] EXT4-fs (loop4): mount failed [ 71.022852][ T5426] Filesystems sync: 0.006 seconds [ 71.024296][ T5426] Freezing user space processes ... (elapsed 0.029 seconds) done. [ 71.055415][ T5426] OOM killer disabled. [ 71.056025][ T5426] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 71.058711][ T5426] printk: Suspending console(s) (use no_console_suspend to debug) 02:22:11 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f0000004ac0)={0x0, 0x0, 0x2, 0x4}, &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0xe) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r5, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) recvmmsg(r5, &(0x7f0000004a00)=[{{&(0x7f0000000240)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f0000000440)=""/112, 0x70}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/72, 0x48}, {&(0x7f0000001540)=""/127, 0x7f}, {&(0x7f00000015c0)=""/115, 0x73}, {&(0x7f0000000000)=""/29, 0x1d}], 0x7, &(0x7f00000016c0)=""/4096, 0x1000}, 0x2}, {{&(0x7f00000026c0)=@alg, 0x80, &(0x7f0000004900)=[{&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/42, 0x2a}, {&(0x7f0000003740)=""/183, 0xb7}, {&(0x7f0000003800)=""/124, 0x7c}, {&(0x7f0000003880)=""/4096, 0x1000}, {&(0x7f0000004880)=""/29, 0x1d}, {&(0x7f00000048c0)=""/25, 0x19}], 0x7, &(0x7f0000004980)=""/104, 0x68}, 0x3ff}], 0x2, 0x10000, &(0x7f0000004a80)={0x77359400}) write$binfmt_misc(r4, 0x0, 0x0) 02:22:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x18, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:11 executing program 0: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:22:11 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) [ 71.097295][ T4987] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 71.627008][ T5426] ACPI: Preparing to enter system sleep state S3 [ 71.627133][ T5426] PM: Saving platform NVS memory [ 71.627179][ T5426] Disabling non-boot CPUs ... [ 71.630581][ T5426] smpboot: CPU 1 is now offline [ 71.633309][ T5426] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 71.633368][ T5426] ACPI: Low-level resume complete [ 71.633437][ T5426] PM: Restoring platform NVS memory [ 71.633445][ T5426] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 71.643767][ T5426] Enabling non-boot CPUs ... [ 71.644020][ T5426] x86: Booting SMP configuration: [ 71.644023][ T5426] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 71.644191][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 71.645240][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 71.646504][ T5426] CPU1 is up [ 71.646689][ T5426] ACPI: Waking up from system sleep state S3 [ 71.765790][ T5426] OOM killer enabled. [ 71.766379][ T5426] Restarting tasks ... done. [ 71.767462][ T5426] PM: suspend exit 02:22:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x20080, 0x62) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="73797a312a10cf7db03b03c608a0d0ce3bfa28ea1efa1503a7268b101fed800efc353f7ac5f71477ee744505ce8aa74f438cb973a40ffd4e7201eb7fd323cb5e44ccb5cc2cf01c8b74998c6711a2eeffdd9c4ffbf13afea149eabfe10597883270e5b7334eaefddf3900da97b264d15c895a8fdb"], 0x59) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) write(r2, &(0x7f00000001c0)="8cdaa195b232ab8595b227b5d61363d17b974c8f984399ad56a10c432c1c16779d9cf09e84746af27466802c65b8a372caa172b8605847990d135283a4fbdb6d3da22ae653b6475f6d577563ceb00549f34268b4af4c8140900849f731853cf4cb03248c216bcf0065f5715cf6bd67086ff16a4123be6266758f9ec48c1bb569f762b7c76a7f87298668f676f00b46c4786d95054e00bb4fba97b920d68b93a19a28fb91d983ef89", 0xa8) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r3, r3, &(0x7f0000000000)=0x7, 0x3) [ 71.802967][ T5428] __nla_validate_parse: 4 callbacks suppressed [ 71.802980][ T5428] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.2'. 02:22:12 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) 02:22:12 executing program 0: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 71.849368][ T5447] loop4: detected capacity change from 0 to 1051 [ 71.851447][ T5447] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 71.853268][ T5447] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 71.875613][ T5447] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 71.878053][ T5447] EXT4-fs (loop4): get root inode failed [ 71.878926][ T5447] EXT4-fs (loop4): mount failed [ 71.886622][ T5466] PM: suspend entry (deep) [ 71.897008][ T5466] Filesystems sync: 0.009 seconds [ 71.898218][ T5466] Freezing user space processes ... (elapsed 0.042 seconds) done. [ 71.943091][ T5466] OOM killer disabled. [ 71.943912][ T5466] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 71.946558][ T5466] printk: Suspending console(s) (use no_console_suspend to debug) 02:22:13 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) 02:22:13 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) 02:22:13 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x20080, 0x62) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="73797a312a10cf7db03b03c608a0d0ce3bfa28ea1efa1503a7268b101fed800efc353f7ac5f71477ee744505ce8aa74f438cb973a40ffd4e7201eb7fd323cb5e44ccb5cc2cf01c8b74998c6711a2eeffdd9c4ffbf13afea149eabfe10597883270e5b7334eaefddf3900da97b264d15c895a8fdb"], 0x59) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:13 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x18, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 72.139574][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 72.682054][ T5466] ACPI: Preparing to enter system sleep state S3 [ 72.682200][ T5466] PM: Saving platform NVS memory [ 72.682204][ T5466] Disabling non-boot CPUs ... [ 72.686088][ T5466] smpboot: CPU 1 is now offline [ 72.688642][ T5466] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 72.688708][ T5466] ACPI: Low-level resume complete [ 72.688776][ T5466] PM: Restoring platform NVS memory [ 72.688783][ T5466] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 72.699560][ T5466] Enabling non-boot CPUs ... [ 72.699804][ T5466] x86: Booting SMP configuration: [ 72.699837][ T5466] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 72.699995][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 72.701053][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 72.702754][ T5466] CPU1 is up [ 72.702970][ T5466] ACPI: Waking up from system sleep state S3 [ 72.842782][ T5466] OOM killer enabled. [ 72.843782][ T5466] Restarting tasks ... done. [ 72.845052][ T5466] PM: suspend exit 02:22:13 executing program 3: ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f513, &(0x7f0000000040)) r0 = syz_io_uring_setup(0x2462, &(0x7f0000000580)={0x0, 0x2, 0x0, 0x0, 0x280}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00005ea000/0x4000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000240)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x22, &(0x7f0000001040)=0x40, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, r3}, 0x1) recvmmsg(r3, &(0x7f0000000f40)=[{{&(0x7f0000000280)=@phonet, 0x80, &(0x7f0000000080)=[{&(0x7f0000000300)=""/226, 0xe2}, {&(0x7f0000000400)=""/72, 0x48}, {&(0x7f0000000480)=""/69, 0x45}], 0x3, &(0x7f0000000600)=""/246, 0xf6}, 0x9}, {{&(0x7f0000000700)=@nfc_llcp, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000200)=""/4, 0x4}, {&(0x7f0000000780)=""/96, 0x60}, {&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000008c0)=""/172, 0xac}, {&(0x7f0000000980)=""/1, 0x1}, {&(0x7f00000009c0)=""/224, 0xe0}], 0x6, &(0x7f0000000b40)=""/9, 0x9}, 0x7}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000b80)=""/111, 0x6f}], 0x1}, 0x7ff}, {{&(0x7f0000000c40)=@isdn, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000cc0)=""/21, 0x15}, {&(0x7f0000000d00)=""/142, 0x8e}, {&(0x7f0000000dc0)=""/42, 0x2a}, {&(0x7f0000000e00)=""/218, 0xda}], 0x4}, 0x4}], 0x4, 0x60, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000500)=@in6={0xa, 0x0, 0x0, @empty}}, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, 0x0, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00005ea000/0x1000)=nil, 0x1000, 0xc, 0x2010, r0, 0x10000000) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x0, {0x0, r5}}, 0x10001) r6 = syz_io_uring_complete(r1) io_uring_enter(r6, 0x224f, 0x82d7, 0x0, &(0x7f0000001080)={[0xffffffff80000000]}, 0x8) r7 = syz_open_dev$sg(&(0x7f0000000140), 0x5, 0x240c00) ioctl$F2FS_IOC_GARBAGE_COLLECT(r7, 0x4004f506, &(0x7f0000000180)=0x1) io_uring_enter(r0, 0x266f, 0x0, 0x0, 0x0, 0x0) 02:22:13 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) 02:22:13 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 02:22:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) write(r2, &(0x7f00000001c0)="8cdaa195b232ab8595b227b5d61363d17b974c8f984399ad56a10c432c1c16779d9cf09e84746af27466802c65b8a372caa172b8605847990d135283a4fbdb6d3da22ae653b6475f6d577563ceb00549f34268b4af4c8140900849f731853cf4cb03248c216bcf0065f5715cf6bd67086ff16a4123be6266758f9ec48c1bb569f762b7c76a7f87298668f676f00b46c4786d95054e00bb4fba97b920d68b93a19a28fb91d983ef89", 0xa8) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r3, r3, &(0x7f0000000000)=0x7, 0x3) 02:22:13 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x20080, 0x62) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="73797a312a10cf7db03b03c608a0d0ce3bfa28ea1efa1503a7268b101fed800efc353f7ac5f71477ee744505ce8aa74f438cb973a40ffd4e7201eb7fd323cb5e44ccb5cc2cf01c8b74998c6711a2eeffdd9c4ffbf13afea149eabfe10597883270e5b7334eaefddf3900da97b264d15c895a8fdb"], 0x59) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:13 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x18, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 72.910045][ T5489] loop4: detected capacity change from 0 to 1051 [ 72.912662][ T5489] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 72.916559][ T5489] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 72.940238][ T5489] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 72.943053][ T5489] EXT4-fs (loop4): get root inode failed [ 72.944093][ T5489] EXT4-fs (loop4): mount failed 02:22:13 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) 02:22:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x101) close(r1) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000840)=[&(0x7f0000000d40)='gcB\xc6+\xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9=?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<\\C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xae\xa0\"(\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95h\xd7PN\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa7\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6z\x00!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x19f\xd3\t\xf8\x96\'\x8c{\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xca\xc2-\xfc\xe8\xc3qAt\b\x94\xee\x9e4\x85\xd0\xfe+\xc0\x17\xbfE\x15\xfdZ\xce\x954v\x8a\xfb\xde\xaal\xf4\x82\xe2?\xabS\xe4\xe2\xe1\xd83\x17\xfe\xf8~\x04\xb6\x11\xc4K3\x82\x127\xf7\xc7\x06\x177\x8bWF\xb21\xce\xc7\x19|\x9f\xe87\x80\xbc\xac\xb6;\xcc\xafr\xbd\x90\xde9\x0e\xda\x05\x86\xf0i\xf4{\xbf\x82#\xfd9\xdc\xa7\x01\x00\x12\xea1K\xc9\xe1\xfdv#0U\xd2\t\x14\x10\xe6\xfc\xba\xa1\xac=\xfd\xd7\xc5\xff\x18\x00\x00\x00', &(0x7f00000021c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`\xe2qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00'/1160]) [ 73.018084][ T5512] loop4: detected capacity change from 0 to 1051 [ 73.021636][ T5512] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 73.023228][ T5512] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 73.024451][ T5508] PM: suspend entry (deep) [ 73.028955][ T5512] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 73.031319][ T5512] EXT4-fs (loop4): get root inode failed [ 73.032396][ T5512] EXT4-fs (loop4): mount failed [ 73.062871][ T5508] Filesystems sync: 0.036 seconds [ 73.064292][ T5508] Freezing user space processes ... (elapsed 0.003 seconds) done. [ 73.069361][ T5508] OOM killer disabled. [ 73.070128][ T5508] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 73.073055][ T5508] printk: Suspending console(s) (use no_console_suspend to debug) 02:22:14 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 02:22:14 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 02:22:14 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x20080, 0x62) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="73797a312a10cf7db03b03c608a0d0ce3bfa28ea1efa1503a7268b101fed800efc353f7ac5f71477ee744505ce8aa74f438cb973a40ffd4e7201eb7fd323cb5e44ccb5cc2cf01c8b74998c6711a2eeffdd9c4ffbf13afea149eabfe10597883270e5b7334eaefddf3900da97b264d15c895a8fdb"], 0x59) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:14 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 73.232283][ T1790] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 73.773212][ T5508] ACPI: Preparing to enter system sleep state S3 [ 73.773347][ T5508] PM: Saving platform NVS memory [ 73.773351][ T5508] Disabling non-boot CPUs ... [ 73.777128][ T5508] smpboot: CPU 1 is now offline [ 73.779691][ T5508] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 73.779757][ T5508] ACPI: Low-level resume complete [ 73.779833][ T5508] PM: Restoring platform NVS memory [ 73.779841][ T5508] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 73.792026][ T5508] Enabling non-boot CPUs ... [ 73.792254][ T5508] x86: Booting SMP configuration: [ 73.792257][ T5508] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 73.792419][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 73.793323][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 73.795003][ T5508] CPU1 is up [ 73.795158][ T5508] ACPI: Waking up from system sleep state S3 [ 73.924618][ T5508] OOM killer enabled. [ 73.925561][ T5508] Restarting tasks ... done. [ 73.926552][ T5508] PM: suspend exit 02:22:14 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 02:22:14 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 02:22:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) write(r2, &(0x7f00000001c0)="8cdaa195b232ab8595b227b5d61363d17b974c8f984399ad56a10c432c1c16779d9cf09e84746af27466802c65b8a372caa172b8605847990d135283a4fbdb6d3da22ae653b6475f6d577563ceb00549f34268b4af4c8140900849f731853cf4cb03248c216bcf0065f5715cf6bd67086ff16a4123be6266758f9ec48c1bb569f762b7c76a7f87298668f676f00b46c4786d95054e00bb4fba97b920d68b93a19a28fb91d983ef89", 0xa8) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r3, r3, &(0x7f0000000000)=0x7, 0x3) 02:22:14 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 02:22:14 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 02:22:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mmap(&(0x7f00007e3000/0x8000)=nil, 0x8000, 0x300000c, 0x20010, r0, 0xef9a9000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='nogrpid,barrier,nogrpid,nomblk_io_submit,norecovery']) [ 73.986140][ T5535] loop4: detected capacity change from 0 to 1051 [ 73.989710][ T5535] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 74.023244][ T5535] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) 02:22:14 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x20080, 0x62) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="73797a312a10cf7db03b03c608a0d0ce3bfa28ea1efa1503a7268b101fed800efc353f7ac5f71477ee744505ce8aa74f438cb973a40ffd4e7201eb7fd323cb5e44ccb5cc2cf01c8b74998c6711a2eeffdd9c4ffbf13afea149eabfe10597883270e5b7334eaefddf3900da97b264d15c895a8fdb"], 0x59) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) [ 74.036003][ T5535] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 74.038586][ T5535] EXT4-fs (loop4): get root inode failed [ 74.039487][ T5535] EXT4-fs (loop4): mount failed [ 74.059124][ T5552] PM: suspend entry (deep) [ 74.066605][ T5552] Filesystems sync: 0.006 seconds [ 74.067900][ T5552] Freezing user space processes ... (elapsed 0.036 seconds) done. [ 74.105782][ T5552] OOM killer disabled. [ 74.106602][ T5552] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 74.109984][ T5552] printk: Suspending console(s) (use no_console_suspend to debug) 02:22:15 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) [ 74.306269][ T4987] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 74.851827][ T5552] ACPI: Preparing to enter system sleep state S3 [ 74.851891][ T5552] PM: Saving platform NVS memory [ 74.851895][ T5552] Disabling non-boot CPUs ... [ 74.855733][ T5552] smpboot: CPU 1 is now offline [ 74.858154][ T5552] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 74.858227][ T5552] ACPI: Low-level resume complete [ 74.858294][ T5552] PM: Restoring platform NVS memory [ 74.858301][ T5552] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 74.870086][ T5552] Enabling non-boot CPUs ... [ 74.870262][ T5552] x86: Booting SMP configuration: [ 74.870264][ T5552] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 74.870481][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 74.871404][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 74.872808][ T5552] CPU1 is up [ 74.873003][ T5552] ACPI: Waking up from system sleep state S3 [ 75.007593][ T5552] OOM killer enabled. [ 75.008160][ T5552] Restarting tasks ... done. [ 75.009733][ T5552] PM: suspend exit 02:22:15 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) write(r2, &(0x7f00000001c0)="8cdaa195b232ab8595b227b5d61363d17b974c8f984399ad56a10c432c1c16779d9cf09e84746af27466802c65b8a372caa172b8605847990d135283a4fbdb6d3da22ae653b6475f6d577563ceb00549f34268b4af4c8140900849f731853cf4cb03248c216bcf0065f5715cf6bd67086ff16a4123be6266758f9ec48c1bb569f762b7c76a7f87298668f676f00b46c4786d95054e00bb4fba97b920d68b93a19a28fb91d983ef89", 0xa8) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) 02:22:15 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 02:22:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x20080, 0x62) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="73797a312a10cf7db03b03c608a0d0ce3bfa28ea1efa1503a7268b101fed800efc353f7ac5f71477ee744505ce8aa74f438cb973a40ffd4e7201eb7fd323cb5e44ccb5cc2cf01c8b74998c6711a2eeffdd9c4ffbf13afea149eabfe10597883270e5b7334eaefddf3900da97b264d15c895a8fdb"], 0x59) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) [ 75.047024][ T5565] loop3: detected capacity change from 0 to 4 [ 75.049305][ T5565] EXT4-fs (loop3): Ignoring removed nomblk_io_submit option [ 75.050568][ T5565] EXT4-fs (loop3): Mount option "norecovery" incompatible with ext2 02:22:15 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 02:22:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x20080, 0x62) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mmap(&(0x7f00007e3000/0x8000)=nil, 0x8000, 0x300000c, 0x20010, r0, 0xef9a9000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='nogrpid,barrier,nogrpid,nomblk_io_submit,norecovery']) 02:22:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) write(r2, &(0x7f00000001c0)="8cdaa195b232ab8595b227b5d61363d17b974c8f984399ad56a10c432c1c16779d9cf09e84746af27466802c65b8a372caa172b8605847990d135283a4fbdb6d3da22ae653b6475f6d577563ceb00549f34268b4af4c8140900849f731853cf4cb03248c216bcf0065f5715cf6bd67086ff16a4123be6266758f9ec48c1bb569f762b7c76a7f87298668f676f00b46c4786d95054e00bb4fba97b920d68b93a19a28fb91d983ef89", 0xa8) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) [ 75.083831][ T5565] loop3: detected capacity change from 0 to 4 [ 75.085392][ T5565] EXT4-fs (loop3): Ignoring removed nomblk_io_submit option [ 75.086668][ T5565] EXT4-fs (loop3): Mount option "norecovery" incompatible with ext2 [ 75.102579][ T5576] loop4: detected capacity change from 0 to 1051 [ 75.116692][ T5576] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 75.118383][ T5576] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) 02:22:15 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 02:22:15 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 02:22:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) write(r2, &(0x7f00000001c0)="8cdaa195b232ab8595b227b5d61363d17b974c8f984399ad56a10c432c1c16779d9cf09e84746af27466802c65b8a372caa172b8605847990d135283a4fbdb6d3da22ae653b6475f6d577563ceb00549f34268b4af4c8140900849f731853cf4cb03248c216bcf0065f5715cf6bd67086ff16a4123be6266758f9ec48c1bb569f762b7c76a7f87298668f676f00b46c4786d95054e00bb4fba97b920d68b93a19a28fb91d983ef89", 0xa8) 02:22:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x20080, 0x62) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) [ 75.152406][ T5576] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 75.154634][ T5576] EXT4-fs (loop4): get root inode failed [ 75.155709][ T5576] EXT4-fs (loop4): mount failed [ 75.159605][ T5597] loop3: detected capacity change from 0 to 4 [ 75.165132][ T5597] EXT4-fs (loop3): Ignoring removed nomblk_io_submit option [ 75.166910][ T5597] EXT4-fs (loop3): Mount option "norecovery" incompatible with ext2 02:22:15 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:15 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 02:22:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000c40)={0x40, 0x0, 0x2, 0x3, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x4}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x40}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, r2, 0xbd3fa5b4a1f23a45, 0x0, 0x0, {{}, {@void, @val={0xc, 0x99, {0x7fff}}}}}, 0x20}}, 0x0) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, r2, 0x20, 0x70bd29, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_QOS_MAP={0xe, 0xc7, {[{0x8, 0x5}], "df0cc9f7c64532bf"}}, @NL80211_ATTR_QOS_MAP={0x1c, 0xc7, {[{0xf5, 0x7}, {0x4, 0x2}, {0x80, 0x4}, {0x8, 0x7}, {0x1, 0x2}, {0x78, 0x1}, {0x6, 0x5}, {0x3, 0x3}], "a07a6bc74e2d273a"}}, @NL80211_ATTR_QOS_MAP={0x36, 0xc7, {[{0x6, 0x5}, {0x2}, {0x6, 0x2}, {0x8}, {}, {0x3}, {0x5, 0x7}, {0x3}, {0x1, 0x1}, {0x81, 0x6}, {0x2, 0x7}, {0x81}, {0x1, 0x4}, {0x80, 0x7}, {0x8, 0x3}, {0x2, 0x5}, {0xc1, 0x3}, {0x0, 0x7}, {0x5, 0x6}, {0x8, 0x4}, {0x1, 0x3}], "72ef1f093f12422f"}}]}, 0x78}}, 0x4000021) 02:22:15 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 02:22:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:15 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 02:22:15 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) [ 75.266937][ T5624] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 75.277376][ T5624] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 75.285516][ T5627] loop4: detected capacity change from 0 to 1051 [ 75.288298][ T5627] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 75.291266][ T5627] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 75.314295][ T5627] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated 02:22:15 executing program 3: set_mempolicy(0x2, &(0x7f0000000100)=0x70, 0x100000000002) set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) socketpair(0xa, 0x4, 0xfffffff8, &(0x7f0000000040)) 02:22:15 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) 02:22:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 75.316502][ T5627] EXT4-fs (loop4): get root inode failed [ 75.317458][ T5627] EXT4-fs (loop4): mount failed 02:22:15 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:15 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) 02:22:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:15 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) [ 75.389179][ T5647] loop3: detected capacity change from 0 to 1 02:22:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:15 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) [ 75.411150][ T5647] loop3: p1 p2 p3 p4 [ 75.412110][ T5647] loop3: p1 start 10 is beyond EOD, truncated [ 75.413018][ T5647] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 75.414567][ T5647] loop3: p3 start 2127165541 is beyond EOD, truncated [ 75.415815][ T5647] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 75.427135][ T5666] loop4: detected capacity change from 0 to 1051 [ 75.429909][ T5666] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 75.444250][ T5666] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) 02:22:15 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) 02:22:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 75.470859][ T5666] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 75.472840][ T5666] EXT4-fs (loop4): get root inode failed [ 75.473791][ T5666] EXT4-fs (loop4): mount failed [ 75.474942][ T5662] loop3: detected capacity change from 0 to 1 02:22:15 executing program 3: set_mempolicy(0x2, &(0x7f0000000100)=0x70, 0x100000000002) set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) socketpair(0xa, 0x4, 0xfffffff8, &(0x7f0000000040)) 02:22:15 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) 02:22:15 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:15 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e2800", 0x26}], 0x1}, 0x0) [ 75.578372][ T5699] loop4: detected capacity change from 0 to 1051 [ 75.581116][ T5699] EXT4-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value [ 75.583191][ T5703] loop3: detected capacity change from 0 to 1 [ 75.607629][ T5703] loop3: p1 p2 p3 p4 [ 75.608378][ T5703] loop3: p1 start 10 is beyond EOD, truncated [ 75.609483][ T5703] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 75.612140][ T5703] loop3: p3 start 2127165541 is beyond EOD, truncated [ 75.613226][ T5703] loop3: p4 size 3657465856 extends beyond EOD, truncated 02:22:16 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:16 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) 02:22:16 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) 02:22:16 executing program 3: set_mempolicy(0x2, &(0x7f0000000100)=0x70, 0x100000000002) set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) socketpair(0xa, 0x4, 0xfffffff8, &(0x7f0000000040)) 02:22:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:16 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) 02:22:16 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) 02:22:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 76.263347][ T5730] loop4: detected capacity change from 0 to 1051 [ 76.264817][ T5729] loop3: detected capacity change from 0 to 1 [ 76.269341][ T5730] EXT4-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value 02:22:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:16 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) 02:22:16 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e2800", 0x26}], 0x1}, 0x0) 02:22:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 76.331180][ T5729] loop3: p1 p2 p3 p4 [ 76.332230][ T5729] loop3: p1 start 10 is beyond EOD, truncated [ 76.333321][ T5729] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 76.337638][ T5729] loop3: p3 start 2127165541 is beyond EOD, truncated [ 76.338929][ T5729] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 76.424521][ T5770] loop4: detected capacity change from 0 to 1051 [ 76.427058][ T5770] EXT4-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value 02:22:17 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:17 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) 02:22:17 executing program 3: set_mempolicy(0x2, &(0x7f0000000100)=0x70, 0x100000000002) set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) socketpair(0xa, 0x4, 0xfffffff8, &(0x7f0000000040)) 02:22:17 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000", 0x13}], 0x1}, 0x0) 02:22:17 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:17 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) 02:22:17 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000", 0x13}], 0x1}, 0x0) 02:22:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:17 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) [ 77.157263][ T5790] loop3: detected capacity change from 0 to 1 [ 77.161860][ T5791] loop4: detected capacity change from 0 to 1051 [ 77.195094][ T5791] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 77.196446][ T5790] loop3: p1 p2 p3 p4 [ 77.197636][ T5790] loop3: p1 start 10 is beyond EOD, truncated [ 77.198658][ T5790] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 77.204094][ T5790] loop3: p3 start 2127165541 is beyond EOD, truncated [ 77.205053][ T5791] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) 02:22:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x7}) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:17 executing program 3: set_mempolicy(0x2, &(0x7f0000000100)=0x70, 0x100000000002) set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 77.205398][ T5790] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 77.215957][ T5791] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 77.219061][ T5791] EXT4-fs (loop4): get root inode failed [ 77.220224][ T5791] EXT4-fs (loop4): mount failed [ 77.285168][ T5825] loop3: detected capacity change from 0 to 1 [ 77.306075][ T5825] loop3: p1 p2 p3 p4 [ 77.306938][ T5825] loop3: p1 start 10 is beyond EOD, truncated [ 77.307981][ T5825] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 77.313709][ T5825] loop3: p3 start 2127165541 is beyond EOD, truncated [ 77.315085][ T5825] loop3: p4 size 3657465856 extends beyond EOD, truncated 02:22:18 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:18 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000", 0x13}], 0x1}, 0x0) 02:22:18 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000", 0x13}], 0x1}, 0x0) 02:22:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:18 executing program 3: set_mempolicy(0x2, &(0x7f0000000100)=0x70, 0x100000000002) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000", 0x13}], 0x1}, 0x0) 02:22:18 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:18 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe0208010001080008", 0x1d}], 0x1}, 0x0) [ 78.025987][ T5852] loop3: detected capacity change from 0 to 1 [ 78.031196][ T5853] loop4: detected capacity change from 0 to 1051 [ 78.035100][ T5853] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 78.040327][ T5853] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 78.061888][ T5852] loop3: p1 p2 p3 p4 [ 78.062748][ T5852] loop3: p1 start 10 is beyond EOD, truncated [ 78.064346][ T5852] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 78.066126][ T5852] loop3: p3 start 2127165541 is beyond EOD, truncated [ 78.067523][ T5852] loop3: p4 size 3657465856 extends beyond EOD, truncated 02:22:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000", 0x13}], 0x1}, 0x0) 02:22:18 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 78.080038][ T5853] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 78.082119][ T5853] EXT4-fs (loop4): get root inode failed [ 78.083291][ T5853] EXT4-fs (loop4): mount failed 02:22:18 executing program 3: set_mempolicy(0x2, &(0x7f0000000100)=0x70, 0x100000000002) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:18 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:18 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe0208010001080008", 0x1d}], 0x1}, 0x0) 02:22:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe0208010001080008", 0x1d}], 0x1}, 0x0) 02:22:18 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe0208010001080008", 0x1d}], 0x1}, 0x0) 02:22:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:18 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:18 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400", 0x22}], 0x1}, 0x0) 02:22:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe0208010001080008", 0x1d}], 0x1}, 0x0) 02:22:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:18 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400", 0x22}], 0x1}, 0x0) [ 78.158110][ T5894] loop4: detected capacity change from 0 to 1051 [ 78.160529][ T5894] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 78.163951][ T5894] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 78.170018][ T5893] loop3: detected capacity change from 0 to 1 [ 78.177287][ T5894] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 78.179552][ T5894] EXT4-fs (loop4): get root inode failed [ 78.180412][ T5894] EXT4-fs (loop4): mount failed [ 78.191858][ T5893] loop3: p1 p2 p3 p4 [ 78.192624][ T5893] loop3: p1 start 10 is beyond EOD, truncated [ 78.193643][ T5893] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 78.195165][ T5893] loop3: p3 start 2127165541 is beyond EOD, truncated [ 78.196214][ T5893] loop3: p4 size 3657465856 extends beyond EOD, truncated 02:22:18 executing program 4: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:18 executing program 3: set_mempolicy(0x2, &(0x7f0000000100)=0x70, 0x100000000002) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:18 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:18 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400", 0x22}], 0x1}, 0x0) 02:22:18 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe0208010001080008", 0x1d}], 0x1}, 0x0) 02:22:18 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400", 0x22}], 0x1}, 0x0) 02:22:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r1, 0x0, &(0x7f00000000c0)={0x5, 0x7}, &(0x7f0000000100)) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r2, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 78.294469][ T5934] loop4: detected capacity change from 0 to 1051 [ 78.296653][ T5934] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 78.300186][ T5934] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 78.303626][ T5935] loop3: detected capacity change from 0 to 1 [ 78.320388][ T5934] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 78.322608][ T5934] EXT4-fs (loop4): get root inode failed [ 78.323784][ T5934] EXT4-fs (loop4): mount failed 02:22:18 executing program 4: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:18 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400", 0x22}], 0x1}, 0x0) [ 78.362794][ T1035] loop3: p1 p2 p3 p4 [ 78.363643][ T1035] loop3: p1 start 10 is beyond EOD, truncated [ 78.365633][ T1035] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 78.376280][ T1035] loop3: p3 start 2127165541 is beyond EOD, truncated [ 78.377609][ T1035] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 78.382479][ T5935] loop3: p1 p2 p3 p4 [ 78.383288][ T5935] loop3: p1 start 10 is beyond EOD, truncated [ 78.384728][ T5935] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 78.386279][ T5935] loop3: p3 start 2127165541 is beyond EOD, truncated [ 78.387330][ T5935] loop3: p4 size 3657465856 extends beyond EOD, truncated 02:22:18 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:18 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400", 0x22}], 0x1}, 0x0) 02:22:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 78.444991][ T5972] loop4: detected capacity change from 0 to 1051 02:22:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:18 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400", 0x22}], 0x1}, 0x0) 02:22:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400", 0x22}], 0x1}, 0x0) 02:22:18 executing program 4: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 78.466335][ T5972] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 78.476938][ T5972] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 78.485527][ T5972] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 78.487730][ T5972] EXT4-fs (loop4): get root inode failed [ 78.488726][ T5972] EXT4-fs (loop4): mount failed [ 78.501518][ T5990] loop3: detected capacity change from 0 to 1 02:22:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:18 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400", 0x22}], 0x1}, 0x0) 02:22:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 78.542151][ T1035] loop3: p1 p2 p3 p4 [ 78.543535][ T1035] loop3: p1 start 10 is beyond EOD, truncated [ 78.544849][ T1035] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 78.546607][ T1035] loop3: p3 start 2127165541 is beyond EOD, truncated [ 78.547853][ T1035] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 78.555379][ T5990] loop3: p1 p2 p3 p4 [ 78.556431][ T5990] loop3: p1 start 10 is beyond EOD, truncated [ 78.557310][ T5990] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 78.558882][ T5990] loop3: p3 start 2127165541 is beyond EOD, truncated [ 78.559958][ T5990] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 78.605438][ T6006] loop4: detected capacity change from 0 to 1051 [ 78.616192][ T6006] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 78.618163][ T6006] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 78.627516][ T6006] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 78.629604][ T6006] EXT4-fs (loop4): get root inode failed [ 78.630670][ T6006] EXT4-fs (loop4): mount failed 02:22:19 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:19 executing program 3: set_mempolicy(0x0, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:19 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400", 0x22}], 0x1}, 0x0) 02:22:19 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff", 0x23}], 0x1}, 0x0) 02:22:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:19 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400", 0x22}], 0x1}, 0x0) 02:22:19 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff", 0x23}], 0x1}, 0x0) 02:22:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 79.289798][ T6048] loop3: detected capacity change from 0 to 1 02:22:19 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400", 0x22}], 0x1}, 0x0) 02:22:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 79.325937][ T6048] loop3: p1 p2 p3 p4 [ 79.327048][ T6048] loop3: p1 start 10 is beyond EOD, truncated [ 79.328824][ T6048] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 79.330337][ T6048] loop3: p3 start 2127165541 is beyond EOD, truncated [ 79.331417][ T6048] loop3: p4 size 3657465856 extends beyond EOD, truncated 02:22:20 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:20 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff", 0x23}], 0x1}, 0x0) 02:22:20 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff", 0x23}], 0x1}, 0x0) 02:22:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:20 executing program 3: set_mempolicy(0x0, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:20 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:20 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff", 0x23}], 0x1}, 0x0) 02:22:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 80.142526][ T6090] loop4: detected capacity change from 0 to 1051 [ 80.145060][ T6093] loop3: detected capacity change from 0 to 1 [ 80.148964][ T6090] EXT4-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value 02:22:20 executing program 3: set_mempolicy(0x0, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:20 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff", 0x23}], 0x1}, 0x0) 02:22:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 80.202524][ T6093] loop3: p1 p2 p3 p4 [ 80.203612][ T6093] loop3: p1 start 10 is beyond EOD, truncated [ 80.204711][ T6093] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 80.206418][ T6093] loop3: p3 start 2127165541 is beyond EOD, truncated [ 80.207456][ T6093] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 80.259648][ T6117] loop4: detected capacity change from 0 to 1051 [ 80.268918][ T6110] loop5: detected capacity change from 0 to 1 [ 80.269021][ T6117] EXT4-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value [ 80.278714][ T6127] loop3: detected capacity change from 0 to 1 [ 80.313504][ T6110] loop5: p1 p2 p3 p4 [ 80.314526][ T6110] loop5: p1 start 10 is beyond EOD, truncated [ 80.315604][ T6110] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 80.317553][ T6110] loop5: p3 start 2127165541 is beyond EOD, truncated [ 80.318891][ T6110] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 80.324271][ T1035] loop5: p1 p2 p3 p4 [ 80.324587][ T6127] loop3: p1 p2 p3 p4 [ 80.325675][ T1035] loop5: p1 start 10 is beyond EOD, truncated [ 80.326360][ T6127] loop3: p1 start 10 is beyond EOD, [ 80.327403][ T1035] loop5: p2 size 1073872896 extends beyond EOD, [ 80.327408][ T6127] truncated [ 80.327414][ T1035] truncated [ 80.329217][ T1035] loop5: p3 start 2127165541 is beyond EOD, [ 80.330138][ T6127] loop3: p2 size 1073872896 extends beyond EOD, [ 80.330819][ T1035] truncated [ 80.330823][ T1035] loop5: p4 size 3657465856 extends beyond EOD, [ 80.331461][ T6127] truncated [ 80.334736][ T6127] loop3: p3 start 2127165541 is beyond EOD, [ 80.334791][ T1035] truncated [ 80.339695][ T6127] truncated [ 80.340453][ T6127] loop3: p4 size 3657465856 extends beyond EOD, truncated 02:22:21 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:21 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:21 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:21 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:21 executing program 3: set_mempolicy(0x3, 0x0, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:21 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:21 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 81.009754][ T6166] loop3: detected capacity change from 0 to 1 [ 81.014538][ T6168] loop4: detected capacity change from 0 to 1051 [ 81.017543][ T6168] EXT4-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value [ 81.018649][ T6169] loop0: detected capacity change from 0 to 1051 [ 81.026258][ T6171] loop5: detected capacity change from 0 to 1 [ 81.042765][ T6169] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended [ 81.042938][ T6166] loop3: p1 p2 p3 p4 [ 81.045869][ T6166] loop3: p1 start 10 is beyond EOD, truncated [ 81.047076][ T6166] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 81.049388][ T6166] loop3: p3 start 2127165541 is beyond EOD, truncated [ 81.049787][ T6169] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 81.050711][ T6166] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 81.055169][ T6169] EXT4-fs error (device loop0): ext4_fill_super:4954: inode #2: comm syz-executor.0: iget: root inode unallocated [ 81.058012][ T6169] EXT4-fs (loop0): get root inode failed 02:22:21 executing program 3: set_mempolicy(0x3, 0x0, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 81.058829][ T6169] EXT4-fs (loop0): mount failed [ 81.066990][ T6171] loop5: p1 p2 p3 p4 [ 81.068383][ T6171] loop5: p1 start 10 is beyond EOD, truncated [ 81.069644][ T6171] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 81.072523][ T6171] loop5: p3 start 2127165541 is beyond EOD, truncated [ 81.073752][ T6171] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:22:21 executing program 0: set_mempolicy(0x0, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 81.140739][ T6196] loop4: detected capacity change from 0 to 1051 [ 81.152967][ T6196] EXT4-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value [ 81.162633][ T6211] loop3: detected capacity change from 0 to 1 [ 81.169696][ T6217] loop5: detected capacity change from 0 to 1 [ 81.177720][ T6216] loop0: detected capacity change from 0 to 1 [ 81.193281][ T6211] loop3: p1 p2 p3 p4 [ 81.197559][ T6211] loop3: p1 start 10 is beyond EOD, truncated [ 81.203750][ T6211] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 81.211216][ T6211] loop3: p3 start 2127165541 is beyond EOD, truncated [ 81.218020][ T6211] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 81.225720][ T6217] loop5: p1 p2 p3 p4 [ 81.229888][ T6217] loop5: p1 start 10 is beyond EOD, truncated [ 81.235999][ T6217] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 81.244950][ T6217] loop5: p3 start 2127165541 is beyond EOD, truncated [ 81.245312][ T1035] loop3: p1 p2 p3 p4 [ 81.252258][ T6217] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 81.261226][ T6216] loop0: p1 p2 p3 p4 [ 81.263705][ T1035] loop3: p1 start 10 is beyond EOD, truncated [ 81.268498][ T6216] loop0: p1 start 10 is beyond EOD, [ 81.273820][ T1035] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 81.286500][ T6216] truncated [ 81.289601][ T6216] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 81.295118][ T1035] loop3: p3 start 2127165541 is beyond EOD, truncated [ 81.298604][ T6216] loop0: p3 start 2127165541 is beyond EOD, truncated [ 81.303599][ T1035] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 81.317775][ T6216] loop0: p4 size 3657465856 extends beyond EOD, truncated 02:22:22 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:22 executing program 3: set_mempolicy(0x3, 0x0, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:22 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:22 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 81.876179][ T6261] FAULT_INJECTION: forcing a failure. [ 81.876179][ T6261] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 81.879960][ T6265] loop4: detected capacity change from 0 to 1051 [ 81.889978][ T6261] CPU: 0 PID: 6261 Comm: syz-executor.0 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 81.898257][ T6265] EXT4-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value [ 81.907152][ T6261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 02:22:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 81.907195][ T6261] Call Trace: [ 81.907202][ T6261] dump_stack+0x137/0x19d [ 81.934086][ T6261] should_fail+0x23c/0x250 [ 81.938517][ T6261] should_fail_usercopy+0x16/0x20 [ 81.942046][ T6262] loop5: detected capacity change from 0 to 1 [ 81.943556][ T6261] _copy_from_user+0x1c/0xd0 [ 81.950334][ T6264] loop3: detected capacity change from 0 to 1 [ 81.954266][ T6261] __copy_msghdr_from_user+0x44/0x350 [ 81.954290][ T6261] ? __fget_light+0x21b/0x260 [ 81.970459][ T6261] __sys_sendmsg+0x135/0x270 [ 81.975068][ T6261] ? kstrtouint_from_user+0x104/0x130 [ 81.980491][ T6261] ? do_anonymous_page+0x411/0x8b0 [ 81.985715][ T6261] ? fsnotify_perm+0x59/0x2e0 [ 81.990488][ T6261] ? __fsnotify_parent+0x32f/0x430 [ 81.995876][ T6261] ? get_pid_task+0x8b/0xc0 [ 82.000537][ T6261] ? vfs_write+0x50c/0x770 [ 82.005323][ T6261] ? __fget_light+0x21b/0x260 [ 82.010322][ T6261] ? __cond_resched+0x11/0x40 [ 82.015132][ T6261] ? fput+0x2d/0x130 [ 82.019159][ T6261] ? ksys_write+0x157/0x180 [ 82.023812][ T6261] __x64_sys_sendmsg+0x42/0x50 [ 82.028851][ T6261] do_syscall_64+0x4a/0x90 [ 82.033365][ T6261] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 82.039619][ T6261] RIP: 0033:0x4665d9 [ 82.043742][ T6261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 82.064150][ T6261] RSP: 002b:00007f1f0ec73188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 02:22:22 executing program 0 (fault-call:1 fault-nth:1): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 82.073248][ T6261] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 82.081373][ T6261] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 82.089705][ T6261] RBP: 00007f1f0ec731d0 R08: 0000000000000000 R09: 0000000000000000 [ 82.097823][ T6261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 82.106331][ T6261] R13: 00007fff523cfd1f R14: 00007f1f0ec73300 R15: 0000000000022000 02:22:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 82.163801][ T6264] loop3: p1 p2 p3 p4 [ 82.168196][ T6264] loop3: p1 start 10 is beyond EOD, truncated [ 82.174917][ T6264] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 82.182722][ T6262] loop5: p1 p2 p3 p4 [ 82.186767][ T6262] loop5: p1 start 10 is beyond EOD, truncated [ 82.192863][ T6262] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 82.206875][ T6291] FAULT_INJECTION: forcing a failure. [ 82.206875][ T6291] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 82.220278][ T6291] CPU: 1 PID: 6291 Comm: syz-executor.0 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 82.223329][ T6264] loop3: p3 start 2127165541 is beyond EOD, [ 82.230521][ T6291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 82.230536][ T6291] Call Trace: [ 82.230543][ T6291] dump_stack+0x137/0x19d [ 82.237079][ T6264] truncated [ 82.247278][ T6291] should_fail+0x23c/0x250 02:22:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 82.247305][ T6291] should_fail_usercopy+0x16/0x20 [ 82.250695][ T6264] loop3: p4 size 3657465856 extends beyond EOD, [ 82.255014][ T6291] _copy_from_user+0x1c/0xd0 [ 82.255049][ T6291] iovec_from_user+0xc4/0x2d0 [ 82.258155][ T6264] truncated [ 82.259128][ T6262] loop5: p3 start 2127165541 is beyond EOD, [ 82.262729][ T6291] ? should_fail+0xd6/0x250 [ 82.262753][ T6291] __import_iovec+0x49/0x270 [ 82.268318][ T6262] truncated [ 82.268323][ T6262] loop5: p4 size 3657465856 extends beyond EOD, [ 82.275164][ T6291] ? __copy_msghdr_from_user+0x232/0x350 [ 82.275190][ T6291] import_iovec+0x69/0x80 [ 82.275205][ T6291] __sys_sendmsg+0x1ab/0x270 [ 82.279773][ T6262] truncated [ 82.288758][ T6288] loop4: detected capacity change from 0 to 1051 [ 82.294377][ T6291] ? do_anonymous_page+0x411/0x8b0 [ 82.344571][ T6291] ? fsnotify_perm+0x59/0x2e0 [ 82.349637][ T6291] ? __fsnotify_parent+0x32f/0x430 [ 82.355681][ T6291] ? get_pid_task+0x8b/0xc0 [ 82.360343][ T6291] ? vfs_write+0x50c/0x770 [ 82.364860][ T6291] ? __fget_light+0x21b/0x260 [ 82.370152][ T6291] ? __cond_resched+0x11/0x40 [ 82.374818][ T6291] ? fput+0x2d/0x130 [ 82.379220][ T6291] ? ksys_write+0x157/0x180 [ 82.383813][ T6291] __x64_sys_sendmsg+0x42/0x50 [ 82.388647][ T6291] do_syscall_64+0x4a/0x90 [ 82.393300][ T6291] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 82.399314][ T6291] RIP: 0033:0x4665d9 [ 82.403573][ T6291] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 82.423157][ T6291] RSP: 002b:00007f1f0ec73188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 82.431728][ T6291] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 82.439788][ T6291] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 82.447827][ T6291] RBP: 00007f1f0ec731d0 R08: 0000000000000000 R09: 0000000000000000 [ 82.455890][ T6291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 02:22:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 82.464011][ T6291] R13: 00007fff523cfd1f R14: 00007f1f0ec73300 R15: 0000000000022000 [ 82.493713][ T6288] EXT4-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value 02:22:22 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000080), 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:22 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:22 executing program 0 (fault-call:1 fault-nth:2): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 82.741056][ T6324] loop4: detected capacity change from 0 to 1051 [ 82.747688][ T6328] FAULT_INJECTION: forcing a failure. [ 82.747688][ T6328] name failslab, interval 1, probability 0, space 0, times 1 [ 82.747709][ T6328] CPU: 1 PID: 6328 Comm: syz-executor.0 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 82.747726][ T6328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 82.747736][ T6328] Call Trace: [ 82.747743][ T6328] dump_stack+0x137/0x19d [ 82.762593][ T6324] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 82.771607][ T6328] should_fail+0x23c/0x250 [ 82.771633][ T6328] __should_failslab+0x81/0x90 [ 82.782264][ T6324] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 82.785089][ T6328] should_failslab+0x5/0x20 [ 82.785109][ T6328] kmem_cache_alloc_node+0x58/0x2b0 [ 82.785130][ T6328] ? __alloc_skb+0xed/0x420 [ 82.785148][ T6328] __alloc_skb+0xed/0x420 [ 82.785164][ T6328] netlink_sendmsg+0x4c7/0x7c0 [ 82.808817][ T6325] loop5: detected capacity change from 0 to 1 [ 82.817135][ T6328] ? netlink_getsockopt+0x720/0x720 [ 82.835011][ T6330] loop3: detected capacity change from 0 to 1 [ 82.835905][ T6328] ____sys_sendmsg+0x360/0x4d0 [ 82.835929][ T6328] ? import_iovec+0x69/0x80 [ 82.842656][ T6324] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 82.847337][ T6328] __sys_sendmsg+0x1ed/0x270 [ 82.847360][ T6328] ? __fsnotify_parent+0x32f/0x430 [ 82.852770][ T6324] EXT4-fs (loop4): get root inode failed [ 82.858857][ T6328] ? get_pid_task+0x8b/0xc0 [ 82.858879][ T6328] ? vfs_write+0x50c/0x770 [ 82.858947][ T6328] ? __fget_light+0x21b/0x260 [ 82.863804][ T6324] EXT4-fs (loop4): mount failed [ 82.868257][ T6328] ? __cond_resched+0x11/0x40 [ 82.918967][ T6328] ? fput+0x2d/0x130 [ 82.922847][ T6328] ? ksys_write+0x157/0x180 [ 82.927353][ T6328] __x64_sys_sendmsg+0x42/0x50 [ 82.932392][ T6328] do_syscall_64+0x4a/0x90 [ 82.937016][ T6328] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 82.942926][ T6328] RIP: 0033:0x4665d9 [ 82.947116][ T6328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 82.966822][ T6328] RSP: 002b:00007f1f0ec73188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 82.975219][ T6328] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 82.983368][ T6328] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 02:22:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:23 executing program 0 (fault-call:1 fault-nth:3): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 82.991362][ T6328] RBP: 00007f1f0ec731d0 R08: 0000000000000000 R09: 0000000000000000 [ 82.999575][ T6328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.007704][ T6328] R13: 00007fff523cfd1f R14: 00007f1f0ec73300 R15: 0000000000022000 [ 83.063531][ T6325] loop5: p1 p2 p3 p4 [ 83.067956][ T6325] loop5: p1 start 10 is beyond EOD, truncated [ 83.071571][ T6330] loop3: p1 p2 p3 p4 [ 83.074164][ T6325] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 83.078944][ T6330] loop3: p1 start 10 is beyond EOD, truncated [ 83.092055][ T6330] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 83.103319][ T6349] FAULT_INJECTION: forcing a failure. [ 83.103319][ T6349] name failslab, interval 1, probability 0, space 0, times 0 [ 83.116427][ T6349] CPU: 1 PID: 6349 Comm: syz-executor.0 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 83.126858][ T6349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.137091][ T6349] Call Trace: [ 83.140385][ T6349] dump_stack+0x137/0x19d [ 83.141938][ T6330] loop3: p3 start 2127165541 is beyond EOD, [ 83.144817][ T6349] should_fail+0x23c/0x250 [ 83.144840][ T6349] __should_failslab+0x81/0x90 [ 83.144862][ T6349] should_failslab+0x5/0x20 [ 83.151038][ T6330] truncated [ 83.151043][ T6330] loop3: p4 size 3657465856 extends beyond EOD, [ 83.155623][ T6349] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 83.160690][ T6330] truncated [ 83.185159][ T6349] ? __kmalloc_node_track_caller+0x30/0x40 [ 83.191177][ T6349] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 83.194887][ T6325] loop5: p3 start 2127165541 is beyond EOD, [ 83.196922][ T6349] __kmalloc_node_track_caller+0x30/0x40 [ 83.196939][ T6325] truncated 02:22:23 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 83.196950][ T6349] ? netlink_sendmsg+0x4c7/0x7c0 [ 83.203497][ T6325] loop5: p4 size 3657465856 extends beyond EOD, [ 83.209262][ T6349] __alloc_skb+0x187/0x420 [ 83.212373][ T6325] truncated [ 83.232074][ T6349] netlink_sendmsg+0x4c7/0x7c0 [ 83.237033][ T6349] ? netlink_getsockopt+0x720/0x720 [ 83.242526][ T6349] ____sys_sendmsg+0x360/0x4d0 [ 83.247543][ T6349] ? import_iovec+0x69/0x80 [ 83.252469][ T6349] __sys_sendmsg+0x1ed/0x270 [ 83.257426][ T6349] ? __fsnotify_parent+0x32f/0x430 [ 83.262544][ T6349] ? get_pid_task+0x8b/0xc0 [ 83.267225][ T6349] ? vfs_write+0x50c/0x770 [ 83.271650][ T6349] ? __fget_light+0x21b/0x260 [ 83.276330][ T6349] ? __cond_resched+0x11/0x40 [ 83.281296][ T6349] ? fput+0x2d/0x130 [ 83.285209][ T6349] ? ksys_write+0x157/0x180 [ 83.289812][ T6349] __x64_sys_sendmsg+0x42/0x50 [ 83.295168][ T6349] do_syscall_64+0x4a/0x90 [ 83.299663][ T6349] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 83.305738][ T6349] RIP: 0033:0x4665d9 [ 83.309701][ T6349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 83.329628][ T6349] RSP: 002b:00007f1f0ec73188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 83.338295][ T6349] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 83.346428][ T6349] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 83.354461][ T6349] RBP: 00007f1f0ec731d0 R08: 0000000000000000 R09: 0000000000000000 02:22:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080), 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 83.362573][ T6349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.370538][ T6349] R13: 00007fff523cfd1f R14: 00007f1f0ec73300 R15: 0000000000022000 [ 83.373092][ T6365] loop4: detected capacity change from 0 to 1051 [ 83.387936][ T6365] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 83.464116][ T6383] loop3: detected capacity change from 0 to 1 [ 83.471095][ T6365] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 83.486636][ T6365] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 83.498977][ T6365] EXT4-fs (loop4): get root inode failed [ 83.504604][ T6365] EXT4-fs (loop4): mount failed 02:22:23 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, 0x0, 0x0) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:23 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:23 executing program 0 (fault-call:1 fault-nth:4): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:23 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 83.513507][ T6383] loop3: p1 p2 p3 p4 [ 83.517562][ T6383] loop3: p1 start 10 is beyond EOD, truncated [ 83.523655][ T6383] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 83.532867][ T6383] loop3: p3 start 2127165541 is beyond EOD, truncated [ 83.539701][ T6383] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 83.603852][ T6410] loop4: detected capacity change from 0 to 1051 [ 83.610340][ T6411] loop5: detected capacity change from 0 to 1 [ 83.619349][ T6410] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 83.630399][ T6410] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 83.630962][ T6417] FAULT_INJECTION: forcing a failure. [ 83.630962][ T6417] name fail_usercopy, interval 1, probability 0, space 0, times 0 02:22:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000080), 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 83.652683][ T6417] CPU: 1 PID: 6417 Comm: syz-executor.0 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 83.662836][ T6417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.668418][ T6410] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 83.672998][ T6417] Call Trace: [ 83.673006][ T6417] dump_stack+0x137/0x19d [ 83.673030][ T6417] should_fail+0x23c/0x250 [ 83.685655][ T6410] EXT4-fs (loop4): get root inode failed 02:22:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 83.688869][ T6417] should_fail_usercopy+0x16/0x20 [ 83.693224][ T6410] EXT4-fs (loop4): mount failed [ 83.697590][ T6417] _copy_from_iter_full+0x148/0xa10 [ 83.718657][ T6417] ? check_stack_object+0x61/0x70 [ 83.723690][ T6417] ? __virt_addr_valid+0x15a/0x1a0 [ 83.728836][ T6417] ? __check_object_size+0x253/0x310 [ 83.734116][ T6417] netlink_sendmsg+0x579/0x7c0 [ 83.738878][ T6417] ? netlink_getsockopt+0x720/0x720 [ 83.744246][ T6417] ____sys_sendmsg+0x360/0x4d0 [ 83.749101][ T6417] ? import_iovec+0x69/0x80 [ 83.753622][ T6417] __sys_sendmsg+0x1ed/0x270 [ 83.758554][ T6417] ? __fsnotify_parent+0x32f/0x430 [ 83.764264][ T6417] ? get_pid_task+0x8b/0xc0 [ 83.768983][ T6417] ? vfs_write+0x50c/0x770 [ 83.773403][ T6417] ? __fget_light+0x21b/0x260 [ 83.778095][ T6417] ? __cond_resched+0x11/0x40 [ 83.783580][ T6417] ? fput+0x2d/0x130 [ 83.787496][ T6417] ? ksys_write+0x157/0x180 [ 83.792310][ T6417] __x64_sys_sendmsg+0x42/0x50 [ 83.797340][ T6417] do_syscall_64+0x4a/0x90 [ 83.801922][ T6417] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 83.807811][ T6417] RIP: 0033:0x4665d9 [ 83.811819][ T6417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 83.831598][ T6417] RSP: 002b:00007f1f0ec73188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 83.840369][ T6417] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 02:22:24 executing program 0 (fault-call:1 fault-nth:5): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 83.849214][ T6417] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 83.857642][ T6417] RBP: 00007f1f0ec731d0 R08: 0000000000000000 R09: 0000000000000000 [ 83.865815][ T6417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.873899][ T6417] R13: 00007fff523cfd1f R14: 00007f1f0ec73300 R15: 0000000000022000 02:22:24 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 83.918677][ T6411] loop5: p1 p2 p3 p4 [ 83.927318][ T6411] loop5: p1 start 10 is beyond EOD, truncated [ 83.933594][ T6411] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 83.947070][ T6434] FAULT_INJECTION: forcing a failure. [ 83.947070][ T6434] name failslab, interval 1, probability 0, space 0, times 0 [ 83.960532][ T6434] CPU: 1 PID: 6434 Comm: syz-executor.0 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 83.970855][ T6434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.974394][ T6426] loop3: detected capacity change from 0 to 1 [ 83.981103][ T6434] Call Trace: [ 83.981114][ T6434] dump_stack+0x137/0x19d [ 83.995462][ T6434] should_fail+0x23c/0x250 [ 83.999918][ T6434] ? kzalloc+0x16/0x20 [ 84.004002][ T6434] __should_failslab+0x81/0x90 [ 84.009119][ T6434] should_failslab+0x5/0x20 [ 84.009432][ T6411] loop5: p3 start 2127165541 is beyond EOD, [ 84.013606][ T6434] __kmalloc+0x66/0x340 [ 84.013631][ T6434] kzalloc+0x16/0x20 [ 84.019660][ T6411] truncated [ 84.024181][ T6434] fib_nl2rule+0x219/0xd10 [ 84.024212][ T6434] fib_nl_delrule+0x2a8/0xfb0 [ 84.028267][ T6411] loop5: p4 size 3657465856 extends beyond EOD, [ 84.031461][ T6434] ? avc_has_perm_noaudit+0x19a/0x240 [ 84.031487][ T6434] ? cred_has_capability+0x1af/0x210 [ 84.035937][ T6411] truncated [ 84.040538][ T6434] ? rb_erase+0x4bb/0x750 02:22:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 84.065081][ T6434] ? notify_rule_change+0x150/0x150 [ 84.070463][ T6434] rtnetlink_rcv_msg+0x6f4/0x7a0 [ 84.075577][ T6434] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 84.081491][ T6434] ? __wake_up+0x8d/0xc0 [ 84.085773][ T6434] ? __d_rehash+0x125/0x180 [ 84.090435][ T6434] ? __d_add+0x3bf/0x490 [ 84.094878][ T6434] ? avc_has_perm_noaudit+0x19a/0x240 [ 84.100270][ T6434] ? rhashtable_jhash2+0x13a/0x1a0 [ 84.100675][ T6441] loop4: detected capacity change from 0 to 1051 [ 84.105389][ T6434] ? jhash+0x2b0/0x2b0 02:22:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 84.105421][ T6434] netlink_rcv_skb+0x13e/0x240 [ 84.120590][ T6434] ? rtnetlink_bind+0x60/0x60 [ 84.121743][ T6441] EXT4-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value [ 84.125269][ T6434] rtnetlink_rcv+0x18/0x20 [ 84.138922][ T6434] netlink_unicast+0x5ec/0x6b0 [ 84.143866][ T6434] netlink_sendmsg+0x6f8/0x7c0 [ 84.148836][ T6434] ? netlink_getsockopt+0x720/0x720 [ 84.154781][ T6434] ____sys_sendmsg+0x360/0x4d0 [ 84.159831][ T6434] ? import_iovec+0x69/0x80 [ 84.164444][ T6434] __sys_sendmsg+0x1ed/0x270 [ 84.169171][ T6434] ? __fsnotify_parent+0x32f/0x430 [ 84.174576][ T6434] ? get_pid_task+0x8b/0xc0 [ 84.179866][ T6434] ? vfs_write+0x50c/0x770 [ 84.184404][ T6434] ? __fget_light+0x21b/0x260 [ 84.189679][ T6434] ? __cond_resched+0x11/0x40 [ 84.194565][ T6434] ? fput+0x2d/0x130 [ 84.198551][ T6434] ? ksys_write+0x157/0x180 [ 84.203329][ T6434] __x64_sys_sendmsg+0x42/0x50 [ 84.208191][ T6434] do_syscall_64+0x4a/0x90 [ 84.213280][ T6434] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 84.219331][ T6434] RIP: 0033:0x4665d9 [ 84.223549][ T6434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 84.243521][ T6434] RSP: 002b:00007f1f0ec73188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 84.252008][ T6434] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 84.260425][ T6434] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 84.268477][ T6434] RBP: 00007f1f0ec731d0 R08: 0000000000000000 R09: 0000000000000000 [ 84.276479][ T6434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.284890][ T6434] R13: 00007fff523cfd1f R14: 00007f1f0ec73300 R15: 0000000000022000 [ 84.323390][ T6426] loop3: p1 p2 p3 p4 [ 84.327666][ T6426] loop3: p1 start 10 is beyond EOD, truncated [ 84.334022][ T6426] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 84.342580][ T6426] loop3: p3 start 2127165541 is beyond EOD, truncated [ 84.350200][ T6426] loop3: p4 size 3657465856 extends beyond EOD, truncated 02:22:24 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, 0x0, 0x0) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:24 executing program 0 (fault-call:1 fault-nth:6): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:24 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:24 executing program 5: set_mempolicy(0x0, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:24 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 84.474102][ T6478] loop3: detected capacity change from 0 to 1 [ 84.480403][ T6481] loop4: detected capacity change from 0 to 1051 [ 84.482632][ T6479] loop5: detected capacity change from 0 to 1 [ 84.488338][ T6481] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 84.504248][ T6481] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 84.504871][ T6487] FAULT_INJECTION: forcing a failure. [ 84.504871][ T6487] name failslab, interval 1, probability 0, space 0, times 0 [ 84.526729][ T6487] CPU: 0 PID: 6487 Comm: syz-executor.0 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 84.531030][ T6481] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 84.537992][ T6487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 84.538007][ T6487] Call Trace: [ 84.538014][ T6487] dump_stack+0x137/0x19d [ 84.538037][ T6487] should_fail+0x23c/0x250 [ 84.538053][ T6487] __should_failslab+0x81/0x90 [ 84.550150][ T6481] EXT4-fs (loop4): get root inode failed [ 84.561492][ T6487] should_failslab+0x5/0x20 [ 84.561515][ T6487] kmem_cache_alloc_node+0x58/0x2b0 [ 84.565002][ T6481] EXT4-fs (loop4): mount failed [ 84.569683][ T6487] ? __alloc_skb+0xed/0x420 [ 84.605877][ T6487] __alloc_skb+0xed/0x420 [ 84.610682][ T6487] netlink_ack+0x292/0x690 [ 84.616116][ T6487] netlink_rcv_skb+0x1b7/0x240 [ 84.621246][ T6487] ? rtnetlink_bind+0x60/0x60 [ 84.625915][ T6487] rtnetlink_rcv+0x18/0x20 [ 84.630450][ T6487] netlink_unicast+0x5ec/0x6b0 [ 84.635274][ T6487] netlink_sendmsg+0x6f8/0x7c0 [ 84.640570][ T6487] ? netlink_getsockopt+0x720/0x720 [ 84.646523][ T6487] ____sys_sendmsg+0x360/0x4d0 [ 84.651703][ T6487] ? import_iovec+0x69/0x80 [ 84.656300][ T6487] __sys_sendmsg+0x1ed/0x270 [ 84.661139][ T6487] ? __fsnotify_parent+0x32f/0x430 [ 84.666311][ T6487] ? get_pid_task+0x8b/0xc0 [ 84.671228][ T6487] ? vfs_write+0x50c/0x770 [ 84.676347][ T6487] ? __fget_light+0x21b/0x260 [ 84.681312][ T6487] ? __cond_resched+0x11/0x40 [ 84.686024][ T6487] ? fput+0x2d/0x130 [ 84.689906][ T6487] ? ksys_write+0x157/0x180 [ 84.695174][ T6487] __x64_sys_sendmsg+0x42/0x50 [ 84.700012][ T6487] do_syscall_64+0x4a/0x90 [ 84.704457][ T6487] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 84.710604][ T6487] RIP: 0033:0x4665d9 [ 84.714492][ T6487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 84.734715][ T6487] RSP: 002b:00007f1f0ec73188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 84.743196][ T6487] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 84.751584][ T6487] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 84.759719][ T6487] RBP: 00007f1f0ec731d0 R08: 0000000000000000 R09: 0000000000000000 02:22:24 executing program 0 (fault-call:1 fault-nth:7): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 84.767866][ T6487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.775961][ T6487] R13: 00007fff523cfd1f R14: 00007f1f0ec73300 R15: 0000000000022000 02:22:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 84.817522][ T6478] loop3: p1 p2 p3 p4 [ 84.822021][ T6478] loop3: p1 start 10 is beyond EOD, truncated [ 84.828390][ T6478] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 84.842363][ T6478] loop3: p3 start 2127165541 is beyond EOD, truncated [ 84.849896][ T6478] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 84.863501][ T6479] loop5: p1 p2 p3 p4 [ 84.867699][ T6503] FAULT_INJECTION: forcing a failure. [ 84.867699][ T6503] name failslab, interval 1, probability 0, space 0, times 0 [ 84.876038][ T6479] loop5: p1 start 10 is beyond EOD, truncated [ 84.880646][ T6503] CPU: 0 PID: 6503 Comm: syz-executor.0 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 84.887000][ T6479] loop5: p2 size 1073872896 extends beyond EOD, [ 84.897631][ T6503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 84.897644][ T6503] Call Trace: [ 84.897657][ T6503] dump_stack+0x137/0x19d [ 84.904222][ T6479] truncated [ 84.914343][ T6503] should_fail+0x23c/0x250 [ 84.914366][ T6503] __should_failslab+0x81/0x90 [ 84.934263][ T6503] should_failslab+0x5/0x20 [ 84.939062][ T6503] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 84.944866][ T6503] ? __kmalloc_node_track_caller+0x30/0x40 [ 84.950916][ T6503] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 84.951765][ T6479] loop5: p3 start 2127165541 is beyond EOD, [ 84.956376][ T6503] __kmalloc_node_track_caller+0x30/0x40 02:22:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 84.956400][ T6503] ? netlink_ack+0x292/0x690 [ 84.962578][ T6479] truncated [ 84.962582][ T6479] loop5: p4 size 3657465856 extends beyond EOD, [ 84.968183][ T6503] __alloc_skb+0x187/0x420 [ 84.972849][ T6479] truncated [ 84.990000][ T6503] netlink_ack+0x292/0x690 [ 84.994502][ T6503] netlink_rcv_skb+0x1b7/0x240 [ 84.999479][ T6503] ? rtnetlink_bind+0x60/0x60 [ 85.004266][ T6503] rtnetlink_rcv+0x18/0x20 [ 85.008747][ T6503] netlink_unicast+0x5ec/0x6b0 [ 85.013512][ T6503] netlink_sendmsg+0x6f8/0x7c0 [ 85.018355][ T6503] ? netlink_getsockopt+0x720/0x720 [ 85.023766][ T6503] ____sys_sendmsg+0x360/0x4d0 [ 85.028529][ T6503] ? import_iovec+0x69/0x80 [ 85.033017][ T6503] __sys_sendmsg+0x1ed/0x270 [ 85.037595][ T6503] ? __fsnotify_parent+0x32f/0x430 [ 85.042720][ T6503] ? get_pid_task+0x8b/0xc0 [ 85.047352][ T6503] ? vfs_write+0x50c/0x770 [ 85.051754][ T6503] ? __fget_light+0x21b/0x260 [ 85.056494][ T6503] ? __cond_resched+0x11/0x40 [ 85.061149][ T6503] ? fput+0x2d/0x130 [ 85.065023][ T6503] ? ksys_write+0x157/0x180 [ 85.069574][ T6503] __x64_sys_sendmsg+0x42/0x50 [ 85.074315][ T6503] do_syscall_64+0x4a/0x90 [ 85.078741][ T6503] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 85.085082][ T6503] RIP: 0033:0x4665d9 [ 85.088976][ T6503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 85.108965][ T6503] RSP: 002b:00007f1f0ec73188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 02:22:25 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 85.117357][ T6503] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 85.125491][ T6503] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 85.133461][ T6503] RBP: 00007f1f0ec731d0 R08: 0000000000000000 R09: 0000000000000000 [ 85.141428][ T6503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 85.149637][ T6503] R13: 00007fff523cfd1f R14: 00007f1f0ec73300 R15: 0000000000022000 [ 85.199998][ T6517] loop3: detected capacity change from 0 to 1 [ 85.214564][ T6531] loop4: detected capacity change from 0 to 1051 [ 85.221894][ T6531] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 85.231743][ T6531] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 85.241609][ T6531] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 85.253893][ T6531] EXT4-fs (loop4): get root inode failed [ 85.259537][ T6531] EXT4-fs (loop4): mount failed [ 85.268021][ T6517] loop3: p1 p2 p3 p4 [ 85.272237][ T6517] loop3: p1 start 10 is beyond EOD, truncated [ 85.278424][ T6517] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 85.286618][ T6517] loop3: p3 start 2127165541 is beyond EOD, truncated [ 85.293481][ T6517] loop3: p4 size 3657465856 extends beyond EOD, truncated 02:22:25 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, 0x0, 0x0) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:25 executing program 0 (fault-call:1 fault-nth:8): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:25 executing program 5: set_mempolicy(0x0, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:25 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 85.333077][ T6547] FAULT_INJECTION: forcing a failure. [ 85.333077][ T6547] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 85.346160][ T6547] CPU: 1 PID: 6547 Comm: syz-executor.0 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 85.356697][ T6547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 85.367168][ T6547] Call Trace: [ 85.370580][ T6547] dump_stack+0x137/0x19d [ 85.374898][ T6547] should_fail+0x23c/0x250 [ 85.379377][ T6547] should_fail_usercopy+0x16/0x20 [ 85.384396][ T6547] _copy_to_user+0x1c/0x90 [ 85.388947][ T6547] simple_read_from_buffer+0xab/0x120 [ 85.395037][ T6547] proc_fail_nth_read+0xf6/0x140 [ 85.400069][ T6547] ? rw_verify_area+0x136/0x250 [ 85.404947][ T6547] ? proc_fault_inject_write+0x200/0x200 [ 85.410633][ T6547] vfs_read+0x154/0x5d0 [ 85.414782][ T6547] ? __fget_light+0x21b/0x260 [ 85.419455][ T6547] ? __cond_resched+0x11/0x40 [ 85.424144][ T6547] ksys_read+0xce/0x180 [ 85.428499][ T6547] __x64_sys_read+0x3e/0x50 [ 85.433002][ T6547] do_syscall_64+0x4a/0x90 [ 85.437559][ T6547] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 85.443839][ T6547] RIP: 0033:0x41935c [ 85.447916][ T6547] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 85.468774][ T6547] RSP: 002b:00007f1f0ec73170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 85.477549][ T6547] RAX: ffffffffffffffda RBX: 0000000000000024 RCX: 000000000041935c [ 85.486035][ T6547] RDX: 000000000000000f RSI: 00007f1f0ec731e0 RDI: 0000000000000004 [ 85.494256][ T6547] RBP: 00007f1f0ec731d0 R08: 0000000000000000 R09: 0000000000000000 [ 85.503059][ T6547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 85.511560][ T6547] R13: 00007fff523cfd1f R14: 00007f1f0ec73300 R15: 0000000000022000 02:22:25 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 85.542959][ T6560] loop4: detected capacity change from 0 to 1051 [ 85.550478][ T6549] loop5: detected capacity change from 0 to 1 [ 85.566466][ T6560] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 85.576031][ T6560] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) 02:22:25 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 85.586180][ T6560] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 85.598376][ T6560] EXT4-fs (loop4): get root inode failed [ 85.604444][ T6560] EXT4-fs (loop4): mount failed [ 85.614246][ T6549] loop5: p1 p2 p3 p4 [ 85.618748][ T6571] loop3: detected capacity change from 0 to 1 [ 85.631718][ T6549] loop5: p1 start 10 is beyond EOD, truncated 02:22:25 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:25 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 85.638327][ T6549] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 85.650306][ T6549] loop5: p3 start 2127165541 is beyond EOD, truncated [ 85.657260][ T6549] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 85.692364][ T6571] loop3: p1 p2 p3 p4 [ 85.697089][ T6571] loop3: p1 start 10 is beyond EOD, truncated [ 85.703532][ T6571] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 85.728197][ T6571] loop3: p3 start 2127165541 is beyond EOD, truncated [ 85.735816][ T6571] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 85.743889][ T6595] loop4: detected capacity change from 0 to 1051 [ 85.751673][ T6595] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 85.766407][ T6595] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 85.782389][ T6595] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 85.794547][ T6595] EXT4-fs (loop4): get root inode failed [ 85.800174][ T6595] EXT4-fs (loop4): mount failed 02:22:26 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}], 0x1) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:26 executing program 5: set_mempolicy(0x0, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:26 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x0, 0x0) 02:22:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, 0x0, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:26 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:26 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 86.413527][ T6622] loop4: detected capacity change from 0 to 1051 [ 86.421864][ T6624] loop5: detected capacity change from 0 to 1 [ 86.451691][ T6622] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended 02:22:26 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x0, 0x0) 02:22:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, 0x0, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:26 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 86.474206][ T6624] loop5: p1 p2 p3 p4 [ 86.478242][ T6624] loop5: p1 start 10 is beyond EOD, truncated [ 86.484440][ T6624] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 86.495846][ T6622] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 86.512710][ T6624] loop5: p3 start 2127165541 is beyond EOD, truncated [ 86.520036][ T6624] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 86.525730][ T6622] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 86.539386][ T6622] EXT4-fs (loop4): get root inode failed [ 86.545028][ T6622] EXT4-fs (loop4): mount failed 02:22:27 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}], 0x1) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:27 executing program 5: set_mempolicy(0x3, 0x0, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:27 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, 0x0, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x0, 0x0) 02:22:27 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:27 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:27 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:27 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) [ 87.278096][ T6678] loop4: detected capacity change from 0 to 1051 [ 87.288514][ T6680] loop5: detected capacity change from 0 to 1 02:22:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:27 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 87.343104][ T6680] loop5: p1 p2 p3 p4 [ 87.349037][ T6680] loop5: p1 start 10 is beyond EOD, truncated [ 87.355206][ T6680] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 87.363359][ T6680] loop5: p3 start 2127165541 is beyond EOD, truncated [ 87.370212][ T6680] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 87.462673][ T6707] loop4: detected capacity change from 0 to 1051 02:22:28 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}], 0x1) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:28 executing program 5: set_mempolicy(0x3, 0x0, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) 02:22:28 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xb1, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:28 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x300, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) 02:22:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 88.153975][ T6742] loop5: detected capacity change from 0 to 1 [ 88.155021][ T6743] loop4: detected capacity change from 0 to 1051 [ 88.187879][ T6742] loop5: p1 p2 p3 p4 [ 88.195641][ T6742] loop5: p1 start 10 is beyond EOD, truncated 02:22:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:28 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x500, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 88.201841][ T6742] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 88.211326][ T6742] loop5: p3 start 2127165541 is beyond EOD, truncated [ 88.218237][ T6742] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 88.326678][ T6780] loop4: detected capacity change from 0 to 1051 02:22:29 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {0x0}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:29 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x600, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 02:22:29 executing program 5: set_mempolicy(0x3, 0x0, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:29 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x700, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:29 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) [ 89.013642][ T6805] loop3: detected capacity change from 0 to 1 [ 89.021129][ T6806] loop4: detected capacity change from 0 to 1051 [ 89.021450][ T6807] loop5: detected capacity change from 0 to 1 02:22:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:29 executing program 5: set_mempolicy(0x3, &(0x7f0000000080), 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:29 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x900, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 89.071092][ T6807] loop5: p1 p2 p3 p4 [ 89.075676][ T6807] loop5: p1 start 10 is beyond EOD, truncated [ 89.081944][ T6807] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 89.090030][ T6807] loop5: p3 start 2127165541 is beyond EOD, truncated [ 89.096988][ T6807] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 89.140523][ T6833] loop4: detected capacity change from 0 to 1051 [ 89.153368][ T6834] loop3: detected capacity change from 0 to 1 [ 89.232190][ T6847] loop5: detected capacity change from 0 to 1 [ 89.254932][ T6847] loop5: p1 p2 p3 p4 [ 89.259204][ T6847] loop5: p1 start 10 is beyond EOD, truncated [ 89.265401][ T6847] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 89.272948][ T6847] loop5: p3 start 2127165541 is beyond EOD, truncated [ 89.279885][ T6847] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:22:30 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {0x0}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 02:22:30 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080), 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:30 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xb100, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 89.908221][ T6873] loop4: detected capacity change from 0 to 4 [ 89.914389][ T6876] loop3: detected capacity change from 0 to 1 [ 89.915245][ T6875] loop5: detected capacity change from 0 to 1 02:22:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0), 0x0, 0x1c0}]) [ 89.959674][ T6873] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 89.969281][ T6873] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (2 blocks) [ 89.979559][ T6875] loop5: p1 p2 p3 p4 [ 89.996721][ T6875] loop5: p1 start 10 is beyond EOD, truncated [ 90.003120][ T6875] loop5: p2 size 1073872896 extends beyond EOD, truncated 02:22:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:30 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x34000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 90.030047][ T6875] loop5: p3 start 2127165541 is beyond EOD, truncated [ 90.037911][ T6875] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 90.064452][ T6902] loop3: detected capacity change from 0 to 1 02:22:30 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {0x0}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:30 executing program 5: set_mempolicy(0x3, &(0x7f0000000080), 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:30 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x400300, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:30 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0), 0x0, 0x1c0}]) 02:22:30 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:30 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x2000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 90.782688][ T6935] loop3: detected capacity change from 0 to 1 [ 90.783192][ T6936] loop4: detected capacity change from 0 to 4 [ 90.795775][ T6940] loop5: detected capacity change from 0 to 1 02:22:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:31 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x3000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0), 0x0, 0x1c0}]) [ 90.853886][ T6940] loop5: p1 p2 p3 p4 [ 90.862041][ T6936] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 90.875664][ T6936] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (2 blocks) [ 90.877654][ T6940] loop5: p1 start 10 is beyond EOD, truncated [ 90.891608][ T6940] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 90.928436][ T6940] loop5: p3 start 2127165541 is beyond EOD, truncated [ 90.935253][ T6940] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 90.951316][ T6962] loop3: detected capacity change from 0 to 1 02:22:31 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:31 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:31 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ff", 0x20, 0x1c0}]) 02:22:31 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x400ff7e, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x81, &(0x7f0000000080)=ANY=[]) [ 91.626636][ T6990] loop4: detected capacity change from 0 to 4 [ 91.634693][ T6991] loop3: detected capacity change from 0 to 1 [ 91.637267][ T6990] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 91.643949][ T6993] loop5: detected capacity change from 0 to 1 [ 91.651110][ T6990] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (2 blocks) 02:22:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ff", 0x20, 0x1c0}]) [ 91.695467][ T6993] loop5: p1 p2 p3 p4 [ 91.700205][ T6993] loop5: p1 start 10 is beyond EOD, truncated [ 91.706575][ T6993] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 91.716457][ T6993] loop5: p3 start 2127165541 is beyond EOD, truncated [ 91.723675][ T6993] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:22:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:31 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x5000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 91.763024][ T7021] loop3: detected capacity change from 0 to 1 02:22:32 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x81, &(0x7f0000000080)=ANY=[]) 02:22:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ff", 0x20, 0x1c0}]) 02:22:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:32 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, 0x0, 0x81, &(0x7f0000000080)=ANY=[]) 02:22:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:32 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, &(0x7f0000000540), 0x81, &(0x7f0000000080)=ANY=[]) 02:22:32 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 92.493252][ T7046] loop3: detected capacity change from 0 to 1 [ 92.514280][ T7048] loop5: detected capacity change from 0 to 1 [ 92.575741][ T7048] loop5: p1 p2 p3 p4 [ 92.580019][ T7048] loop5: p1 start 10 is beyond EOD, truncated [ 92.586117][ T7048] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 92.616019][ T7048] loop5: p3 start 2127165541 is beyond EOD, truncated [ 92.622821][ T7048] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 92.641133][ T7080] loop4: detected capacity change from 0 to 1051 [ 92.673143][ T7080] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:22:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e887700720030", 0x30, 0x1c0}]) 02:22:33 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7eff0004, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, &(0x7f0000000540), 0x81, &(0x7f0000000080)=ANY=[]) 02:22:33 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:33 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x81000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 93.373780][ T7098] loop5: detected capacity change from 0 to 1 [ 93.382642][ T7101] loop3: detected capacity change from 0 to 1 [ 93.385154][ T7105] loop4: detected capacity change from 0 to 1051 02:22:33 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x9effffff, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e887700720030", 0x30, 0x1c0}]) 02:22:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x0, &(0x7f0000000540), 0x81, &(0x7f0000000080)=ANY=[]) [ 93.446205][ T7098] loop5: p1 p2 p3 p4 [ 93.447598][ T7105] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 93.453658][ T7098] loop5: p1 start 10 is beyond EOD, truncated [ 93.462903][ T7098] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 93.479948][ T7098] loop5: p3 start 2127165541 is beyond EOD, truncated [ 93.486920][ T7098] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:22:33 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x0, 0x0) 02:22:33 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xb1000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:33 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xeaffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 93.585604][ T7145] loop3: detected capacity change from 0 to 1 [ 93.594128][ T7147] loop4: detected capacity change from 0 to 1051 [ 93.636133][ T7147] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:22:34 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748b", 0x2c}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x0, 0x0) 02:22:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e887700720030", 0x30, 0x1c0}]) 02:22:34 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xefffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:34 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:34 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf0ffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) [ 94.268869][ T7181] loop3: detected capacity change from 0 to 1 [ 94.284126][ T7184] loop4: detected capacity change from 0 to 1051 02:22:34 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff0000", 0x38, 0x1c0}]) 02:22:34 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x0, 0x0) 02:22:34 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfeffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 94.321974][ T7184] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 94.403395][ T7212] loop3: detected capacity change from 0 to 1 02:22:35 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748b", 0x2c}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="92ebb35bce567648c2980fc730c789edcaab960068b73705616974f7444e8ef0f38c395cc8d2ab94aaf8b110f611484428159683756028c74016dbf39d07ec87c6d0c9574f07966c54299c0cf291f1e8beb907aa5b36725b24bf8138c7d7b931bfb603c6303e0b2170063353b7a05d3042362e6b8545a759cb5c7d992499ea51dbbb9d6d817def29057d8af8c79cece3ea33b96cc3", 0x95}], 0x1}}], 0x1, 0x0) 02:22:35 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffff7f, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:35 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:35 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) 02:22:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff0000", 0x38, 0x1c0}]) 02:22:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, 0x0, 0x0, 0x0) 02:22:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, 0x0, 0x0, 0x0) 02:22:35 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffff9e, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 95.137506][ T7236] loop4: detected capacity change from 0 to 1051 [ 95.149239][ T7236] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 95.153259][ T7243] loop3: detected capacity change from 0 to 1 02:22:35 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff0000", 0x38, 0x1c0}]) 02:22:35 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) [ 95.266085][ T7265] loop4: detected capacity change from 0 to 1051 [ 95.274701][ T7265] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 95.299364][ T7274] loop3: detected capacity change from 0 to 1 02:22:36 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748b", 0x2c}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, 0x0, 0x0, 0x0) 02:22:36 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480), 0x0, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:36 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffea, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) 02:22:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff000000000080", 0x3c, 0x1c0}]) 02:22:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0), 0x0, 0x0) 02:22:36 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffef, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 02:22:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff000000000080", 0x3c, 0x1c0}]) 02:22:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0), 0x0, 0x0) 02:22:36 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffff0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 96.021330][ T7298] loop4: detected capacity change from 0 to 1051 [ 96.029866][ T7302] loop3: detected capacity change from 0 to 1 [ 96.056524][ T7298] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 96.144057][ T7328] loop3: detected capacity change from 0 to 1 [ 96.144667][ T7329] loop5: detected capacity change from 0 to 1 02:22:37 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76", 0x42}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:37 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480), 0x0, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0), 0x0, 0x0) 02:22:37 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 02:22:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff000000000080", 0x3c, 0x1c0}]) 02:22:37 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="0f000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 02:22:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1c0}]) 02:22:37 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="10000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0), 0x0, 0x0) [ 96.885675][ T7351] loop5: detected capacity change from 0 to 1 [ 96.892026][ T7354] loop3: detected capacity change from 0 to 1 [ 96.898881][ T7353] loop4: detected capacity change from 0 to 1051 [ 96.918290][ T7353] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:22:37 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480), 0x0, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 97.040537][ T7381] loop5: detected capacity change from 0 to 1 [ 97.098706][ T7390] loop4: detected capacity change from 0 to 1051 [ 97.107377][ T7390] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:22:37 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76", 0x42}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:37 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="1c000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da", 0x3e, 0x1c0}]) 02:22:37 executing program 1: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0), 0x0, 0x1c0}]) 02:22:37 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:37 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="c0000000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 97.755069][ T7402] loop1: detected capacity change from 0 to 1 [ 97.755209][ T7403] loop4: detected capacity change from 0 to 1051 [ 97.763514][ T7409] loop5: detected capacity change from 0 to 1 [ 97.768386][ T7406] loop3: detected capacity change from 0 to 1 02:22:37 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="c00e0000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0), 0x0, 0x1c0}]) [ 97.814462][ T7403] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 97.821304][ T7402] loop1: p1 p2 p3 p4 [ 97.840182][ T7402] loop1: p1 start 10 is beyond EOD, truncated [ 97.846316][ T7402] loop1: p2 size 1073872896 extends beyond EOD, truncated 02:22:38 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da", 0x3e, 0x1c0}]) 02:22:38 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="e03f0300210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:38 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 97.875523][ T7429] loop5: detected capacity change from 0 to 1 [ 97.897380][ T7402] loop1: p3 start 2127165541 is beyond EOD, truncated [ 97.904188][ T7402] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 97.984286][ T7447] loop4: detected capacity change from 0 to 1051 [ 97.994951][ T7447] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 97.999961][ T7446] loop3: detected capacity change from 0 to 1 02:22:38 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76", 0x42}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:38 executing program 1: set_mempolicy(0x3, 0x0, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:38 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="e4010020210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0), 0x0, 0x1c0}]) 02:22:38 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:38 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da", 0x3e, 0x1c0}]) 02:22:38 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="00f0ff7f210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:38 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ff", 0x20, 0x1c0}]) [ 98.619179][ T7466] loop3: detected capacity change from 0 to 1 [ 98.632199][ T7468] loop5: detected capacity change from 0 to 1 [ 98.637232][ T7471] loop4: detected capacity change from 0 to 1051 [ 98.646254][ T7477] loop1: detected capacity change from 0 to 1 [ 98.671812][ T7471] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 98.683015][ T7477] loop1: p1 p2 p3 p4 [ 98.687562][ T7477] loop1: p1 start 10 is beyond EOD, truncated [ 98.693655][ T7477] loop1: p2 size 1073872896 extends beyond EOD, truncated [ 98.705506][ T7477] loop1: p3 start 2127165541 is beyond EOD, truncated [ 98.712332][ T7477] loop1: p4 size 3657465856 extends beyond EOD, truncated 02:22:38 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55", 0x3f, 0x1c0}]) 02:22:38 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300", 0x4d, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:38 executing program 1: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 98.740038][ T7489] loop5: detected capacity change from 0 to 1 [ 98.777784][ T7506] loop4: detected capacity change from 0 to 1051 02:22:38 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="effdffff210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 98.786468][ T7506] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 98.809291][ T7510] loop3: detected capacity change from 0 to 1 [ 98.823987][ T7515] loop1: detected capacity change from 0 to 1 [ 98.860924][ T7515] loop1: p1 p2 p3 p4 [ 98.865134][ T7515] loop1: p1 start 10 is beyond EOD, truncated [ 98.872212][ T7515] loop1: p2 size 1073872896 extends beyond EOD, truncated [ 98.883121][ T7515] loop1: p3 start 2127165541 is beyond EOD, truncated [ 98.890445][ T7515] loop1: p4 size 3657465856 extends beyond EOD, truncated 02:22:39 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300", 0x4d, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:39 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000100007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ff", 0x20, 0x1c0}]) 02:22:39 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55", 0x3f, 0x1c0}]) 02:22:39 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:39 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e0", 0x4d}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:39 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000110007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:39 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000120007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:39 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55", 0x3f, 0x1c0}]) [ 99.494884][ T7548] loop5: detected capacity change from 0 to 1 [ 99.500138][ T7552] loop3: detected capacity change from 0 to 1 [ 99.512378][ T7553] loop1: detected capacity change from 0 to 1051 [ 99.519083][ T7551] loop4: detected capacity change from 0 to 1051 02:22:39 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000130007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:39 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000140007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:39 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300", 0x4d, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:39 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ff", 0x20, 0x1c0}]) [ 99.571525][ T7551] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 99.578707][ T7553] EXT4-fs (loop1): Unrecognized mount option "/proc/self/exe" or missing value 02:22:39 executing program 1 (fault-call:7 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 99.640722][ T7580] loop3: detected capacity change from 0 to 1 [ 99.665184][ T7589] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 99.672657][ T7591] FAULT_INJECTION: forcing a failure. [ 99.672657][ T7591] name fail_usercopy, interval 1, probability 0, space 0, times 0 02:22:39 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000150007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 99.674653][ T7586] loop4: detected capacity change from 0 to 1051 [ 99.687844][ T7591] CPU: 0 PID: 7591 Comm: syz-executor.1 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 99.704690][ T7591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.714944][ T7591] Call Trace: [ 99.718226][ T7591] dump_stack+0x137/0x19d [ 99.720243][ T7586] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 99.722617][ T7591] should_fail+0x23c/0x250 [ 99.722639][ T7591] should_fail_usercopy+0x16/0x20 02:22:39 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000160007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 99.722657][ T7591] _copy_from_user+0x1c/0xd0 [ 99.722679][ T7591] __copy_msghdr_from_user+0x44/0x350 [ 99.722694][ T7591] ? __fget_light+0x21b/0x260 [ 99.722711][ T7591] __sys_sendmmsg+0x1f0/0x4b0 [ 99.733424][ T7588] loop5: detected capacity change from 0 to 1 [ 99.735255][ T7591] ? kstrtoull+0x30e/0x350 [ 99.768018][ T7599] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 99.770382][ T7591] ? kstrtouint_from_user+0x104/0x130 [ 99.770412][ T7591] ? do_anonymous_page+0x411/0x8b0 [ 99.790573][ T7591] ? fsnotify_perm+0x59/0x2e0 [ 99.795254][ T7591] ? __fsnotify_parent+0x32f/0x430 [ 99.800398][ T7591] ? get_pid_task+0x8b/0xc0 [ 99.804981][ T7591] ? vfs_write+0x50c/0x770 [ 99.809572][ T7591] ? __fget_light+0x21b/0x260 [ 99.814244][ T7591] ? __cond_resched+0x11/0x40 [ 99.818909][ T7591] ? fput+0x2d/0x130 [ 99.822807][ T7591] ? ksys_write+0x157/0x180 [ 99.827301][ T7591] __x64_sys_sendmmsg+0x53/0x60 [ 99.832149][ T7591] do_syscall_64+0x4a/0x90 [ 99.836596][ T7591] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 99.842702][ T7591] RIP: 0033:0x4665d9 [ 99.846686][ T7591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 99.866726][ T7591] RSP: 002b:00007fc514126188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 99.875144][ T7591] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 99.883241][ T7591] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000004 02:22:40 executing program 1 (fault-call:7 fault-nth:1): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 99.891309][ T7591] RBP: 00007fc5141261d0 R08: 0000000000000000 R09: 0000000000000000 [ 99.899270][ T7591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.907869][ T7591] R13: 00007fffb271900f R14: 00007fc514126300 R15: 0000000000022000 [ 99.976643][ T7607] FAULT_INJECTION: forcing a failure. [ 99.976643][ T7607] name failslab, interval 1, probability 0, space 0, times 0 [ 99.989473][ T7607] CPU: 0 PID: 7607 Comm: syz-executor.1 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 99.999721][ T7607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.009951][ T7607] Call Trace: [ 100.013223][ T7607] dump_stack+0x137/0x19d [ 100.017557][ T7607] should_fail+0x23c/0x250 [ 100.022272][ T7607] ? dst_alloc+0x108/0x300 [ 100.026706][ T7607] __should_failslab+0x81/0x90 [ 100.031457][ T7607] should_failslab+0x5/0x20 [ 100.036128][ T7607] kmem_cache_alloc+0x46/0x2f0 [ 100.040952][ T7607] ? __alloc_pages+0x194/0x320 [ 100.045706][ T7607] dst_alloc+0x108/0x300 [ 100.049938][ T7607] __mkroute_output+0x452/0xc40 [ 100.054796][ T7607] ip_route_output_key_hash_rcu+0x7a8/0x800 [ 100.060882][ T7607] ip_route_output_flow+0xaa/0x160 [ 100.066003][ T7607] udp_sendmsg+0xd48/0x12f0 [ 100.070597][ T7607] ? ip_do_fragment+0x11f0/0x11f0 [ 100.076140][ T7607] ? __wake_up+0x8d/0xc0 [ 100.080364][ T7607] udpv6_sendmsg+0x520/0x16b0 [ 100.085090][ T7607] ? __list_del_entry_valid+0x54/0xc0 [ 100.090465][ T7607] ? __inc_numa_state+0x10/0x50 [ 100.095293][ T7607] ? rmqueue_pcplist+0x152/0x190 [ 100.100209][ T7607] ? selinux_socket_sendmsg+0x7e/0x140 [ 100.105678][ T7607] inet6_sendmsg+0x5f/0x80 [ 100.110091][ T7607] ? inet6_compat_ioctl+0x250/0x250 [ 100.115284][ T7607] ____sys_sendmsg+0x360/0x4d0 [ 100.120459][ T7607] ? import_iovec+0x69/0x80 [ 100.125033][ T7607] __sys_sendmmsg+0x315/0x4b0 [ 100.129723][ T7607] ? kstrtoull+0x30f/0x350 [ 100.134222][ T7607] ? kstrtouint_from_user+0x104/0x130 [ 100.139602][ T7607] ? do_anonymous_page+0x411/0x8b0 [ 100.144769][ T7607] ? fsnotify_perm+0x59/0x2e0 [ 100.149473][ T7607] ? __fsnotify_parent+0x32f/0x430 [ 100.154697][ T7607] ? get_pid_task+0x8b/0xc0 [ 100.159186][ T7607] ? vfs_write+0x50c/0x770 [ 100.163592][ T7607] ? __fget_light+0x21b/0x260 [ 100.168265][ T7607] ? __cond_resched+0x11/0x40 [ 100.172944][ T7607] ? fput+0x2d/0x130 [ 100.176822][ T7607] ? ksys_write+0x157/0x180 [ 100.181311][ T7607] __x64_sys_sendmmsg+0x53/0x60 [ 100.186158][ T7607] do_syscall_64+0x4a/0x90 [ 100.190597][ T7607] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 100.196531][ T7607] RIP: 0033:0x4665d9 [ 100.200422][ T7607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 100.220366][ T7607] RSP: 002b:00007fc514126188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 100.228991][ T7607] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 100.236942][ T7607] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000004 [ 100.245274][ T7607] RBP: 00007fc5141261d0 R08: 0000000000000000 R09: 0000000000000000 [ 100.253325][ T7607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.261411][ T7607] R13: 00007fffb271900f R14: 00007fc514126300 R15: 0000000000022000 02:22:40 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e0", 0x4d}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:40 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40}]) 02:22:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e887700720030", 0x30, 0x1c0}]) 02:22:40 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003", 0x5a, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:40 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000180007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:40 executing program 1 (fault-call:7 fault-nth:2): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 02:22:40 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 100.372866][ T7628] loop5: detected capacity change from 0 to 1 [ 100.374045][ T7630] FAULT_INJECTION: forcing a failure. [ 100.374045][ T7630] name failslab, interval 1, probability 0, space 0, times 0 [ 100.392053][ T7630] CPU: 1 PID: 7630 Comm: syz-executor.1 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 100.402209][ T7630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.412731][ T7630] Call Trace: [ 100.416101][ T7630] dump_stack+0x137/0x19d [ 100.420427][ T7630] should_fail+0x23c/0x250 [ 100.424945][ T7630] __should_failslab+0x81/0x90 [ 100.429773][ T7630] should_failslab+0x5/0x20 [ 100.434278][ T7630] kmem_cache_alloc_node+0x58/0x2b0 [ 100.439548][ T7630] ? __alloc_skb+0xed/0x420 [ 100.444121][ T7630] __alloc_skb+0xed/0x420 [ 100.448743][ T7630] alloc_skb_with_frags+0x90/0x390 [ 100.454144][ T7630] ? rmqueue+0x43/0xd00 [ 100.458423][ T7630] sock_alloc_send_pskb+0x436/0x4e0 [ 100.464017][ T7630] sock_alloc_send_skb+0x2d/0x40 [ 100.469189][ T7630] __ip_append_data+0x12ec/0x1db0 [ 100.474419][ T7630] ? dst_alloc+0x29f/0x300 [ 100.479084][ T7630] ? ip_do_fragment+0x11f0/0x11f0 [ 100.484358][ T7630] ? __mkroute_output+0x7f1/0xc40 [ 100.489377][ T7630] ip_make_skb+0x142/0x2d0 [ 100.493881][ T7630] ? ip_do_fragment+0x11f0/0x11f0 [ 100.499051][ T7630] udp_sendmsg+0xfba/0x12f0 [ 100.503915][ T7630] ? ip_do_fragment+0x11f0/0x11f0 [ 100.508918][ T7630] ? __wake_up+0x8d/0xc0 [ 100.513220][ T7630] udpv6_sendmsg+0x520/0x16b0 [ 100.517882][ T7630] ? __list_del_entry_valid+0x54/0xc0 [ 100.524281][ T7630] ? __inc_numa_state+0x10/0x50 [ 100.529212][ T7630] ? rmqueue_pcplist+0x152/0x190 [ 100.534164][ T7630] ? selinux_socket_sendmsg+0x7e/0x140 [ 100.539670][ T7630] inet6_sendmsg+0x5f/0x80 [ 100.544159][ T7630] ? inet6_compat_ioctl+0x250/0x250 [ 100.549345][ T7630] ____sys_sendmsg+0x360/0x4d0 [ 100.554115][ T7630] ? import_iovec+0x69/0x80 [ 100.558605][ T7630] __sys_sendmmsg+0x315/0x4b0 [ 100.563474][ T7630] ? kstrtoull+0x30f/0x350 [ 100.567994][ T7630] ? kstrtouint_from_user+0x104/0x130 [ 100.573382][ T7630] ? do_anonymous_page+0x411/0x8b0 [ 100.578528][ T7630] ? fsnotify_perm+0x59/0x2e0 [ 100.583258][ T7630] ? __fsnotify_parent+0x32f/0x430 [ 100.588477][ T7630] ? get_pid_task+0x8b/0xc0 [ 100.593259][ T7630] ? vfs_write+0x50c/0x770 [ 100.598033][ T7630] ? __fget_light+0x21b/0x260 [ 100.602923][ T7630] ? __cond_resched+0x11/0x40 [ 100.607874][ T7630] ? fput+0x2d/0x130 [ 100.612069][ T7630] ? ksys_write+0x157/0x180 [ 100.616857][ T7630] __x64_sys_sendmmsg+0x53/0x60 [ 100.622129][ T7630] do_syscall_64+0x4a/0x90 [ 100.626794][ T7630] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 100.632876][ T7630] RIP: 0033:0x4665d9 [ 100.637185][ T7630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 100.657543][ T7630] RSP: 002b:00007fc514126188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 02:22:40 executing program 1 (fault-call:7 fault-nth:3): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 100.666269][ T7630] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 100.674530][ T7630] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000004 [ 100.683290][ T7630] RBP: 00007fc5141261d0 R08: 0000000000000000 R09: 0000000000000000 [ 100.691255][ T7630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.700042][ T7630] R13: 00007fffb271900f R14: 00007fc514126300 R15: 0000000000022000 [ 100.727545][ T7629] loop4: detected capacity change from 0 to 1051 [ 100.739840][ T7629] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 100.749483][ T7639] FAULT_INJECTION: forcing a failure. [ 100.749483][ T7639] name failslab, interval 1, probability 0, space 0, times 0 [ 100.762474][ T7639] CPU: 0 PID: 7639 Comm: syz-executor.1 Tainted: G W 5.13.0-rc4-syzkaller #0 02:22:40 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="240000001a0007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:40 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40}]) 02:22:40 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e887700720030", 0x30, 0x1c0}]) [ 100.772627][ T7639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.783227][ T7639] Call Trace: [ 100.786517][ T7639] dump_stack+0x137/0x19d [ 100.790847][ T7639] should_fail+0x23c/0x250 [ 100.795298][ T7639] __should_failslab+0x81/0x90 [ 100.800436][ T7639] should_failslab+0x5/0x20 [ 100.804961][ T7639] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 100.810784][ T7639] ? __kmalloc_node_track_caller+0x30/0x40 [ 100.816702][ T7639] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 100.822175][ T7639] __kmalloc_node_track_caller+0x30/0x40 02:22:41 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="240000001c0007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 100.828164][ T7639] ? alloc_skb_with_frags+0x90/0x390 [ 100.833462][ T7639] __alloc_skb+0x187/0x420 [ 100.837972][ T7639] alloc_skb_with_frags+0x90/0x390 [ 100.843094][ T7639] ? rmqueue+0x43/0xd00 [ 100.847465][ T7639] sock_alloc_send_pskb+0x436/0x4e0 [ 100.852736][ T7639] sock_alloc_send_skb+0x2d/0x40 [ 100.857775][ T7639] __ip_append_data+0x12ec/0x1db0 [ 100.862823][ T7639] ? dst_alloc+0x29f/0x300 [ 100.867307][ T7639] ? ip_do_fragment+0x11f0/0x11f0 [ 100.872504][ T7639] ? __mkroute_output+0x7f1/0xc40 [ 100.878037][ T7639] ip_make_skb+0x142/0x2d0 [ 100.882630][ T7639] ? ip_do_fragment+0x11f0/0x11f0 [ 100.888534][ T7639] udp_sendmsg+0xfba/0x12f0 [ 100.893218][ T7639] ? ip_do_fragment+0x11f0/0x11f0 [ 100.898240][ T7639] ? __wake_up+0x8d/0xc0 [ 100.902867][ T7639] udpv6_sendmsg+0x520/0x16b0 [ 100.907599][ T7639] ? __list_del_entry_valid+0x54/0xc0 [ 100.912984][ T7639] ? __inc_numa_state+0x10/0x50 [ 100.917949][ T7639] ? rmqueue_pcplist+0x152/0x190 [ 100.922968][ T7639] ? selinux_socket_sendmsg+0x7e/0x140 [ 100.929681][ T7639] inet6_sendmsg+0x5f/0x80 [ 100.934244][ T7639] ? inet6_compat_ioctl+0x250/0x250 [ 100.939652][ T7639] ____sys_sendmsg+0x360/0x4d0 [ 100.945002][ T7639] ? import_iovec+0x69/0x80 [ 100.949889][ T7639] __sys_sendmmsg+0x315/0x4b0 [ 100.955448][ T7639] ? kstrtoull+0x30f/0x350 [ 100.960702][ T7639] ? kstrtouint_from_user+0x104/0x130 [ 100.966260][ T7639] ? do_anonymous_page+0x411/0x8b0 [ 100.971567][ T7639] ? fsnotify_perm+0x59/0x2e0 [ 100.976467][ T7639] ? __fsnotify_parent+0x32f/0x430 [ 100.981589][ T7639] ? get_pid_task+0x8b/0xc0 [ 100.986228][ T7639] ? vfs_write+0x50c/0x770 [ 100.990701][ T7639] ? __fget_light+0x21b/0x260 [ 100.995631][ T7639] ? __cond_resched+0x11/0x40 [ 101.000909][ T7639] ? fput+0x2d/0x130 [ 101.005077][ T7639] ? ksys_write+0x157/0x180 [ 101.009921][ T7639] __x64_sys_sendmmsg+0x53/0x60 [ 101.015033][ T7639] do_syscall_64+0x4a/0x90 [ 101.020583][ T7639] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.027006][ T7639] RIP: 0033:0x4665d9 [ 101.031406][ T7639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 101.052714][ T7639] RSP: 002b:00007fc514126188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 101.061845][ T7639] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 101.070173][ T7639] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000004 [ 101.079001][ T7639] RBP: 00007fc5141261d0 R08: 0000000000000000 R09: 0000000000000000 [ 101.087734][ T7639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.096484][ T7639] R13: 00007fffb271900f R14: 00007fc514126300 R15: 0000000000022000 02:22:41 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e0", 0x4d}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:41 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="240000001d0007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:41 executing program 1 (fault-call:7 fault-nth:4): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 02:22:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003", 0x5a, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:41 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40}]) 02:22:41 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e887700720030", 0x30, 0x1c0}]) [ 101.158557][ T7660] loop5: detected capacity change from 0 to 1 02:22:41 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="240000001e0007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 101.236214][ T7675] FAULT_INJECTION: forcing a failure. [ 101.236214][ T7675] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 101.243241][ T7678] loop4: detected capacity change from 0 to 1051 [ 101.250207][ T7675] CPU: 1 PID: 7675 Comm: syz-executor.1 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 101.250226][ T7675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.278117][ T7675] Call Trace: [ 101.281395][ T7675] dump_stack+0x137/0x19d [ 101.285724][ T7675] should_fail+0x23c/0x250 [ 101.290218][ T7675] should_fail_usercopy+0x16/0x20 [ 101.295445][ T7675] _copy_to_user+0x1c/0x90 [ 101.300261][ T7675] simple_read_from_buffer+0xab/0x120 [ 101.306227][ T7675] proc_fail_nth_read+0xf6/0x140 [ 101.311443][ T7675] ? rw_verify_area+0x136/0x250 [ 101.316570][ T7675] ? proc_fault_inject_write+0x200/0x200 [ 101.323092][ T7675] vfs_read+0x154/0x5d0 [ 101.327539][ T7675] ? __fget_light+0x21b/0x260 [ 101.332746][ T7675] ? __cond_resched+0x11/0x40 [ 101.337875][ T7675] ksys_read+0xce/0x180 [ 101.342457][ T7675] __x64_sys_read+0x3e/0x50 [ 101.347381][ T7675] do_syscall_64+0x4a/0x90 [ 101.352056][ T7675] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.358264][ T7675] RIP: 0033:0x41935c [ 101.362239][ T7675] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 02:22:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 101.383150][ T7675] RSP: 002b:00007fc514126170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 101.391640][ T7675] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 000000000041935c [ 101.399893][ T7675] RDX: 000000000000000f RSI: 00007fc5141261e0 RDI: 0000000000000005 [ 101.408557][ T7675] RBP: 00007fc5141261d0 R08: 0000000000000000 R09: 0000000000000000 [ 101.417753][ T7675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.425999][ T7675] R13: 00007fffb271900f R14: 00007fc514126300 R15: 0000000000022000 02:22:41 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40}]) [ 101.470664][ T7678] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:22:41 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000200007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003", 0x5a, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 101.510842][ T7693] loop5: detected capacity change from 0 to 1 [ 101.601357][ T7712] loop4: detected capacity change from 0 to 1051 [ 101.610360][ T7712] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:22:42 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e", 0x53}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:42 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24020000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff0000", 0x38, 0x1c0}]) 02:22:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x2, 0x0}}], 0x1, 0x0) 02:22:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000", 0x60, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:42 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:42 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:42 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24030000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x3, 0x0}}], 0x1, 0x0) [ 102.106529][ T7733] loop4: detected capacity change from 0 to 1051 [ 102.113380][ T7734] loop5: detected capacity change from 0 to 1 02:22:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000", 0x60, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 102.155082][ T7733] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 102.164159][ T7733] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:22:42 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff0000", 0x38, 0x1c0}]) 02:22:42 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24040000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 102.236654][ T7762] loop4: detected capacity change from 0 to 1051 [ 102.244995][ T7762] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 102.254191][ T7762] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 102.265779][ T7763] loop5: detected capacity change from 0 to 1 02:22:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x4, 0x0}}], 0x1, 0x0) 02:22:43 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e", 0x53}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:43 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24050000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:43 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:43 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000", 0x60, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff0000", 0x38, 0x1c0}]) 02:22:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x8, 0x0}}], 0x1, 0x0) 02:22:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xa, 0x0}}], 0x1, 0x0) [ 102.975949][ T7794] loop4: detected capacity change from 0 to 1051 [ 102.976166][ T7793] loop5: detected capacity change from 0 to 1 02:22:43 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24060000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:43 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:43 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24070000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:43 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff000000000080", 0x3c, 0x1c0}]) [ 103.051646][ T7794] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 103.061005][ T7794] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:22:43 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24090000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 103.126743][ T7823] loop5: detected capacity change from 0 to 1 02:22:44 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e", 0x53}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xf, 0x0}}], 0x1, 0x0) 02:22:44 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:44 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24b10000210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:44 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200", 0x63, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff000000000080", 0x3c, 0x1c0}]) 02:22:44 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000300210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x11, 0x0}}], 0x1, 0x0) 02:22:44 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:44 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000500210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 103.920226][ T7848] loop5: detected capacity change from 0 to 1 [ 103.930476][ T7847] loop4: detected capacity change from 0 to 1051 02:22:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff000000000080", 0x3c, 0x1c0}]) 02:22:44 executing program 3: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 103.982123][ T7847] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 103.991245][ T7847] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 104.076419][ T7881] loop5: detected capacity change from 0 to 1 02:22:44 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e239262", 0x56}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:44 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000600210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:44 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200", 0x63, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x18, 0x0}}], 0x1, 0x0) 02:22:44 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da", 0x3e, 0x1c0}]) 02:22:44 executing program 3: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:44 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000700210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:45 executing program 3: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x1c, 0x0}}], 0x1, 0x0) 02:22:45 executing program 3: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:45 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000900210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 104.821479][ T7898] loop4: detected capacity change from 0 to 1051 [ 104.827289][ T7902] loop5: detected capacity change from 0 to 1 [ 104.833977][ T7898] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 104.843122][ T7898] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:22:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da", 0x3e, 0x1c0}]) [ 104.980912][ T7935] loop5: detected capacity change from 0 to 1 02:22:45 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e239262", 0x56}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:45 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24008100210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x30, 0x0}}], 0x1, 0x0) 02:22:45 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200", 0x63, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da", 0x3e, 0x1c0}]) 02:22:45 executing program 3: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:45 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="2400b100210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:45 executing program 3: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:45 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55", 0x3f, 0x1c0}]) [ 105.730021][ T7950] loop5: detected capacity change from 0 to 1 [ 105.740839][ T7955] loop4: detected capacity change from 0 to 1051 [ 105.762729][ T7955] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended 02:22:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x1f4, 0x0}}], 0x1, 0x0) [ 105.772085][ T7955] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:22:45 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b00000000030000080080000042000012", 0x65, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:45 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000770007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 105.827638][ T7974] loop5: detected capacity change from 0 to 1 [ 105.872632][ T7987] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=7987 comm=syz-executor.0 [ 105.893109][ T7988] loop4: detected capacity change from 0 to 1051 [ 105.905261][ T7988] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 105.914626][ T7988] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:22:46 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e239262", 0x56}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x2e4, 0x0}}], 0x1, 0x0) 02:22:46 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) 02:22:46 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000200210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:46 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55", 0x3f, 0x1c0}]) 02:22:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b00000000030000080080000042000012", 0x65, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:46 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) 02:22:46 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000300210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x300, 0x0}}], 0x1, 0x0) 02:22:46 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000400210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:46 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) [ 106.612195][ T8014] loop4: detected capacity change from 0 to 1051 [ 106.616384][ T8013] loop5: detected capacity change from 0 to 1 [ 106.621423][ T8014] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 106.636719][ T8014] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:22:46 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55", 0x3f, 0x1c0}]) [ 106.763707][ T8049] loop5: detected capacity change from 0 to 1 02:22:47 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250", 0x57}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:47 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b00000000030000080080000042000012", 0x65, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x3e8, 0x0}}], 0x1, 0x0) 02:22:47 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 02:22:47 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000500210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40}]) 02:22:47 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 02:22:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x810, 0x0}}], 0x1, 0x0) 02:22:47 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000600210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:47 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 107.484991][ T8062] loop4: detected capacity change from 0 to 1051 [ 107.521879][ T8062] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended 02:22:47 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40}]) 02:22:47 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66}], 0x81, &(0x7f0000000080)=ANY=[]) [ 107.531233][ T8062] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 107.630448][ T8096] loop4: detected capacity change from 0 to 1051 [ 107.648995][ T8096] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:22:48 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 02:22:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40}]) 02:22:48 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000700210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:48 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250", 0x57}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:48 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xa00, 0x0}}], 0x1, 0x0) 02:22:48 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000900210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xf00, 0x0}}], 0x1, 0x0) 02:22:48 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) [ 108.355715][ T8125] loop4: detected capacity change from 0 to 1051 [ 108.371166][ T8125] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:22:48 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:48 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40}]) 02:22:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x1008, 0x0}}], 0x1, 0x0) 02:22:48 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="2400b100210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 108.499922][ T8155] loop4: detected capacity change from 0 to 1051 [ 108.508337][ T8155] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:22:49 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250", 0x57}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:49 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 02:22:49 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000003210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x1100, 0x0}}], 0x1, 0x0) 02:22:49 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 02:22:49 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55", 0x3f, 0x1c0}]) 02:22:49 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000005210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x1800, 0x0}}], 0x1, 0x0) 02:22:49 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 02:22:49 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000006210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:49 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 109.223828][ T8183] loop4: detected capacity change from 0 to 1051 [ 109.230455][ T8186] loop5: detected capacity change from 0 to 1 [ 109.245698][ T8183] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 109.255383][ T8183] EXT4-fs (loop4): Can't support bigalloc feature without extents feature [ 109.255383][ T8183] 02:22:49 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000007210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 109.368473][ T8217] loop4: detected capacity change from 0 to 1051 [ 109.379020][ T8217] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 109.388066][ T8217] EXT4-fs (loop4): Can't support bigalloc feature without extents feature [ 109.388066][ T8217] 02:22:50 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x1) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:50 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 02:22:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x1c00, 0x0}}], 0x1, 0x0) 02:22:50 executing program 5 (fault-call:1 fault-nth:0): set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:50 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000009210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 02:22:50 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 02:22:50 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) [ 110.087239][ T8235] loop4: detected capacity change from 0 to 1051 [ 110.098924][ T8239] FAULT_INJECTION: forcing a failure. [ 110.098924][ T8239] name failslab, interval 1, probability 0, space 0, times 0 [ 110.111853][ T8239] CPU: 1 PID: 8239 Comm: syz-executor.5 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 110.122078][ T8239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.132411][ T8239] Call Trace: 02:22:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x1f00, 0x0}}], 0x1, 0x0) 02:22:50 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000081210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 110.135811][ T8239] dump_stack+0x137/0x19d [ 110.140380][ T8239] should_fail+0x23c/0x250 [ 110.144887][ T8239] ? __se_sys_memfd_create+0xfb/0x390 [ 110.150483][ T8239] __should_failslab+0x81/0x90 [ 110.155347][ T8239] should_failslab+0x5/0x20 [ 110.160222][ T8239] __kmalloc+0x66/0x340 [ 110.164393][ T8239] ? strnlen_user+0x137/0x1c0 [ 110.169103][ T8239] __se_sys_memfd_create+0xfb/0x390 [ 110.174504][ T8239] __x64_sys_memfd_create+0x2d/0x40 [ 110.180084][ T8239] do_syscall_64+0x4a/0x90 02:22:50 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) [ 110.184820][ T8239] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 110.191368][ T8239] RIP: 0033:0x4665d9 [ 110.195364][ T8239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 110.215560][ T8239] RSP: 002b:00007fd10152ce98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 110.224349][ T8239] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 00000000004665d9 02:22:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x3000, 0x0}}], 0x1, 0x0) [ 110.232386][ T8239] RDX: 0000000000000380 RSI: 0000000000000000 RDI: 00000000004bee66 [ 110.240559][ T8239] RBP: 0000000000000001 R08: 00000000000001c0 R09: 0000000000000000 [ 110.249644][ T8239] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 110.257885][ T8239] R13: 00007ffe6bd29aaf R14: 0000000000000380 R15: 0000000000022000 [ 110.271133][ T8235] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended 02:22:50 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x1) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:50 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="240000b1210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:50 executing program 5 (fault-call:1 fault-nth:1): set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:50 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) [ 110.280540][ T8235] EXT4-fs (loop4): Can't support bigalloc feature without extents feature [ 110.280540][ T8235] 02:22:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xe402, 0x0}}], 0x1, 0x0) 02:22:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, 0x0) [ 110.375306][ T8280] FAULT_INJECTION: forcing a failure. [ 110.375306][ T8280] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 110.388580][ T8280] CPU: 0 PID: 8280 Comm: syz-executor.5 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 110.398670][ T8280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.408959][ T8280] Call Trace: [ 110.412246][ T8280] dump_stack+0x137/0x19d [ 110.416574][ T8280] should_fail+0x23c/0x250 [ 110.420996][ T8280] should_fail_usercopy+0x16/0x20 [ 110.426106][ T8280] _copy_from_user+0x1c/0xd0 [ 110.430700][ T8280] __se_sys_memfd_create+0x137/0x390 [ 110.436003][ T8280] __x64_sys_memfd_create+0x2d/0x40 [ 110.441820][ T8280] do_syscall_64+0x4a/0x90 [ 110.446251][ T8280] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 110.452155][ T8280] RIP: 0033:0x4665d9 [ 110.456081][ T8280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 02:22:50 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) 02:22:50 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) 02:22:50 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000110007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:50 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x1) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xe803, 0x0}}], 0x1, 0x0) 02:22:50 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) [ 110.475914][ T8280] RSP: 002b:00007fd10152ce98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 110.484426][ T8280] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 00000000004665d9 [ 110.492412][ T8280] RDX: 0000000000000380 RSI: 0000000000000000 RDI: 00000000004bee66 [ 110.500560][ T8280] RBP: 0000000000000001 R08: 00000000000001c0 R09: 0000000000000000 [ 110.508774][ T8280] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 110.516849][ T8280] R13: 00007ffe6bd29aaf R14: 0000000000000380 R15: 0000000000022000 02:22:50 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000120007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:50 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) 02:22:50 executing program 5 (fault-call:1 fault-nth:2): set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xf401, 0x0}}], 0x1, 0x0) 02:22:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, 0x0) [ 110.542832][ T8293] loop4: detected capacity change from 0 to 1051 02:22:50 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe020801000108", 0x1b}], 0x1}, 0x0) 02:22:50 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000130007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 110.626699][ T8325] FAULT_INJECTION: forcing a failure. [ 110.626699][ T8325] name failslab, interval 1, probability 0, space 0, times 0 [ 110.639368][ T8325] CPU: 1 PID: 8325 Comm: syz-executor.5 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 110.650051][ T8325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.660194][ T8325] Call Trace: [ 110.663646][ T8325] dump_stack+0x137/0x19d [ 110.668097][ T8325] should_fail+0x23c/0x250 02:22:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x34000, 0x0}}], 0x1, 0x0) 02:22:50 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe020801000108", 0x1b}], 0x1}, 0x0) [ 110.672647][ T8325] ? shmem_alloc_inode+0x22/0x30 [ 110.677606][ T8325] __should_failslab+0x81/0x90 [ 110.682558][ T8325] ? shmem_match+0xa0/0xa0 [ 110.687050][ T8325] should_failslab+0x5/0x20 [ 110.691592][ T8325] kmem_cache_alloc+0x46/0x2f0 [ 110.696533][ T8325] ? do_anonymous_page+0x411/0x8b0 [ 110.701777][ T8325] ? fsnotify_perm+0x59/0x2e0 [ 110.706581][ T8325] ? shmem_match+0xa0/0xa0 [ 110.711149][ T8325] shmem_alloc_inode+0x22/0x30 [ 110.715969][ T8325] new_inode_pseudo+0x38/0x1c0 [ 110.721002][ T8325] new_inode+0x21/0x120 02:22:50 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000140007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:50 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe020801000108", 0x1b}], 0x1}, 0x0) [ 110.725521][ T8325] shmem_get_inode+0xa1/0x480 [ 110.730284][ T8325] __shmem_file_setup+0xf1/0x1d0 [ 110.735984][ T8325] shmem_file_setup+0x37/0x40 [ 110.740942][ T8325] __se_sys_memfd_create+0x1eb/0x390 [ 110.746691][ T8325] __x64_sys_memfd_create+0x2d/0x40 [ 110.752592][ T8325] do_syscall_64+0x4a/0x90 [ 110.753583][ T8328] loop4: detected capacity change from 0 to 1051 [ 110.757651][ T8325] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 110.757679][ T8325] RIP: 0033:0x4665d9 [ 110.757693][ T8325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 110.795872][ T8325] RSP: 002b:00007fd10152ce98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 110.804896][ T8325] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 00000000004665d9 [ 110.813678][ T8325] RDX: 0000000000000380 RSI: 0000000000000000 RDI: 00000000004bee66 [ 110.821807][ T8325] RBP: 0000000000000001 R08: 00000000000001c0 R09: 0000000000000000 [ 110.830159][ T8325] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 110.839098][ T8325] R13: 00007ffe6bd29aaf R14: 0000000000000380 R15: 0000000000022000 [ 110.868106][ T8351] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:22:51 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe0208010001080008001000", 0x20}], 0x1}, 0x0) 02:22:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x40000, 0x0}}], 0x1, 0x0) 02:22:51 executing program 5 (fault-call:1 fault-nth:3): set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:51 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000150007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:51 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:51 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, 0x0) 02:22:51 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe0208010001080008001000", 0x20}], 0x1}, 0x0) [ 111.416934][ T8366] FAULT_INJECTION: forcing a failure. [ 111.416934][ T8366] name failslab, interval 1, probability 0, space 0, times 0 [ 111.430577][ T8366] CPU: 1 PID: 8366 Comm: syz-executor.5 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 111.441512][ T8366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.451786][ T8369] loop4: detected capacity change from 0 to 1051 [ 111.453489][ T8366] Call Trace: 02:22:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x400300, 0x0}}], 0x1, 0x0) 02:22:51 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000160007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 111.453498][ T8366] dump_stack+0x137/0x19d [ 111.468504][ T8366] should_fail+0x23c/0x250 [ 111.473017][ T8366] ? security_inode_alloc+0x30/0x180 [ 111.478721][ T8366] __should_failslab+0x81/0x90 [ 111.483969][ T8366] should_failslab+0x5/0x20 [ 111.486362][ T8375] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 111.488636][ T8366] kmem_cache_alloc+0x46/0x2f0 [ 111.488664][ T8366] security_inode_alloc+0x30/0x180 [ 111.509006][ T8366] inode_init_always+0x20b/0x420 02:22:51 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000180007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:51 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe0208010001080008001000", 0x20}], 0x1}, 0x0) [ 111.514391][ T8366] ? shmem_match+0xa0/0xa0 [ 111.519168][ T8366] new_inode_pseudo+0x73/0x1c0 [ 111.524534][ T8366] new_inode+0x21/0x120 [ 111.529074][ T8366] shmem_get_inode+0xa1/0x480 [ 111.534034][ T8366] __shmem_file_setup+0xf1/0x1d0 [ 111.539272][ T8366] shmem_file_setup+0x37/0x40 [ 111.544530][ T8366] __se_sys_memfd_create+0x1eb/0x390 [ 111.549948][ T8366] __x64_sys_memfd_create+0x2d/0x40 [ 111.555444][ T8366] do_syscall_64+0x4a/0x90 [ 111.560319][ T8366] entry_SYSCALL_64_after_hwframe+0x44/0xae 02:22:51 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400", 0x22}], 0x1}, 0x0) 02:22:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x2000000, 0x0}}], 0x1, 0x0) [ 111.566582][ T8366] RIP: 0033:0x4665d9 [ 111.570598][ T8366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 111.591982][ T8366] RSP: 002b:00007fd10152ce98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 111.601848][ T8366] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 00000000004665d9 02:22:51 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:51 executing program 5 (fault-call:1 fault-nth:4): set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:51 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400", 0x22}], 0x1}, 0x0) [ 111.610521][ T8366] RDX: 0000000000000380 RSI: 0000000000000000 RDI: 00000000004bee66 [ 111.618596][ T8366] RBP: 0000000000000001 R08: 00000000000001c0 R09: 0000000000000000 [ 111.627190][ T8366] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 111.635635][ T8366] R13: 00007ffe6bd29aaf R14: 0000000000000380 R15: 0000000000022000 [ 111.688727][ T8398] FAULT_INJECTION: forcing a failure. [ 111.688727][ T8398] name failslab, interval 1, probability 0, space 0, times 0 [ 111.702153][ T8398] CPU: 1 PID: 8398 Comm: syz-executor.5 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 111.712703][ T8398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.723912][ T8398] Call Trace: [ 111.727712][ T8398] dump_stack+0x137/0x19d [ 111.732356][ T8398] should_fail+0x23c/0x250 [ 111.737328][ T8398] ? __d_alloc+0x36/0x370 [ 111.742530][ T8398] __should_failslab+0x81/0x90 [ 111.747516][ T8398] should_failslab+0x5/0x20 [ 111.752238][ T8398] kmem_cache_alloc+0x46/0x2f0 [ 111.757300][ T8398] ? __init_rwsem+0x59/0x70 [ 111.761806][ T8398] __d_alloc+0x36/0x370 [ 111.766376][ T8398] ? current_time+0xdb/0x190 [ 111.771328][ T8398] d_alloc_pseudo+0x1a/0x50 [ 111.776161][ T8398] alloc_file_pseudo+0x63/0x130 [ 111.781104][ T8398] __shmem_file_setup+0x14c/0x1d0 [ 111.786397][ T8398] shmem_file_setup+0x37/0x40 [ 111.791591][ T8398] __se_sys_memfd_create+0x1eb/0x390 [ 111.797193][ T8398] __x64_sys_memfd_create+0x2d/0x40 [ 111.802854][ T8398] do_syscall_64+0x4a/0x90 [ 111.807292][ T8398] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 111.813276][ T8398] RIP: 0033:0x4665d9 [ 111.817858][ T8398] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 111.840240][ T8398] RSP: 002b:00007fd10152ce98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 111.849791][ T8398] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 00000000004665d9 [ 111.857984][ T8398] RDX: 0000000000000380 RSI: 0000000000000000 RDI: 00000000004bee66 [ 111.866543][ T8398] RBP: 0000000000000001 R08: 00000000000001c0 R09: 0000000000000000 [ 111.874771][ T8398] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 111.883017][ T8398] R13: 00007ffe6bd29aaf R14: 0000000000000380 R15: 0000000000022000 02:22:52 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) 02:22:52 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="240000001a0007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x3000000, 0x0}}], 0x1, 0x0) 02:22:52 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400", 0x22}], 0x1}, 0x0) 02:22:52 executing program 5 (fault-call:1 fault-nth:5): set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 112.269348][ T8420] FAULT_INJECTION: forcing a failure. [ 112.269348][ T8420] name failslab, interval 1, probability 0, space 0, times 0 [ 112.282557][ T8420] CPU: 0 PID: 8420 Comm: syz-executor.5 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 112.292706][ T8420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.302774][ T8420] Call Trace: [ 112.306048][ T8420] dump_stack+0x137/0x19d [ 112.310382][ T8420] should_fail+0x23c/0x250 [ 112.314865][ T8420] ? __alloc_file+0x2e/0x1a0 02:22:52 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="240000001c0007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:52 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff", 0x23}], 0x1}, 0x0) 02:22:52 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff", 0x23}], 0x1}, 0x0) [ 112.319513][ T8420] __should_failslab+0x81/0x90 [ 112.324424][ T8420] should_failslab+0x5/0x20 [ 112.329172][ T8420] kmem_cache_alloc+0x46/0x2f0 [ 112.333950][ T8420] ? inode_doinit_with_dentry+0x382/0x950 [ 112.339670][ T8420] __alloc_file+0x2e/0x1a0 [ 112.344082][ T8420] alloc_empty_file+0xcd/0x1c0 [ 112.348839][ T8420] alloc_file+0x3a/0x280 [ 112.353168][ T8420] alloc_file_pseudo+0xe2/0x130 [ 112.358180][ T8420] __shmem_file_setup+0x14c/0x1d0 [ 112.363409][ T8420] shmem_file_setup+0x37/0x40 02:22:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x4000000, 0x0}}], 0x1, 0x0) [ 112.368097][ T8420] __se_sys_memfd_create+0x1eb/0x390 [ 112.373671][ T8420] __x64_sys_memfd_create+0x2d/0x40 [ 112.379154][ T8420] do_syscall_64+0x4a/0x90 [ 112.383575][ T8420] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 112.389485][ T8420] RIP: 0033:0x4665d9 [ 112.393379][ T8420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 112.405289][ T8424] loop4: detected capacity change from 0 to 1051 02:22:52 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="240000001d0007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:52 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff", 0x23}], 0x1}, 0x0) [ 112.413155][ T8420] RSP: 002b:00007fd10152ce98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 112.413179][ T8420] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 00000000004665d9 [ 112.413189][ T8420] RDX: 0000000000000380 RSI: 0000000000000000 RDI: 00000000004bee66 [ 112.413198][ T8420] RBP: 0000000000000001 R08: 00000000000001c0 R09: 0000000000000000 [ 112.413207][ T8420] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 112.413223][ T8420] R13: 00007ffe6bd29aaf R14: 0000000000000380 R15: 0000000000022000 [ 112.504990][ T8424] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 112.514350][ T8424] EXT4-fs (loop4): Can't support bigalloc feature without extents feature [ 112.514350][ T8424] 02:22:53 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x8000000, 0x0}}], 0x1, 0x0) 02:22:53 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="240000001e0007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:53 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:53 executing program 5 (fault-call:1 fault-nth:6): set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) [ 113.142526][ T8471] FAULT_INJECTION: forcing a failure. [ 113.142526][ T8471] name failslab, interval 1, probability 0, space 0, times 0 [ 113.154639][ T8474] FAULT_INJECTION: forcing a failure. [ 113.154639][ T8474] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 113.155282][ T8471] CPU: 1 PID: 8471 Comm: syz-executor.5 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 113.178385][ T8471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.188434][ T8471] Call Trace: [ 113.191788][ T8471] dump_stack+0x137/0x19d [ 113.196108][ T8471] should_fail+0x23c/0x250 [ 113.200524][ T8471] ? security_file_alloc+0x30/0x190 [ 113.205717][ T8471] __should_failslab+0x81/0x90 [ 113.210528][ T8471] should_failslab+0x5/0x20 [ 113.215119][ T8471] kmem_cache_alloc+0x46/0x2f0 [ 113.220007][ T8471] security_file_alloc+0x30/0x190 [ 113.225017][ T8471] __alloc_file+0x83/0x1a0 [ 113.229433][ T8471] alloc_empty_file+0xcd/0x1c0 [ 113.234199][ T8471] alloc_file+0x3a/0x280 [ 113.238445][ T8471] alloc_file_pseudo+0xe2/0x130 [ 113.243315][ T8471] __shmem_file_setup+0x14c/0x1d0 [ 113.248332][ T8471] shmem_file_setup+0x37/0x40 [ 113.253008][ T8471] __se_sys_memfd_create+0x1eb/0x390 [ 113.258563][ T8471] __x64_sys_memfd_create+0x2d/0x40 [ 113.263830][ T8471] do_syscall_64+0x4a/0x90 [ 113.268320][ T8471] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 113.274195][ T8471] RIP: 0033:0x4665d9 [ 113.278079][ T8471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 113.297859][ T8471] RSP: 002b:00007fd10152ce98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 113.306333][ T8471] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 00000000004665d9 [ 113.314292][ T8471] RDX: 0000000000000380 RSI: 0000000000000000 RDI: 00000000004bee66 [ 113.322288][ T8471] RBP: 0000000000000001 R08: 00000000000001c0 R09: 0000000000000000 [ 113.330346][ T8471] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 02:22:53 executing program 5 (fault-call:1 fault-nth:7): set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 113.338333][ T8471] R13: 00007ffe6bd29aaf R14: 0000000000000380 R15: 0000000000022000 [ 113.346571][ T8474] CPU: 0 PID: 8474 Comm: syz-executor.3 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 113.356836][ T8474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.367238][ T8474] Call Trace: [ 113.370607][ T8474] dump_stack+0x137/0x19d [ 113.375047][ T8474] should_fail+0x23c/0x250 [ 113.378336][ T8481] FAULT_INJECTION: forcing a failure. [ 113.378336][ T8481] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 113.379468][ T8474] should_fail_usercopy+0x16/0x20 [ 113.397750][ T8474] _copy_from_user+0x1c/0xd0 [ 113.402388][ T8474] __copy_msghdr_from_user+0x44/0x350 [ 113.408013][ T8474] ? __fget_light+0x21b/0x260 [ 113.412782][ T8474] __sys_sendmsg+0x135/0x270 [ 113.417446][ T8474] ? kstrtouint_from_user+0x104/0x130 [ 113.422813][ T8474] ? do_anonymous_page+0x411/0x8b0 [ 113.427919][ T8474] ? fsnotify_perm+0x59/0x2e0 [ 113.432595][ T8474] ? __fsnotify_parent+0x32f/0x430 [ 113.437793][ T8474] ? get_pid_task+0x8b/0xc0 [ 113.442293][ T8474] ? vfs_write+0x50c/0x770 [ 113.446699][ T8474] ? __fget_light+0x21b/0x260 [ 113.451388][ T8474] ? __cond_resched+0x11/0x40 [ 113.456042][ T8474] ? fput+0x2d/0x130 [ 113.460018][ T8474] ? ksys_write+0x157/0x180 [ 113.464979][ T8474] __x64_sys_sendmsg+0x42/0x50 [ 113.469726][ T8474] do_syscall_64+0x4a/0x90 [ 113.474297][ T8474] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 113.480524][ T8474] RIP: 0033:0x4665d9 [ 113.484419][ T8474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 113.504662][ T8474] RSP: 002b:00007f146b414188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 113.513228][ T8474] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 113.521271][ T8474] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 113.529247][ T8474] RBP: 00007f146b4141d0 R08: 0000000000000000 R09: 0000000000000000 [ 113.537380][ T8474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.545426][ T8474] R13: 00007ffdf1452e7f R14: 00007f146b414300 R15: 0000000000022000 [ 113.553815][ T8481] CPU: 1 PID: 8481 Comm: syz-executor.5 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 113.564384][ T8481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.574788][ T8481] Call Trace: [ 113.578097][ T8481] dump_stack+0x137/0x19d [ 113.582637][ T8481] should_fail+0x23c/0x250 [ 113.587051][ T8481] __alloc_pages+0x102/0x320 [ 113.591907][ T8481] alloc_page_interleave+0x1e/0xf0 [ 113.597260][ T8481] alloc_pages_vma+0x56e/0x660 [ 113.602037][ T8481] ? __vm_enough_memory+0xdb/0x250 [ 113.607153][ T8481] shmem_getpage_gfp+0x980/0x1410 [ 113.612188][ T8481] ? mls_context_isvalid+0x76/0x1e0 [ 113.617455][ T8481] shmem_write_begin+0x7e/0x100 [ 113.622314][ T8481] generic_perform_write+0x196/0x3a0 [ 113.627587][ T8481] ? file_update_time+0x1bd/0x3e0 [ 113.632676][ T8481] __generic_file_write_iter+0x161/0x300 [ 113.638470][ T8481] ? generic_write_checks+0x250/0x290 [ 113.643872][ T8481] generic_file_write_iter+0x75/0x130 [ 113.649514][ T8481] vfs_write+0x69d/0x770 [ 113.653760][ T8481] __x64_sys_pwrite64+0xf5/0x150 [ 113.658853][ T8481] do_syscall_64+0x4a/0x90 [ 113.663254][ T8481] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 113.669461][ T8481] RIP: 0033:0x419777 [ 113.673463][ T8481] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 02:22:53 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000200007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:53 executing program 3 (fault-call:1 fault-nth:1): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:53 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) [ 113.693663][ T8481] RSP: 002b:00007fd10152ce70 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 113.702474][ T8481] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 113.710946][ T8481] RDX: 0000000000000040 RSI: 00000000200000c0 RDI: 0000000000000004 [ 113.719293][ T8481] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 113.727255][ T8481] R10: 00000000000001c0 R11: 0000000000000293 R12: 0000000000000004 [ 113.735210][ T8481] R13: 0000000000000004 R14: 0000000020000000 R15: 0000000000000000 [ 113.743747][ T8472] loop4: detected capacity change from 0 to 1051 [ 113.753640][ T8472] EXT4-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value [ 113.785109][ T8495] FAULT_INJECTION: forcing a failure. 02:22:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xa000000, 0x0}}], 0x1, 0x0) 02:22:53 executing program 4 (fault-call:3 fault-nth:0): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:53 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000002210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 113.785109][ T8495] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 113.798421][ T8495] CPU: 0 PID: 8495 Comm: syz-executor.3 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 113.808908][ T8495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.819053][ T8495] Call Trace: [ 113.822329][ T8495] dump_stack+0x137/0x19d [ 113.826782][ T8495] should_fail+0x23c/0x250 [ 113.831305][ T8495] should_fail_usercopy+0x16/0x20 [ 113.836338][ T8495] _copy_from_user+0x1c/0xd0 02:22:54 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000003210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 113.841209][ T8495] iovec_from_user+0xc4/0x2d0 [ 113.845957][ T8495] ? should_fail+0xd6/0x250 [ 113.850829][ T8495] __import_iovec+0x49/0x270 [ 113.855536][ T8495] ? __copy_msghdr_from_user+0x232/0x350 [ 113.861172][ T8495] import_iovec+0x69/0x80 [ 113.865500][ T8495] __sys_sendmsg+0x1ab/0x270 [ 113.870087][ T8495] ? do_anonymous_page+0x411/0x8b0 [ 113.873950][ T8481] loop5: detected capacity change from 0 to 1 [ 113.875332][ T8495] ? fsnotify_perm+0x59/0x2e0 [ 113.875354][ T8495] ? __fsnotify_parent+0x32f/0x430 [ 113.891540][ T8495] ? get_pid_task+0x8b/0xc0 02:22:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xf000000, 0x0}}], 0x1, 0x0) 02:22:54 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000004210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 113.896039][ T8495] ? vfs_write+0x50c/0x770 [ 113.901180][ T8495] ? __fget_light+0x21b/0x260 [ 113.905932][ T8495] ? __cond_resched+0x11/0x40 [ 113.910688][ T8495] ? fput+0x2d/0x130 [ 113.914585][ T8495] ? ksys_write+0x157/0x180 [ 113.919084][ T8495] __x64_sys_sendmsg+0x42/0x50 [ 113.923913][ T8495] do_syscall_64+0x4a/0x90 [ 113.928428][ T8495] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 113.934502][ T8495] RIP: 0033:0x4665d9 02:22:54 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000005210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 113.938708][ T8495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 113.959708][ T8495] RSP: 002b:00007f146b414188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 113.969664][ T8495] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 113.978479][ T8495] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 113.987065][ T8495] RBP: 00007f146b4141d0 R08: 0000000000000000 R09: 0000000000000000 02:22:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x10080000, 0x0}}], 0x1, 0x0) [ 113.995287][ T8495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.004217][ T8495] R13: 00007ffdf1452e7f R14: 00007f146b414300 R15: 0000000000022000 [ 114.061958][ T8530] FAULT_INJECTION: forcing a failure. [ 114.061958][ T8530] name failslab, interval 1, probability 0, space 0, times 0 [ 114.075474][ T8530] CPU: 1 PID: 8530 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 114.086435][ T8530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.098551][ T8530] Call Trace: [ 114.102352][ T8530] dump_stack+0x137/0x19d [ 114.107003][ T8530] should_fail+0x23c/0x250 [ 114.111779][ T8530] ? __se_sys_memfd_create+0xfb/0x390 [ 114.117436][ T8530] __should_failslab+0x81/0x90 [ 114.122480][ T8530] should_failslab+0x5/0x20 [ 114.127167][ T8530] __kmalloc+0x66/0x340 [ 114.131530][ T8530] ? strnlen_user+0x137/0x1c0 [ 114.137288][ T8530] __se_sys_memfd_create+0xfb/0x390 [ 114.142622][ T8530] __x64_sys_memfd_create+0x2d/0x40 [ 114.148739][ T8530] do_syscall_64+0x4a/0x90 [ 114.153563][ T8530] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 114.159968][ T8530] RIP: 0033:0x4665d9 [ 114.163915][ T8530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 114.184288][ T8530] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 114.193019][ T8530] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004665d9 [ 114.201448][ T8530] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 02:22:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:54 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000006210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:54 executing program 3 (fault-call:1 fault-nth:2): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 114.210304][ T8530] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 114.218532][ T8530] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 114.226660][ T8530] R13: 0000000020000040 R14: 0000000000083600 R15: 0000000020000080 [ 114.268513][ T8539] FAULT_INJECTION: forcing a failure. [ 114.268513][ T8539] name failslab, interval 1, probability 0, space 0, times 0 [ 114.281615][ T8539] CPU: 1 PID: 8539 Comm: syz-executor.3 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 114.291677][ T8539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.293549][ T8540] loop5: detected capacity change from 0 to 1 [ 114.302075][ T8539] Call Trace: [ 114.302083][ T8539] dump_stack+0x137/0x19d [ 114.302106][ T8539] should_fail+0x23c/0x250 [ 114.302122][ T8539] __should_failslab+0x81/0x90 [ 114.325095][ T8539] should_failslab+0x5/0x20 [ 114.329648][ T8539] kmem_cache_alloc_node+0x58/0x2b0 [ 114.335529][ T8539] ? __alloc_skb+0xed/0x420 [ 114.340693][ T8539] __alloc_skb+0xed/0x420 [ 114.345104][ T8539] netlink_sendmsg+0x4c7/0x7c0 [ 114.349857][ T8539] ? netlink_getsockopt+0x720/0x720 [ 114.355051][ T8539] ____sys_sendmsg+0x360/0x4d0 [ 114.359819][ T8539] ? import_iovec+0x69/0x80 [ 114.364356][ T8539] __sys_sendmsg+0x1ed/0x270 [ 114.368945][ T8539] ? __fsnotify_parent+0x32f/0x430 [ 114.374177][ T8539] ? get_pid_task+0x8b/0xc0 [ 114.378692][ T8539] ? vfs_write+0x50c/0x770 [ 114.383117][ T8539] ? __fget_light+0x21b/0x260 [ 114.387891][ T8539] ? __cond_resched+0x11/0x40 [ 114.393073][ T8539] ? fput+0x2d/0x130 [ 114.397263][ T8539] ? ksys_write+0x157/0x180 [ 114.401766][ T8539] __x64_sys_sendmsg+0x42/0x50 [ 114.406648][ T8539] do_syscall_64+0x4a/0x90 [ 114.411109][ T8539] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 114.417148][ T8539] RIP: 0033:0x4665d9 [ 114.421040][ T8539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 114.441106][ T8539] RSP: 002b:00007f146b414188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 114.449506][ T8539] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 114.457498][ T8539] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 114.465453][ T8539] RBP: 00007f146b4141d0 R08: 0000000000000000 R09: 0000000000000000 [ 114.473610][ T8539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.481602][ T8539] R13: 00007ffdf1452e7f R14: 00007f146b414300 R15: 0000000000022000 [ 114.516250][ T8540] loop5: p1 p2 p3 p4 [ 114.520831][ T8540] loop5: p1 start 10 is beyond EOD, truncated [ 114.527160][ T8540] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 114.534843][ T8540] loop5: p3 start 2127165541 is beyond EOD, truncated [ 114.541840][ T8540] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:22:54 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x11000000, 0x0}}], 0x1, 0x0) 02:22:54 executing program 4 (fault-call:3 fault-nth:1): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:54 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000007210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:54 executing program 3 (fault-call:1 fault-nth:3): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:54 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x2, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x18000000, 0x0}}], 0x1, 0x0) [ 114.638355][ T8559] FAULT_INJECTION: forcing a failure. [ 114.638355][ T8559] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 114.651887][ T8559] CPU: 1 PID: 8559 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 114.662643][ T8559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.672892][ T8559] Call Trace: [ 114.676170][ T8559] dump_stack+0x137/0x19d [ 114.680603][ T8559] should_fail+0x23c/0x250 02:22:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x1c000000, 0x0}}], 0x1, 0x0) 02:22:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x1f000000, 0x0}}], 0x1, 0x0) [ 114.685049][ T8559] should_fail_usercopy+0x16/0x20 [ 114.691583][ T8559] _copy_from_user+0x1c/0xd0 [ 114.696345][ T8559] __se_sys_memfd_create+0x137/0x390 [ 114.701735][ T8559] __x64_sys_memfd_create+0x2d/0x40 [ 114.707029][ T8559] do_syscall_64+0x4a/0x90 [ 114.711460][ T8559] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 114.717358][ T8559] RIP: 0033:0x4665d9 02:22:54 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000009210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 114.721262][ T8559] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 114.742351][ T8559] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 114.750924][ T8559] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004665d9 [ 114.759519][ T8559] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 114.767919][ T8559] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 114.772598][ T8566] loop5: detected capacity change from 0 to 1 [ 114.776156][ T8559] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 114.776171][ T8559] R13: 0000000020000040 R14: 0000000000083600 R15: 0000000020000080 [ 114.794186][ T8577] FAULT_INJECTION: forcing a failure. [ 114.794186][ T8577] name failslab, interval 1, probability 0, space 0, times 0 [ 114.813320][ T8577] CPU: 1 PID: 8577 Comm: syz-executor.3 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 114.824633][ T8577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.835987][ T8577] Call Trace: 02:22:54 executing program 4 (fault-call:3 fault-nth:2): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x30000000, 0x0}}], 0x1, 0x0) [ 114.839532][ T8577] dump_stack+0x137/0x19d [ 114.845096][ T8577] should_fail+0x23c/0x250 [ 114.850341][ T8577] __should_failslab+0x81/0x90 [ 114.855937][ T8577] should_failslab+0x5/0x20 [ 114.860732][ T8577] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 114.866999][ T8577] ? __kmalloc_node_track_caller+0x30/0x40 [ 114.873687][ T8577] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 114.880132][ T8577] __kmalloc_node_track_caller+0x30/0x40 [ 114.886310][ T8577] ? netlink_sendmsg+0x4c7/0x7c0 [ 114.891680][ T8577] __alloc_skb+0x187/0x420 [ 114.896771][ T8577] netlink_sendmsg+0x4c7/0x7c0 [ 114.901999][ T8577] ? netlink_getsockopt+0x720/0x720 [ 114.907537][ T8577] ____sys_sendmsg+0x360/0x4d0 [ 114.912389][ T8577] ? import_iovec+0x69/0x80 [ 114.917235][ T8577] __sys_sendmsg+0x1ed/0x270 [ 114.921926][ T8577] ? __fsnotify_parent+0x32f/0x430 [ 114.928240][ T8577] ? get_pid_task+0x8b/0xc0 [ 114.933208][ T8577] ? vfs_write+0x50c/0x770 [ 114.937998][ T8577] ? __fget_light+0x21b/0x260 [ 114.942835][ T8577] ? __cond_resched+0x11/0x40 [ 114.947894][ T8577] ? fput+0x2d/0x130 [ 114.952348][ T8577] ? ksys_write+0x157/0x180 [ 114.957488][ T8577] __x64_sys_sendmsg+0x42/0x50 [ 114.962542][ T8577] do_syscall_64+0x4a/0x90 [ 114.967236][ T8577] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 114.973910][ T8577] RIP: 0033:0x4665d9 [ 114.978071][ T8577] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 115.000599][ T8577] RSP: 002b:00007f146b414188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 115.009893][ T8577] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 115.018390][ T8577] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 115.027052][ T8577] RBP: 00007f146b4141d0 R08: 0000000000000000 R09: 0000000000000000 [ 115.035109][ T8577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.043353][ T8577] R13: 00007ffdf1452e7f R14: 00007f146b414300 R15: 0000000000022000 [ 115.078937][ T8593] FAULT_INJECTION: forcing a failure. [ 115.078937][ T8593] name failslab, interval 1, probability 0, space 0, times 0 [ 115.091899][ T8593] CPU: 1 PID: 8593 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 115.102469][ T8593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.112551][ T8566] loop5: p1 p2 p3 p4 [ 115.113410][ T8593] Call Trace: [ 115.113418][ T8593] dump_stack+0x137/0x19d [ 115.118097][ T8566] loop5: p1 start 10 is beyond EOD, [ 115.121072][ T8593] should_fail+0x23c/0x250 [ 115.125396][ T8566] truncated [ 115.125403][ T8566] loop5: p2 size 1073872896 extends beyond EOD, [ 115.131051][ T8593] ? shmem_alloc_inode+0x22/0x30 [ 115.131079][ T8593] __should_failslab+0x81/0x90 [ 115.136127][ T8566] truncated [ 115.139314][ T8593] ? shmem_match+0xa0/0xa0 [ 115.164513][ T8593] should_failslab+0x5/0x20 [ 115.169104][ T8593] kmem_cache_alloc+0x46/0x2f0 [ 115.172245][ T8566] loop5: p3 start 2127165541 is beyond EOD, [ 115.173962][ T8593] ? do_anonymous_page+0x411/0x8b0 [ 115.173991][ T8593] ? fsnotify_perm+0x59/0x2e0 [ 115.180310][ T8566] truncated [ 115.185595][ T8593] ? shmem_match+0xa0/0xa0 [ 115.190267][ T8566] loop5: p4 size 3657465856 extends beyond EOD, [ 115.193422][ T8593] shmem_alloc_inode+0x22/0x30 [ 115.197956][ T8566] truncated [ 115.204532][ T8593] new_inode_pseudo+0x38/0x1c0 [ 115.218513][ T8593] new_inode+0x21/0x120 [ 115.223317][ T8593] shmem_get_inode+0xa1/0x480 [ 115.228003][ T8593] __shmem_file_setup+0xf1/0x1d0 [ 115.233048][ T8593] shmem_file_setup+0x37/0x40 [ 115.238255][ T8593] __se_sys_memfd_create+0x1eb/0x390 [ 115.243638][ T8593] __x64_sys_memfd_create+0x2d/0x40 [ 115.250833][ T8593] do_syscall_64+0x4a/0x90 [ 115.255348][ T8593] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 115.261875][ T8593] RIP: 0033:0x4665d9 [ 115.265975][ T8593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 115.287453][ T8593] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 115.296290][ T8593] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004665d9 [ 115.304375][ T8593] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 115.313290][ T8593] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 115.321951][ T8593] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 115.330189][ T8593] R13: 0000000020000040 R14: 0000000000083600 R15: 0000000020000080 02:22:55 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c896", 0x17}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:55 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="240000b1210007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x97ffffff, 0x0}}], 0x1, 0x0) 02:22:55 executing program 3 (fault-call:1 fault-nth:4): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:55 executing program 4 (fault-call:3 fault-nth:3): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:55 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x3, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:55 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000770007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 115.625559][ T8623] FAULT_INJECTION: forcing a failure. [ 115.625559][ T8623] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 115.638645][ T8623] CPU: 1 PID: 8623 Comm: syz-executor.3 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 115.649717][ T8623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.661080][ T8627] loop5: detected capacity change from 0 to 1 [ 115.661342][ T8623] Call Trace: [ 115.661350][ T8623] dump_stack+0x137/0x19d [ 115.674832][ T8626] FAULT_INJECTION: forcing a failure. [ 115.674832][ T8626] name failslab, interval 1, probability 0, space 0, times 0 [ 115.675964][ T8623] should_fail+0x23c/0x250 [ 115.675987][ T8623] should_fail_usercopy+0x16/0x20 [ 115.676003][ T8623] _copy_from_iter_full+0x148/0xa10 [ 115.705117][ T8623] ? check_stack_object+0x61/0x70 [ 115.710249][ T8623] ? __virt_addr_valid+0x15a/0x1a0 [ 115.716201][ T8623] ? __check_object_size+0x253/0x310 [ 115.723075][ T8623] netlink_sendmsg+0x579/0x7c0 [ 115.728571][ T8623] ? netlink_getsockopt+0x720/0x720 [ 115.734121][ T8623] ____sys_sendmsg+0x360/0x4d0 [ 115.738980][ T8623] ? import_iovec+0x69/0x80 [ 115.743568][ T8623] __sys_sendmsg+0x1ed/0x270 [ 115.748674][ T8623] ? __fsnotify_parent+0x32f/0x430 [ 115.753849][ T8623] ? get_pid_task+0x8b/0xc0 [ 115.758618][ T8623] ? vfs_write+0x50c/0x770 [ 115.763197][ T8623] ? __fget_light+0x21b/0x260 [ 115.767983][ T8623] ? __cond_resched+0x11/0x40 [ 115.773012][ T8623] ? fput+0x2d/0x130 [ 115.777043][ T8623] ? ksys_write+0x157/0x180 [ 115.781978][ T8623] __x64_sys_sendmsg+0x42/0x50 [ 115.787104][ T8623] do_syscall_64+0x4a/0x90 [ 115.791592][ T8623] ? irqentry_exit_to_user_mode+0x5/0x20 [ 115.797628][ T8623] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 115.804697][ T8623] RIP: 0033:0x4665d9 [ 115.808817][ T8623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 115.829489][ T8623] RSP: 002b:00007f146b414188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 115.839621][ T8623] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 115.849171][ T8623] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 115.858156][ T8623] RBP: 00007f146b4141d0 R08: 0000000000000000 R09: 0000000000000000 [ 115.866487][ T8623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.875854][ T8623] R13: 00007ffdf1452e7f R14: 00007f146b414300 R15: 0000000000022000 [ 115.885375][ T8626] CPU: 0 PID: 8626 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 115.896167][ T8626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.906519][ T8626] Call Trace: [ 115.909933][ T8626] dump_stack+0x137/0x19d [ 115.914396][ T8626] should_fail+0x23c/0x250 [ 115.919172][ T8626] ? security_inode_alloc+0x30/0x180 02:22:56 executing program 3 (fault-call:1 fault-nth:5): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xe4020000, 0x0}}], 0x1, 0x0) 02:22:56 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000100007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 115.924601][ T8626] __should_failslab+0x81/0x90 [ 115.926143][ T8638] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=8638 comm=syz-executor.0 [ 115.929986][ T8626] should_failslab+0x5/0x20 [ 115.930006][ T8626] kmem_cache_alloc+0x46/0x2f0 [ 115.930026][ T8626] security_inode_alloc+0x30/0x180 [ 115.959252][ T8626] inode_init_always+0x20b/0x420 [ 115.964196][ T8626] ? shmem_match+0xa0/0xa0 [ 115.968907][ T8626] new_inode_pseudo+0x73/0x1c0 [ 115.973981][ T8626] new_inode+0x21/0x120 [ 115.978143][ T8626] shmem_get_inode+0xa1/0x480 [ 115.982913][ T8626] __shmem_file_setup+0xf1/0x1d0 [ 115.987991][ T8626] shmem_file_setup+0x37/0x40 [ 115.993001][ T8626] __se_sys_memfd_create+0x1eb/0x390 [ 115.998364][ T8626] __x64_sys_memfd_create+0x2d/0x40 [ 116.003916][ T8626] do_syscall_64+0x4a/0x90 [ 116.008574][ T8626] ? irqentry_exit_to_user_mode+0x5/0x20 [ 116.014196][ T8626] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 116.020163][ T8626] RIP: 0033:0x4665d9 [ 116.024056][ T8626] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 116.045111][ T8626] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 116.053788][ T8626] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004665d9 [ 116.062229][ T8626] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 116.070206][ T8626] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff 02:22:56 executing program 4 (fault-call:3 fault-nth:4): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 116.078258][ T8626] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 116.086285][ T8626] R13: 0000000020000040 R14: 0000000000083600 R15: 0000000020000080 [ 116.115670][ T8627] loop5: p1 p2 p3 p4 [ 116.125685][ T8627] loop5: p1 start 10 is beyond EOD, truncated [ 116.131862][ T8627] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 116.143868][ T8646] FAULT_INJECTION: forcing a failure. [ 116.143868][ T8646] name failslab, interval 1, probability 0, space 0, times 0 [ 116.156793][ T8646] CPU: 1 PID: 8646 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 116.159462][ T8648] FAULT_INJECTION: forcing a failure. [ 116.159462][ T8648] name failslab, interval 1, probability 0, space 0, times 0 [ 116.167266][ T8646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.190286][ T8646] Call Trace: [ 116.193661][ T8646] dump_stack+0x137/0x19d [ 116.198076][ T8646] should_fail+0x23c/0x250 [ 116.202520][ T8646] ? __d_alloc+0x36/0x370 [ 116.206840][ T8646] __should_failslab+0x81/0x90 [ 116.211718][ T8646] should_failslab+0x5/0x20 [ 116.216202][ T8646] kmem_cache_alloc+0x46/0x2f0 [ 116.220968][ T8646] ? __init_rwsem+0x59/0x70 [ 116.225471][ T8646] __d_alloc+0x36/0x370 [ 116.229680][ T8646] ? current_time+0xdb/0x190 [ 116.234618][ T8646] d_alloc_pseudo+0x1a/0x50 [ 116.239107][ T8646] alloc_file_pseudo+0x63/0x130 [ 116.243938][ T8646] __shmem_file_setup+0x14c/0x1d0 [ 116.249029][ T8646] shmem_file_setup+0x37/0x40 [ 116.253807][ T8646] __se_sys_memfd_create+0x1eb/0x390 [ 116.259173][ T8646] __x64_sys_memfd_create+0x2d/0x40 [ 116.264453][ T8646] do_syscall_64+0x4a/0x90 [ 116.268852][ T8646] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 116.274730][ T8646] RIP: 0033:0x4665d9 [ 116.278686][ T8646] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 116.298363][ T8646] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 116.307105][ T8646] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004665d9 [ 116.315406][ T8646] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 02:22:56 executing program 4 (fault-call:3 fault-nth:5): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 116.323569][ T8646] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 116.331613][ T8646] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 116.339670][ T8646] R13: 0000000020000040 R14: 0000000000083600 R15: 0000000020000080 [ 116.347684][ T8648] CPU: 0 PID: 8648 Comm: syz-executor.3 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 116.358310][ T8648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.368454][ T8648] Call Trace: [ 116.371732][ T8648] dump_stack+0x137/0x19d [ 116.374975][ T8653] FAULT_INJECTION: forcing a failure. [ 116.374975][ T8653] name failslab, interval 1, probability 0, space 0, times 0 [ 116.376085][ T8648] should_fail+0x23c/0x250 [ 116.376107][ T8648] __should_failslab+0x81/0x90 [ 116.376126][ T8648] should_failslab+0x5/0x20 [ 116.376141][ T8648] kmem_cache_alloc_node+0x58/0x2b0 [ 116.407683][ T8648] ? __alloc_skb+0xed/0x420 [ 116.412484][ T8648] __alloc_skb+0xed/0x420 [ 116.417526][ T8648] netlink_ack+0x292/0x690 [ 116.422587][ T8648] netlink_rcv_skb+0x1b7/0x240 [ 116.428284][ T8648] ? rtnetlink_bind+0x60/0x60 [ 116.433468][ T8648] rtnetlink_rcv+0x18/0x20 [ 116.438435][ T8648] netlink_unicast+0x5ec/0x6b0 [ 116.443919][ T8648] netlink_sendmsg+0x6f8/0x7c0 [ 116.449397][ T8648] ? netlink_getsockopt+0x720/0x720 [ 116.454617][ T8648] ____sys_sendmsg+0x360/0x4d0 [ 116.460064][ T8648] ? import_iovec+0x69/0x80 [ 116.464978][ T8648] __sys_sendmsg+0x1ed/0x270 [ 116.469915][ T8648] ? __fsnotify_parent+0x32f/0x430 [ 116.475370][ T8648] ? get_pid_task+0x8b/0xc0 [ 116.480466][ T8648] ? vfs_write+0x50c/0x770 [ 116.485127][ T8648] ? __fget_light+0x21b/0x260 [ 116.489912][ T8648] ? __cond_resched+0x11/0x40 [ 116.495185][ T8648] ? fput+0x2d/0x130 [ 116.499276][ T8648] ? ksys_write+0x157/0x180 [ 116.504209][ T8648] __x64_sys_sendmsg+0x42/0x50 [ 116.509320][ T8648] do_syscall_64+0x4a/0x90 [ 116.513738][ T8648] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 116.520580][ T8648] RIP: 0033:0x4665d9 [ 116.524905][ T8648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 116.546301][ T8648] RSP: 002b:00007f146b414188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 116.556845][ T8648] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 116.565836][ T8648] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 116.574053][ T8648] RBP: 00007f146b4141d0 R08: 0000000000000000 R09: 0000000000000000 [ 116.582357][ T8648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.591033][ T8648] R13: 00007ffdf1452e7f R14: 00007f146b414300 R15: 0000000000022000 [ 116.599101][ T8653] CPU: 1 PID: 8653 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 116.610790][ T8653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.617598][ T8627] loop5: p3 start 2127165541 is beyond EOD, [ 116.622339][ T8653] Call Trace: [ 116.622349][ T8653] dump_stack+0x137/0x19d [ 116.628341][ T8627] truncated [ 116.631764][ T8653] should_fail+0x23c/0x250 [ 116.636755][ T8627] loop5: p4 size 3657465856 extends beyond EOD, [ 116.639820][ T8653] ? __alloc_file+0x2e/0x1a0 [ 116.644504][ T8627] truncated [ 116.659853][ T8653] __should_failslab+0x81/0x90 [ 116.665409][ T8653] should_failslab+0x5/0x20 [ 116.670797][ T8653] kmem_cache_alloc+0x46/0x2f0 [ 116.676285][ T8653] ? inode_doinit_with_dentry+0x382/0x950 [ 116.682545][ T8653] __alloc_file+0x2e/0x1a0 [ 116.687161][ T8653] alloc_empty_file+0xcd/0x1c0 [ 116.692114][ T8653] alloc_file+0x3a/0x280 [ 116.696637][ T8653] alloc_file_pseudo+0xe2/0x130 [ 116.701863][ T8653] __shmem_file_setup+0x14c/0x1d0 [ 116.707338][ T8653] shmem_file_setup+0x37/0x40 [ 116.712201][ T8653] __se_sys_memfd_create+0x1eb/0x390 [ 116.717979][ T8653] __x64_sys_memfd_create+0x2d/0x40 [ 116.723467][ T8653] do_syscall_64+0x4a/0x90 02:22:56 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c896", 0x17}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:56 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000110007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:56 executing program 3 (fault-call:1 fault-nth:6): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:56 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x4, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xe8030000, 0x0}}], 0x1, 0x0) [ 116.728078][ T8653] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 116.734065][ T8653] RIP: 0033:0x4665d9 [ 116.738530][ T8653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 116.760203][ T8653] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 116.769589][ T8653] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004665d9 [ 116.777742][ T8653] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 116.785765][ T8653] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 116.794133][ T8653] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 116.802748][ T8653] R13: 0000000020000040 R14: 0000000000083600 R15: 0000000020000080 [ 116.805989][ T8676] FAULT_INJECTION: forcing a failure. [ 116.805989][ T8676] name failslab, interval 1, probability 0, space 0, times 0 [ 116.824333][ T8676] CPU: 0 PID: 8676 Comm: syz-executor.3 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 116.834492][ T8676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.844735][ T8676] Call Trace: [ 116.848109][ T8676] dump_stack+0x137/0x19d [ 116.852628][ T8676] should_fail+0x23c/0x250 [ 116.857320][ T8676] __should_failslab+0x81/0x90 [ 116.861306][ T8681] FAULT_INJECTION: forcing a failure. [ 116.861306][ T8681] name failslab, interval 1, probability 0, space 0, times 0 [ 116.862629][ T8676] should_failslab+0x5/0x20 [ 116.862650][ T8676] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 116.887319][ T8676] ? __kmalloc_node_track_caller+0x30/0x40 [ 116.893596][ T8676] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 116.899347][ T8676] __kmalloc_node_track_caller+0x30/0x40 [ 116.905085][ T8676] ? netlink_ack+0x292/0x690 [ 116.909687][ T8676] __alloc_skb+0x187/0x420 [ 116.914260][ T8676] netlink_ack+0x292/0x690 [ 116.918701][ T8676] netlink_rcv_skb+0x1b7/0x240 [ 116.923527][ T8676] ? rtnetlink_bind+0x60/0x60 [ 116.928243][ T8676] rtnetlink_rcv+0x18/0x20 [ 116.932708][ T8676] netlink_unicast+0x5ec/0x6b0 [ 116.937492][ T8676] netlink_sendmsg+0x6f8/0x7c0 [ 116.942244][ T8676] ? netlink_getsockopt+0x720/0x720 [ 116.947425][ T8676] ____sys_sendmsg+0x360/0x4d0 [ 116.952304][ T8676] ? import_iovec+0x69/0x80 [ 116.956902][ T8676] __sys_sendmsg+0x1ed/0x270 [ 116.961489][ T8676] ? __fsnotify_parent+0x32f/0x430 [ 116.966817][ T8676] ? get_pid_task+0x8b/0xc0 [ 116.971473][ T8676] ? vfs_write+0x50c/0x770 [ 116.975870][ T8676] ? __fget_light+0x21b/0x260 [ 116.980608][ T8676] ? __cond_resched+0x11/0x40 [ 116.985267][ T8676] ? fput+0x2d/0x130 [ 116.989152][ T8676] ? ksys_write+0x157/0x180 [ 116.993643][ T8676] __x64_sys_sendmsg+0x42/0x50 [ 116.998634][ T8676] do_syscall_64+0x4a/0x90 [ 117.003145][ T8676] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 117.009288][ T8676] RIP: 0033:0x4665d9 [ 117.013164][ T8676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 02:22:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xeffdffff, 0x0}}], 0x1, 0x0) 02:22:57 executing program 4 (fault-call:3 fault-nth:6): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 117.033148][ T8676] RSP: 002b:00007f146b414188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 117.041890][ T8676] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 117.050166][ T8676] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 117.059961][ T8676] RBP: 00007f146b4141d0 R08: 0000000000000000 R09: 0000000000000000 [ 117.067915][ T8676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 117.075972][ T8676] R13: 00007ffdf1452e7f R14: 00007f146b414300 R15: 0000000000022000 [ 117.083938][ T8681] CPU: 1 PID: 8681 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 117.094097][ T8681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.104534][ T8681] Call Trace: [ 117.107903][ T8681] dump_stack+0x137/0x19d [ 117.112236][ T8681] should_fail+0x23c/0x250 [ 117.116780][ T8681] ? security_file_alloc+0x30/0x190 [ 117.122432][ T8681] __should_failslab+0x81/0x90 [ 117.127498][ T8681] should_failslab+0x5/0x20 02:22:57 executing program 3 (fault-call:1 fault-nth:7): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:57 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000120007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 117.132009][ T8681] kmem_cache_alloc+0x46/0x2f0 [ 117.137096][ T8681] security_file_alloc+0x30/0x190 [ 117.142389][ T8681] __alloc_file+0x83/0x1a0 [ 117.146903][ T8681] alloc_empty_file+0xcd/0x1c0 [ 117.151850][ T8681] alloc_file+0x3a/0x280 [ 117.156123][ T8681] alloc_file_pseudo+0xe2/0x130 [ 117.160989][ T8681] __shmem_file_setup+0x14c/0x1d0 [ 117.166032][ T8681] shmem_file_setup+0x37/0x40 [ 117.171144][ T8681] __se_sys_memfd_create+0x1eb/0x390 [ 117.173161][ T8691] FAULT_INJECTION: forcing a failure. [ 117.173161][ T8691] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 117.176783][ T8681] __x64_sys_memfd_create+0x2d/0x40 [ 117.195180][ T8681] do_syscall_64+0x4a/0x90 [ 117.199653][ T8681] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 117.205636][ T8681] RIP: 0033:0x4665d9 [ 117.209515][ T8681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 117.229283][ T8681] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 117.237737][ T8681] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004665d9 [ 117.245801][ T8681] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00000000004bee66 [ 117.253765][ T8681] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 117.263916][ T8681] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 117.271878][ T8681] R13: 0000000020000040 R14: 0000000000083600 R15: 0000000020000080 [ 117.280030][ T8691] CPU: 0 PID: 8691 Comm: syz-executor.3 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 117.290119][ T8691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.300964][ T8691] Call Trace: [ 117.304245][ T8691] dump_stack+0x137/0x19d [ 117.308576][ T8691] should_fail+0x23c/0x250 [ 117.313088][ T8691] should_fail_usercopy+0x16/0x20 [ 117.318457][ T8691] _copy_to_user+0x1c/0x90 [ 117.322881][ T8691] simple_read_from_buffer+0xab/0x120 [ 117.328266][ T8691] proc_fail_nth_read+0xf6/0x140 [ 117.328989][ T8694] FAULT_INJECTION: forcing a failure. [ 117.328989][ T8694] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 117.333212][ T8691] ? rw_verify_area+0x136/0x250 [ 117.351576][ T8691] ? proc_fault_inject_write+0x200/0x200 [ 117.357201][ T8691] vfs_read+0x154/0x5d0 [ 117.361345][ T8691] ? __fget_light+0x21b/0x260 [ 117.366016][ T8691] ? __cond_resched+0x11/0x40 [ 117.370672][ T8691] ksys_read+0xce/0x180 [ 117.374900][ T8691] __x64_sys_read+0x3e/0x50 [ 117.379831][ T8691] do_syscall_64+0x4a/0x90 [ 117.384231][ T8691] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 117.390117][ T8691] RIP: 0033:0x41935c [ 117.394000][ T8691] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 117.413674][ T8691] RSP: 002b:00007f146b414170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 117.422132][ T8691] RAX: ffffffffffffffda RBX: 0000000000000024 RCX: 000000000041935c 02:22:57 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000130007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:57 executing program 4 (fault-call:3 fault-nth:7): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 117.430377][ T8691] RDX: 000000000000000f RSI: 00007f146b4141e0 RDI: 0000000000000004 [ 117.438331][ T8691] RBP: 00007f146b4141d0 R08: 0000000000000000 R09: 0000000000000000 [ 117.446465][ T8691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 117.454419][ T8691] R13: 00007ffdf1452e7f R14: 00007f146b414300 R15: 0000000000022000 [ 117.462419][ T8694] CPU: 1 PID: 8694 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 117.472482][ T8694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 02:22:57 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 117.482547][ T8694] Call Trace: [ 117.485849][ T8694] dump_stack+0x137/0x19d [ 117.490187][ T8694] should_fail+0x23c/0x250 [ 117.494695][ T8694] __alloc_pages+0x102/0x320 [ 117.499691][ T8694] alloc_pages_vma+0x391/0x660 [ 117.504509][ T8694] shmem_getpage_gfp+0x980/0x1410 [ 117.509686][ T8694] ? mls_context_isvalid+0x76/0x1e0 [ 117.512942][ T8675] loop5: detected capacity change from 0 to 1 [ 117.514897][ T8694] shmem_write_begin+0x7e/0x100 [ 117.514926][ T8694] generic_perform_write+0x196/0x3a0 [ 117.514966][ T8694] ? file_update_time+0x1bd/0x3e0 [ 117.536815][ T8694] __generic_file_write_iter+0x161/0x300 [ 117.542576][ T8694] ? generic_write_checks+0x250/0x290 [ 117.548065][ T8694] generic_file_write_iter+0x75/0x130 [ 117.553477][ T8694] vfs_write+0x69d/0x770 [ 117.557829][ T8694] __x64_sys_pwrite64+0xf5/0x150 [ 117.563111][ T8694] do_syscall_64+0x4a/0x90 [ 117.567611][ T8694] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 117.574206][ T8694] RIP: 0033:0x419777 02:22:57 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c896", 0x17}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:57 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000140007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xf4010000, 0x0}}], 0x1, 0x0) [ 117.578187][ T8694] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 117.598751][ T8694] RSP: 002b:00007f71cabe1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 117.607343][ T8694] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 117.615606][ T8694] RDX: 0000000000000066 RSI: 0000000020000480 RDI: 0000000000000005 [ 117.622328][ T8708] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 117.623659][ T8694] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 117.623673][ T8694] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005 [ 117.623685][ T8694] R13: 0000000000000005 R14: 0000000020000540 R15: 0000000000000000 [ 117.672609][ T8675] loop5: p1 p2 p3 p4 [ 117.676957][ T8675] loop5: p1 start 10 is beyond EOD, truncated 02:22:57 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x5, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:57 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:57 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000150007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xfeffffff, 0x0}}], 0x1, 0x0) [ 117.683027][ T8675] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 117.694679][ T8694] loop4: detected capacity change from 0 to 1051 [ 117.694997][ T8675] loop5: p3 start 2127165541 is beyond EOD, truncated [ 117.708036][ T8675] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 117.715766][ T8694] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:22:57 executing program 4 (fault-call:3 fault-nth:8): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 117.756900][ T1035] loop5: p1 p2 p3 p4 [ 117.763545][ T1035] loop5: p1 start 10 is beyond EOD, truncated [ 117.770348][ T1035] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 117.775818][ T8732] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 117.795011][ T8735] FAULT_INJECTION: forcing a failure. 02:22:57 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:57 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000160007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:57 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 117.795011][ T8735] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 117.808779][ T8735] CPU: 0 PID: 8735 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 117.819030][ T8735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.829150][ T8735] Call Trace: [ 117.832499][ T8735] dump_stack+0x137/0x19d [ 117.836834][ T8735] should_fail+0x23c/0x250 [ 117.841408][ T8735] should_fail_usercopy+0x16/0x20 [ 117.846706][ T8735] iov_iter_copy_from_user_atomic+0x281/0xb60 02:22:58 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000180007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 117.852641][ T1035] loop5: p3 start 2127165541 is beyond EOD, truncated [ 117.852781][ T8735] ? shmem_write_begin+0x7e/0x100 [ 117.859591][ T1035] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 117.864552][ T8735] generic_perform_write+0x1e4/0x3a0 [ 117.864576][ T8735] ? file_update_time+0x1bd/0x3e0 [ 117.882534][ T8735] __generic_file_write_iter+0x161/0x300 [ 117.888203][ T8735] ? generic_write_checks+0x250/0x290 [ 117.893735][ T8735] generic_file_write_iter+0x75/0x130 [ 117.899205][ T8735] vfs_write+0x69d/0x770 [ 117.903454][ T8735] __x64_sys_pwrite64+0xf5/0x150 [ 117.908395][ T8735] do_syscall_64+0x4a/0x90 [ 117.912870][ T8735] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 117.919043][ T8735] RIP: 0033:0x419777 [ 117.922941][ T8735] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 117.942932][ T8735] RSP: 002b:00007f71cabe1f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 117.951517][ T8735] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419777 [ 117.959575][ T8735] RDX: 0000000000000066 RSI: 0000000020000480 RDI: 0000000000000005 [ 117.967725][ T8735] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 117.975915][ T8735] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005 [ 117.984067][ T8735] R13: 0000000000000005 R14: 0000000020000540 R15: 0000000000000000 [ 117.994709][ T8735] loop4: detected capacity change from 0 to 1051 [ 118.003143][ T8735] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 118.012802][ T8735] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 118.025187][ T8735] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 118.037445][ T8735] EXT4-fs (loop4): get root inode failed [ 118.043101][ T8735] EXT4-fs (loop4): mount failed [ 118.118125][ T8757] loop5: detected capacity change from 0 to 1 [ 118.165854][ T8757] loop5: p1 p2 p3 p4 [ 118.169975][ T8757] loop5: p1 start 10 is beyond EOD, truncated [ 118.176267][ T8757] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 118.184424][ T8757] loop5: p3 start 2127165541 is beyond EOD, truncated [ 118.191605][ T8757] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 118.260000][ T8757] __loop_clr_fd: partition scan of loop5 failed (rc=-16) 02:22:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000ff", 0x23}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xffff0000, 0x0}}], 0x1, 0x0) 02:22:58 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:58 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:58 executing program 4 (fault-call:3 fault-nth:9): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:58 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x6, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:58 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:58 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="240000001a0007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:58 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 118.580070][ T8786] loop5: detected capacity change from 0 to 1 [ 118.591637][ T8790] FAULT_INJECTION: forcing a failure. [ 118.591637][ T8790] name failslab, interval 1, probability 0, space 0, times 0 [ 118.604411][ T8790] CPU: 1 PID: 8790 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 118.614475][ T8790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.625187][ T8790] Call Trace: 02:22:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xfffffdef, 0x0}}], 0x1, 0x0) [ 118.628468][ T8790] dump_stack+0x137/0x19d [ 118.633005][ T8790] should_fail+0x23c/0x250 [ 118.637957][ T8790] ? getname_flags+0x84/0x3d0 [ 118.643253][ T8790] __should_failslab+0x81/0x90 [ 118.648093][ T8790] should_failslab+0x5/0x20 [ 118.652953][ T8790] kmem_cache_alloc+0x46/0x2f0 [ 118.657992][ T8790] getname_flags+0x84/0x3d0 [ 118.662685][ T8790] ? vfs_write+0x50c/0x770 [ 118.667350][ T8790] getname+0x15/0x20 [ 118.672446][ T8790] do_sys_openat2+0x5b/0x250 [ 118.677353][ T8790] __x64_sys_openat+0xef/0x110 [ 118.682275][ T8790] do_syscall_64+0x4a/0x90 [ 118.687112][ T8790] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 118.693730][ T8790] RIP: 0033:0x4196c4 [ 118.697615][ T8790] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 118.718487][ T8790] RSP: 002b:00007f71cabe1ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 118.726948][ T8790] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 118.735650][ T8790] RDX: 0000000000000002 RSI: 00007f71cabe2000 RDI: 00000000ffffff9c [ 118.743730][ T8790] RBP: 00007f71cabe2000 R08: 0000000000000000 R09: ffffffffffffffff [ 118.753144][ T8790] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 118.761279][ T8790] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 02:22:58 executing program 4 (fault-call:3 fault-nth:10): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 118.791487][ T8786] loop5: p1 p2 p3 p4 [ 118.796440][ T8786] loop5: p1 start 10 is beyond EOD, truncated [ 118.802804][ T8786] loop5: p2 size 1073872896 extends beyond EOD, truncated 02:22:59 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="240000001c0007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 118.832548][ T8813] FAULT_INJECTION: forcing a failure. [ 118.832548][ T8813] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 118.846330][ T8813] CPU: 1 PID: 8813 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 118.856979][ T8813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.867227][ T8813] Call Trace: [ 118.870677][ T8813] dump_stack+0x137/0x19d [ 118.875013][ T8813] should_fail+0x23c/0x250 [ 118.879537][ T8813] should_fail_usercopy+0x16/0x20 [ 118.884918][ T8813] strncpy_from_user+0x21/0x250 [ 118.889992][ T8813] getname_flags+0xb8/0x3d0 [ 118.894624][ T8813] ? vfs_write+0x50c/0x770 [ 118.899589][ T8813] getname+0x15/0x20 [ 118.904230][ T8813] do_sys_openat2+0x5b/0x250 [ 118.909150][ T8813] __x64_sys_openat+0xef/0x110 [ 118.914055][ T8813] do_syscall_64+0x4a/0x90 [ 118.916179][ T8786] loop5: p3 start 2127165541 is beyond EOD, [ 118.919451][ T8813] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 118.925627][ T8786] truncated [ 118.931473][ T8813] RIP: 0033:0x4196c4 [ 118.934666][ T8786] loop5: p4 size 3657465856 extends beyond EOD, [ 118.938856][ T8813] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 118.938934][ T8786] truncated [ 118.945197][ T8813] RSP: 002b:00007f71cabe1ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 118.945216][ T8813] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 118.945227][ T8813] RDX: 0000000000000002 RSI: 00007f71cabe2000 RDI: 00000000ffffff9c [ 118.998244][ T8813] RBP: 00007f71cabe2000 R08: 0000000000000000 R09: ffffffffffffffff [ 119.006854][ T8813] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 119.014818][ T8813] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 02:22:59 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000ff", 0x23}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:22:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xffffff7f, 0x0}}], 0x1, 0x0) 02:22:59 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="240000001d0007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:59 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:59 executing program 4 (fault-call:3 fault-nth:11): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:22:59 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x7, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:22:59 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 119.437080][ T8833] FAULT_INJECTION: forcing a failure. [ 119.437080][ T8833] name failslab, interval 1, probability 0, space 0, times 0 [ 119.449728][ T8833] CPU: 0 PID: 8833 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 119.450231][ T8838] loop5: detected capacity change from 0 to 1 [ 119.459979][ T8833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.459993][ T8833] Call Trace: [ 119.460000][ T8833] dump_stack+0x137/0x19d 02:22:59 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="240000001e0007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:59 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x148, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:22:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xffffff97, 0x0}}], 0x1, 0x0) [ 119.460023][ T8833] should_fail+0x23c/0x250 [ 119.489047][ T8833] ? __alloc_file+0x2e/0x1a0 [ 119.494000][ T8833] __should_failslab+0x81/0x90 [ 119.498952][ T8833] should_failslab+0x5/0x20 [ 119.503630][ T8833] kmem_cache_alloc+0x46/0x2f0 [ 119.508691][ T8833] __alloc_file+0x2e/0x1a0 [ 119.513258][ T8833] alloc_empty_file+0xcd/0x1c0 [ 119.518112][ T8833] path_openat+0x6a/0x20b0 [ 119.522604][ T8833] ? iov_iter_advance+0x291/0xe10 [ 119.527782][ T8833] ? shmem_write_end+0x37d/0x3d0 [ 119.532798][ T8833] ? balance_dirty_pages_ratelimited+0xb1/0x280 [ 119.539134][ T8833] ? generic_perform_write+0x332/0x3a0 [ 119.544961][ T8833] do_filp_open+0xd9/0x1f0 [ 119.549386][ T8833] ? __virt_addr_valid+0x15a/0x1a0 [ 119.554616][ T8833] ? __check_object_size+0x253/0x310 [ 119.559972][ T8833] ? _find_next_bit+0x16a/0x190 [ 119.565070][ T8833] ? alloc_fd+0x388/0x3e0 [ 119.569682][ T8833] do_sys_openat2+0xa3/0x250 [ 119.574395][ T8833] __x64_sys_openat+0xef/0x110 [ 119.579179][ T8833] do_syscall_64+0x4a/0x90 [ 119.583651][ T8833] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 119.589736][ T8833] RIP: 0033:0x4196c4 [ 119.593717][ T8833] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 119.613600][ T8833] RSP: 002b:00007f71cabe1ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 119.622274][ T8833] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 02:22:59 executing program 4 (fault-call:3 fault-nth:12): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 119.630234][ T8833] RDX: 0000000000000002 RSI: 00007f71cabe2000 RDI: 00000000ffffff9c [ 119.638491][ T8833] RBP: 00007f71cabe2000 R08: 0000000000000000 R09: ffffffffffffffff [ 119.646458][ T8833] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 119.654503][ T8833] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 [ 119.702944][ T8838] loop5: p1 p2 p3 p4 [ 119.711775][ T8838] loop5: p1 start 10 is beyond EOD, truncated [ 119.718174][ T8838] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 119.720293][ T8858] FAULT_INJECTION: forcing a failure. [ 119.720293][ T8858] name failslab, interval 1, probability 0, space 0, times 0 [ 119.738207][ T8858] CPU: 1 PID: 8858 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 119.748561][ T8858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.756634][ T8838] loop5: p3 start 2127165541 is beyond EOD, [ 119.758734][ T8858] Call Trace: [ 119.758743][ T8858] dump_stack+0x137/0x19d [ 119.764759][ T8838] truncated [ 119.768122][ T8858] should_fail+0x23c/0x250 [ 119.772427][ T8838] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 119.787313][ T8858] ? security_file_alloc+0x30/0x190 [ 119.792509][ T8858] __should_failslab+0x81/0x90 [ 119.797306][ T8858] should_failslab+0x5/0x20 02:22:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0xfffffffe, 0x0}}], 0x1, 0x0) [ 119.802086][ T8858] kmem_cache_alloc+0x46/0x2f0 [ 119.807091][ T8858] security_file_alloc+0x30/0x190 [ 119.812222][ T8858] __alloc_file+0x83/0x1a0 [ 119.816757][ T8858] alloc_empty_file+0xcd/0x1c0 [ 119.821563][ T8858] path_openat+0x6a/0x20b0 [ 119.825982][ T8858] ? iov_iter_advance+0x291/0xe10 [ 119.831024][ T8858] ? shmem_write_end+0x37d/0x3d0 [ 119.835963][ T8858] ? balance_dirty_pages_ratelimited+0xb1/0x280 [ 119.842365][ T8858] ? generic_perform_write+0x332/0x3a0 [ 119.848045][ T8858] do_filp_open+0xd9/0x1f0 [ 119.852743][ T8858] ? __virt_addr_valid+0x15a/0x1a0 [ 119.858025][ T8858] ? __check_object_size+0x253/0x310 [ 119.863426][ T8858] ? _find_next_bit+0x16a/0x190 [ 119.868295][ T8858] ? alloc_fd+0x388/0x3e0 [ 119.872627][ T8858] do_sys_openat2+0xa3/0x250 [ 119.877577][ T8858] __x64_sys_openat+0xef/0x110 [ 119.882992][ T8858] do_syscall_64+0x4a/0x90 [ 119.889222][ T8858] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 119.898047][ T8858] RIP: 0033:0x4196c4 [ 119.903638][ T8858] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 119.925619][ T8858] RSP: 002b:00007f71cabe1ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 119.935334][ T8858] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 [ 119.945292][ T8858] RDX: 0000000000000002 RSI: 00007f71cabe2000 RDI: 00000000ffffff9c [ 119.953879][ T8858] RBP: 00007f71cabe2000 R08: 0000000000000000 R09: ffffffffffffffff [ 119.964521][ T8858] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 119.974381][ T8858] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 02:23:00 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x300, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:00 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000ff", 0x23}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:23:00 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000770007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x2}}], 0x1, 0x0) 02:23:00 executing program 4 (fault-call:3 fault-nth:13): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x8, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 120.302399][ T8889] loop5: detected capacity change from 0 to 1 [ 120.302690][ T8890] FAULT_INJECTION: forcing a failure. [ 120.302690][ T8890] name failslab, interval 1, probability 0, space 0, times 0 [ 120.321560][ T8890] CPU: 0 PID: 8890 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 120.331961][ T8890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.342701][ T8890] Call Trace: [ 120.345997][ T8890] dump_stack+0x137/0x19d [ 120.350387][ T8890] should_fail+0x23c/0x250 [ 120.355089][ T8890] ? loop_set_status_from_info+0x3a0/0x3a0 [ 120.361100][ T8890] __should_failslab+0x81/0x90 [ 120.366174][ T8890] ? __kthread_create_on_node+0x7a/0x290 [ 120.371904][ T8890] should_failslab+0x5/0x20 [ 120.376960][ T8890] kmem_cache_alloc_trace+0x49/0x310 [ 120.382550][ T8890] ? loop_set_status_from_info+0x3a0/0x3a0 [ 120.389023][ T8890] __kthread_create_on_node+0x7a/0x290 [ 120.395571][ T8890] ? __blkdev_get+0xc1/0x6d0 02:23:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0) 02:23:00 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x500, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:00 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x600, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x4}}], 0x1, 0x0) 02:23:00 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210207041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:00 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x700, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x8}}], 0x1, 0x0) [ 120.400576][ T8890] ? loop_set_status_from_info+0x3a0/0x3a0 [ 120.406831][ T8890] kthread_create_on_node+0x72/0xa0 [ 120.412592][ T8890] loop_configure+0x597/0xcb0 [ 120.417759][ T8890] ? mntput+0x45/0x70 [ 120.422390][ T8890] lo_ioctl+0x555/0x11f0 [ 120.427334][ T8890] ? path_openat+0x19ab/0x20b0 [ 120.432675][ T8890] ? putname+0xa5/0xc0 [ 120.437455][ T8890] ? ___cache_free+0x3c/0x300 [ 120.442339][ T8890] ? blkdev_common_ioctl+0x9c3/0x1040 [ 120.447838][ T8890] ? selinux_file_ioctl+0x8e0/0x970 [ 120.453168][ T8890] ? lo_release+0x120/0x120 [ 120.458302][ T8890] blkdev_ioctl+0x1d0/0x3c0 [ 120.462819][ T8890] block_ioctl+0x6d/0x80 [ 120.467978][ T8890] ? blkdev_iopoll+0x70/0x70 [ 120.473185][ T8890] __se_sys_ioctl+0xcb/0x140 [ 120.478273][ T8890] __x64_sys_ioctl+0x3f/0x50 [ 120.483233][ T8890] do_syscall_64+0x4a/0x90 [ 120.488218][ T8890] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 120.494315][ T8890] RIP: 0033:0x466397 [ 120.498637][ T8890] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 120.521021][ T8890] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 120.530244][ T8890] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 120.539477][ T8890] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 120.549737][ T8890] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 120.560793][ T8890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 120.570064][ T8890] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 [ 120.591772][ T8889] loop5: p1 p2 p3 p4 [ 120.596646][ T8889] loop5: p1 start 10 is beyond EOD, truncated [ 120.603501][ T8889] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 120.624580][ T8889] loop5: p3 start 2127165541 is beyond EOD, truncated [ 120.631646][ T8889] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 120.647297][ T8925] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=545 sclass=netlink_route_socket pid=8925 comm=syz-executor.0 [ 120.705826][ T8889] __loop_clr_fd: partition scan of loop5 failed (rc=-16) 02:23:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000ffffffffffffff", 0x29}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:23:01 executing program 4 (fault-call:3 fault-nth:14): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:01 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x900, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xa}}], 0x1, 0x0) 02:23:01 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210307041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:01 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x9, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:01 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x2000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 121.194357][ T8947] FAULT_INJECTION: forcing a failure. [ 121.194357][ T8947] name failslab, interval 1, probability 0, space 0, times 0 [ 121.194827][ T8950] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=801 sclass=netlink_route_socket pid=8950 comm=syz-executor.0 [ 121.207189][ T8947] CPU: 1 PID: 8947 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 121.230337][ T8947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.240626][ T8947] Call Trace: 02:23:01 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210407041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 121.243906][ T8947] dump_stack+0x137/0x19d [ 121.248247][ T8947] should_fail+0x23c/0x250 [ 121.252752][ T8947] ? __kernfs_new_node+0x6a/0x330 [ 121.257222][ T8949] loop5: detected capacity change from 0 to 1 [ 121.258138][ T8947] __should_failslab+0x81/0x90 [ 121.269225][ T8947] should_failslab+0x5/0x20 [ 121.273957][ T8947] kmem_cache_alloc+0x46/0x2f0 [ 121.278813][ T8947] ? kvm_sched_clock_read+0xd/0x20 [ 121.283970][ T8947] __kernfs_new_node+0x6a/0x330 [ 121.288916][ T8947] ? select_task_rq_fair+0x186/0xc00 02:23:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xf}}], 0x1, 0x0) 02:23:01 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4801, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:01 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210507041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 121.294287][ T8947] ? rb_insert_color+0x7e/0x310 [ 121.299142][ T8947] kernfs_create_dir_ns+0x5e/0x140 [ 121.304265][ T8947] internal_create_group+0x138/0x850 [ 121.310311][ T8947] ? check_preempt_wakeup+0x1bb/0x360 [ 121.314463][ T8965] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1057 sclass=netlink_route_socket pid=8965 comm=syz-executor.0 [ 121.315871][ T8947] sysfs_create_group+0x1b/0x20 [ 121.333713][ T8947] loop_configure+0xa21/0xcb0 [ 121.338494][ T8947] lo_ioctl+0x555/0x11f0 [ 121.342763][ T8947] ? path_openat+0x19ab/0x20b0 [ 121.347595][ T8947] ? putname+0xa5/0xc0 [ 121.352127][ T8947] ? ___cache_free+0x3c/0x300 [ 121.357457][ T8947] ? blkdev_common_ioctl+0x9c3/0x1040 [ 121.363013][ T8947] ? selinux_file_ioctl+0x8e0/0x970 [ 121.368284][ T8947] ? lo_release+0x120/0x120 [ 121.372769][ T8947] blkdev_ioctl+0x1d0/0x3c0 [ 121.377269][ T8947] block_ioctl+0x6d/0x80 [ 121.381907][ T8947] ? blkdev_iopoll+0x70/0x70 [ 121.386782][ T8947] __se_sys_ioctl+0xcb/0x140 [ 121.391460][ T8947] __x64_sys_ioctl+0x3f/0x50 [ 121.396049][ T8947] do_syscall_64+0x4a/0x90 [ 121.400549][ T8947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 121.406513][ T8947] RIP: 0033:0x466397 [ 121.410386][ T8947] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 121.431058][ T8947] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 121.439977][ T8947] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 121.448196][ T8947] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 121.456328][ T8947] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 121.464932][ T8947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 121.473070][ T8947] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 [ 121.481629][ T8947] loop4: detected capacity change from 0 to 1051 02:23:01 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210607041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 121.528734][ T8949] loop5: p1 p2 p3 p4 [ 121.532924][ T8949] loop5: p1 start 10 is beyond EOD, truncated [ 121.539542][ T8949] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 121.541554][ T8976] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1313 sclass=netlink_route_socket pid=8976 comm=syz-executor.0 [ 121.548260][ T8947] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 121.586819][ T8949] loop5: p3 start 2127165541 is beyond EOD, truncated [ 121.591999][ T8982] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1569 sclass=netlink_route_socket pid=8982 comm=syz-executor.0 [ 121.593615][ T8949] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 121.606957][ T8947] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 121.642315][ T8947] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 121.654392][ T8947] EXT4-fs (loop4): get root inode failed [ 121.660049][ T8947] EXT4-fs (loop4): mount failed 02:23:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000ffffffffffffff", 0x29}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:23:02 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x34000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x11}}], 0x1, 0x0) 02:23:02 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0xa, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:02 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210707041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:02 executing program 4 (fault-call:3 fault-nth:15): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 122.093456][ T9007] loop5: detected capacity change from 0 to 1 [ 122.102360][ T9010] FAULT_INJECTION: forcing a failure. [ 122.102360][ T9010] name failslab, interval 1, probability 0, space 0, times 0 [ 122.109663][ T9009] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1825 sclass=netlink_route_socket pid=9009 comm=syz-executor.0 [ 122.115316][ T9010] CPU: 0 PID: 9010 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 02:23:02 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x400300, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:02 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 122.138461][ T9010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 122.148604][ T9010] Call Trace: [ 122.151881][ T9010] dump_stack+0x137/0x19d [ 122.156472][ T9010] should_fail+0x23c/0x250 [ 122.160966][ T9010] ? __kernfs_new_node+0x6a/0x330 [ 122.166081][ T9010] __should_failslab+0x81/0x90 [ 122.170852][ T9010] should_failslab+0x5/0x20 [ 122.175657][ T9010] kmem_cache_alloc+0x46/0x2f0 [ 122.180540][ T9010] ? __cond_resched+0x11/0x40 [ 122.185218][ T9010] __kernfs_new_node+0x6a/0x330 02:23:02 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210907041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:02 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x2000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x18}}], 0x1, 0x0) [ 122.190166][ T9010] ? idr_alloc_cyclic+0x249/0x2d0 [ 122.195625][ T9010] ? rb_insert_color+0x7e/0x310 [ 122.200764][ T9010] kernfs_new_node+0x5b/0xd0 [ 122.205471][ T9010] __kernfs_create_file+0x45/0x1a0 [ 122.210599][ T9010] sysfs_add_file_mode_ns+0x1c1/0x250 [ 122.215985][ T9010] internal_create_group+0x2e4/0x850 [ 122.221292][ T9010] sysfs_create_group+0x1b/0x20 [ 122.226151][ T9010] loop_configure+0xa21/0xcb0 [ 122.230835][ T9010] lo_ioctl+0x555/0x11f0 [ 122.235129][ T9010] ? path_openat+0x19ab/0x20b0 [ 122.239893][ T9010] ? putname+0xa5/0xc0 02:23:02 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x3000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 122.243986][ T9010] ? ___cache_free+0x3c/0x300 [ 122.248747][ T9010] ? blkdev_common_ioctl+0x9c3/0x1040 [ 122.254507][ T9010] ? selinux_file_ioctl+0x8e0/0x970 [ 122.259991][ T9010] ? lo_release+0x120/0x120 [ 122.264562][ T9010] blkdev_ioctl+0x1d0/0x3c0 [ 122.269071][ T9010] block_ioctl+0x6d/0x80 [ 122.273341][ T9010] ? blkdev_iopoll+0x70/0x70 [ 122.276495][ T9035] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2337 sclass=netlink_route_socket pid=9035 comm=syz-executor.0 [ 122.277938][ T9010] __se_sys_ioctl+0xcb/0x140 [ 122.295481][ T9010] __x64_sys_ioctl+0x3f/0x50 [ 122.300124][ T9010] do_syscall_64+0x4a/0x90 [ 122.304593][ T9010] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 122.310489][ T9010] RIP: 0033:0x466397 [ 122.314406][ T9010] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 122.334551][ T9010] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 122.343151][ T9010] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 122.351281][ T9010] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 122.359244][ T9010] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 122.367319][ T9010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 122.375551][ T9010] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 [ 122.384563][ T9010] loop4: detected capacity change from 0 to 1051 [ 122.398236][ T9007] loop5: p1 p2 p3 p4 [ 122.402847][ T9007] loop5: p1 start 10 is beyond EOD, truncated [ 122.410074][ T9007] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 122.418203][ T9010] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 122.427942][ T9007] loop5: p3 start 2127165541 is beyond EOD, [ 122.427942][ T9010] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 122.428181][ T9010] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 122.434582][ T9007] truncated [ 122.434589][ T9007] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 122.468265][ T9010] EXT4-fs (loop4): get root inode failed [ 122.474111][ T9010] EXT4-fs (loop4): mount failed 02:23:03 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000ffffffffffffff", 0x29}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:23:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x1c}}], 0x1, 0x0) 02:23:03 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="2400000021b107041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:03 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:03 executing program 4 (fault-call:3 fault-nth:16): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0xb, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 122.959944][ T9064] loop5: detected capacity change from 0 to 1 [ 122.967073][ T9065] FAULT_INJECTION: forcing a failure. [ 122.967073][ T9065] name failslab, interval 1, probability 0, space 0, times 0 [ 122.971688][ T9071] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=45345 sclass=netlink_route_socket pid=9071 comm=syz-executor.0 [ 122.980925][ T9065] CPU: 0 PID: 9065 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 02:23:03 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x5000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x30}}], 0x1, 0x0) [ 123.006908][ T9065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 123.017793][ T9065] Call Trace: [ 123.021774][ T9065] dump_stack+0x137/0x19d [ 123.026666][ T9065] should_fail+0x23c/0x250 [ 123.031206][ T9065] ? __kernfs_new_node+0x6a/0x330 [ 123.036469][ T9065] __should_failslab+0x81/0x90 [ 123.041797][ T9065] should_failslab+0x5/0x20 [ 123.046563][ T9065] kmem_cache_alloc+0x46/0x2f0 [ 123.051338][ T9065] __kernfs_new_node+0x6a/0x330 02:23:03 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x1f4}}], 0x1, 0x0) [ 123.056261][ T9065] ? __cond_resched+0x11/0x40 [ 123.061606][ T9065] ? mutex_lock+0x9/0x30 [ 123.066295][ T9065] kernfs_new_node+0x5b/0xd0 [ 123.071139][ T9065] __kernfs_create_file+0x45/0x1a0 [ 123.076431][ T9065] sysfs_add_file_mode_ns+0x1c1/0x250 [ 123.082631][ T9065] internal_create_group+0x2e4/0x850 [ 123.088418][ T9065] sysfs_create_group+0x1b/0x20 [ 123.093445][ T9065] loop_configure+0xa21/0xcb0 [ 123.098354][ T9065] lo_ioctl+0x555/0x11f0 [ 123.103448][ T9065] ? path_openat+0x19ab/0x20b0 02:23:03 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210010041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 123.108315][ T9065] ? putname+0xa5/0xc0 [ 123.112494][ T9065] ? ___cache_free+0x3c/0x300 [ 123.117235][ T9065] ? blkdev_common_ioctl+0x9c3/0x1040 [ 123.123308][ T9065] ? selinux_file_ioctl+0x8e0/0x970 [ 123.129001][ T9065] ? lo_release+0x120/0x120 [ 123.133609][ T9065] blkdev_ioctl+0x1d0/0x3c0 [ 123.138217][ T9065] block_ioctl+0x6d/0x80 [ 123.143166][ T9065] ? blkdev_iopoll+0x70/0x70 [ 123.148925][ T9065] __se_sys_ioctl+0xcb/0x140 [ 123.153714][ T9065] __x64_sys_ioctl+0x3f/0x50 02:23:03 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 123.158957][ T9065] do_syscall_64+0x4a/0x90 [ 123.163582][ T9065] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 123.170454][ T9065] RIP: 0033:0x466397 [ 123.174610][ T9065] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 123.196135][ T9065] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 123.205272][ T9065] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 123.213519][ T9065] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 123.221942][ T9065] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 123.230169][ T9065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 123.239478][ T9065] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 [ 123.258169][ T9065] loop4: detected capacity change from 0 to 1051 [ 123.284106][ T9064] loop5: p1 p2 p3 p4 [ 123.288466][ T9064] loop5: p1 start 10 is beyond EOD, truncated [ 123.294881][ T9064] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 123.294996][ T9065] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 123.304278][ T9064] loop5: p3 start 2127165541 is beyond EOD, truncated [ 123.312251][ T9065] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 123.319202][ T9064] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 123.330757][ T9065] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 123.349355][ T9065] EXT4-fs (loop4): get root inode failed [ 123.355370][ T9065] EXT4-fs (loop4): mount failed 02:23:03 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff02273", 0x2c}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:23:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x2e4}}], 0x1, 0x0) 02:23:03 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="240000002100070421fffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:03 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:03 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0xc, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:03 executing program 4 (fault-call:3 fault-nth:17): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:03 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:04 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfefd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x300}}], 0x1, 0x0) 02:23:04 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x48010000, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 123.812906][ T9119] loop5: detected capacity change from 0 to 1 [ 123.893939][ T9119] loop5: p1 p2 p3 p4 [ 123.898420][ T9119] loop5: p1 start 10 is beyond EOD, truncated [ 123.905430][ T9119] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 123.917142][ T9129] FAULT_INJECTION: forcing a failure. [ 123.917142][ T9129] name failslab, interval 1, probability 0, space 0, times 0 [ 123.930733][ T9129] CPU: 0 PID: 9129 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 123.935214][ T9119] loop5: p3 start 2127165541 is beyond EOD, truncated [ 123.941332][ T9129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 123.941344][ T9129] Call Trace: [ 123.941351][ T9129] dump_stack+0x137/0x19d [ 123.948416][ T9119] loop5: p4 size 3657465856 extends beyond EOD, [ 123.959118][ T9129] should_fail+0x23c/0x250 [ 123.962611][ T9119] truncated [ 123.983062][ T9129] ? __kernfs_new_node+0x6a/0x330 [ 123.988555][ T9129] __should_failslab+0x81/0x90 [ 123.993681][ T9129] should_failslab+0x5/0x20 [ 123.998781][ T9129] kmem_cache_alloc+0x46/0x2f0 [ 124.004134][ T9129] __kernfs_new_node+0x6a/0x330 [ 124.009435][ T9129] ? __cond_resched+0x11/0x40 [ 124.014646][ T9129] ? mutex_lock+0x9/0x30 [ 124.019511][ T9129] kernfs_new_node+0x5b/0xd0 [ 124.024381][ T9129] __kernfs_create_file+0x45/0x1a0 [ 124.030038][ T9129] sysfs_add_file_mode_ns+0x1c1/0x250 [ 124.035874][ T9129] internal_create_group+0x2e4/0x850 [ 124.041887][ T9129] sysfs_create_group+0x1b/0x20 [ 124.047229][ T9129] loop_configure+0xa21/0xcb0 [ 124.052005][ T9129] lo_ioctl+0x555/0x11f0 [ 124.057203][ T9129] ? path_openat+0x19ab/0x20b0 [ 124.062153][ T9129] ? putname+0xa5/0xc0 [ 124.066204][ T9129] ? ___cache_free+0x3c/0x300 [ 124.070870][ T9129] ? blkdev_common_ioctl+0x9c3/0x1040 [ 124.076587][ T9129] ? selinux_file_ioctl+0x8e0/0x970 [ 124.082417][ T9129] ? lo_release+0x120/0x120 [ 124.086971][ T9129] blkdev_ioctl+0x1d0/0x3c0 [ 124.091906][ T9129] block_ioctl+0x6d/0x80 [ 124.096300][ T9129] ? blkdev_iopoll+0x70/0x70 [ 124.101481][ T9129] __se_sys_ioctl+0xcb/0x140 [ 124.106675][ T9129] __x64_sys_ioctl+0x3f/0x50 [ 124.111724][ T9129] do_syscall_64+0x4a/0x90 [ 124.116603][ T9129] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 124.122767][ T9129] RIP: 0033:0x466397 [ 124.126989][ T9129] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 124.147619][ T9129] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 124.156924][ T9129] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 124.165233][ T9129] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 124.173319][ T9129] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 124.181753][ T9129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 02:23:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x3e8}}], 0x1, 0x0) 02:23:04 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x9effffff, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 124.189917][ T9129] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 [ 124.203500][ T9129] loop4: detected capacity change from 0 to 1051 [ 124.217237][ T9129] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 124.226860][ T9129] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 124.243265][ T9129] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 124.255393][ T9129] EXT4-fs (loop4): get root inode failed [ 124.261036][ T9129] EXT4-fs (loop4): mount failed 02:23:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff02273", 0x2c}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:23:04 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0xd, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:04 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffe946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:04 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xeaffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x810}}], 0x1, 0x0) 02:23:04 executing program 4 (fault-call:3 fault-nth:18): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 124.706257][ T9183] FAULT_INJECTION: forcing a failure. [ 124.706257][ T9183] name failslab, interval 1, probability 0, space 0, times 0 [ 124.719021][ T9183] CPU: 1 PID: 9183 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 124.729092][ T9183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.732069][ T9187] loop5: detected capacity change from 0 to 1 [ 124.742712][ T9183] Call Trace: 02:23:04 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xefffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xa00}}], 0x1, 0x0) 02:23:04 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610b00020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 124.742723][ T9183] dump_stack+0x137/0x19d [ 124.742746][ T9183] should_fail+0x23c/0x250 [ 124.742829][ T9183] ? __kernfs_new_node+0x6a/0x330 [ 124.767259][ T9183] __should_failslab+0x81/0x90 [ 124.772177][ T9183] should_failslab+0x5/0x20 [ 124.776664][ T9183] kmem_cache_alloc+0x46/0x2f0 [ 124.781521][ T9183] __kernfs_new_node+0x6a/0x330 [ 124.786603][ T9183] ? __cond_resched+0x11/0x40 [ 124.791311][ T9183] ? mutex_lock+0x9/0x30 [ 124.795746][ T9183] kernfs_new_node+0x5b/0xd0 [ 124.800330][ T9183] __kernfs_create_file+0x45/0x1a0 [ 124.805541][ T9183] sysfs_add_file_mode_ns+0x1c1/0x250 [ 124.811274][ T9183] internal_create_group+0x2e4/0x850 [ 124.816713][ T9183] sysfs_create_group+0x1b/0x20 [ 124.822183][ T9183] loop_configure+0xa21/0xcb0 [ 124.827190][ T9183] lo_ioctl+0x555/0x11f0 [ 124.831523][ T9183] ? path_openat+0x19ab/0x20b0 [ 124.836327][ T9183] ? putname+0xa5/0xc0 [ 124.840682][ T9183] ? ___cache_free+0x3c/0x300 [ 124.845548][ T9183] ? blkdev_common_ioctl+0x9c3/0x1040 [ 124.850935][ T9183] ? selinux_file_ioctl+0x8e0/0x970 [ 124.856263][ T9183] ? lo_release+0x120/0x120 [ 124.861107][ T9183] blkdev_ioctl+0x1d0/0x3c0 [ 124.865611][ T9183] block_ioctl+0x6d/0x80 [ 124.869930][ T9183] ? blkdev_iopoll+0x70/0x70 [ 124.874957][ T9183] __se_sys_ioctl+0xcb/0x140 [ 124.879659][ T9183] __x64_sys_ioctl+0x3f/0x50 [ 124.884237][ T9183] do_syscall_64+0x4a/0x90 [ 124.888723][ T9183] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 124.894921][ T9183] RIP: 0033:0x466397 [ 124.898824][ T9183] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 124.919564][ T9183] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 124.927979][ T9183] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 124.936335][ T9183] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 124.944957][ T9183] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 124.953479][ T9183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 124.962338][ T9183] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 [ 124.971848][ T9183] loop4: detected capacity change from 0 to 1051 [ 124.994692][ T9187] loop5: p1 p2 p3 p4 02:23:05 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f612500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:05 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf0ffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xf00}}], 0x1, 0x0) [ 124.999750][ T9183] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 125.009796][ T9187] loop5: p1 start 10 is beyond EOD, truncated [ 125.015915][ T9187] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 125.027135][ T9183] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 125.041703][ T9187] loop5: p3 start 2127165541 is beyond EOD, truncated [ 125.048676][ T9187] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 125.084524][ T9183] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 125.096708][ T9183] EXT4-fs (loop4): get root inode failed [ 125.102337][ T9183] EXT4-fs (loop4): mount failed 02:23:05 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff02273", 0x2c}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:23:05 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610502020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:05 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfeffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x1008}}], 0x1, 0x0) 02:23:05 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0xe, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:05 executing program 4 (fault-call:3 fault-nth:19): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:05 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffff7f, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:05 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610503020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 125.579918][ T9238] FAULT_INJECTION: forcing a failure. [ 125.579918][ T9238] name failslab, interval 1, probability 0, space 0, times 0 [ 125.592566][ T9238] CPU: 0 PID: 9238 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 125.602628][ T9238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.612767][ T9238] Call Trace: [ 125.615070][ T9240] loop5: detected capacity change from 0 to 1 [ 125.616036][ T9238] dump_stack+0x137/0x19d 02:23:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x1100}}], 0x1, 0x0) 02:23:05 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffff9e, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:05 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610504020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 125.626634][ T9238] should_fail+0x23c/0x250 [ 125.631049][ T9238] ? __kernfs_new_node+0x6a/0x330 [ 125.636091][ T9238] __should_failslab+0x81/0x90 [ 125.640945][ T9238] should_failslab+0x5/0x20 [ 125.645515][ T9238] kmem_cache_alloc+0x46/0x2f0 [ 125.650293][ T9238] __kernfs_new_node+0x6a/0x330 [ 125.655177][ T9238] ? __cond_resched+0x11/0x40 [ 125.659858][ T9238] ? mutex_lock+0x9/0x30 [ 125.664102][ T9238] kernfs_new_node+0x5b/0xd0 [ 125.668779][ T9238] __kernfs_create_file+0x45/0x1a0 [ 125.674326][ T9238] sysfs_add_file_mode_ns+0x1c1/0x250 [ 125.679733][ T9238] internal_create_group+0x2e4/0x850 [ 125.685248][ T9238] sysfs_create_group+0x1b/0x20 [ 125.690442][ T9238] loop_configure+0xa21/0xcb0 [ 125.695265][ T9238] lo_ioctl+0x555/0x11f0 [ 125.699947][ T9238] ? path_openat+0x19ab/0x20b0 [ 125.704862][ T9238] ? putname+0xa5/0xc0 [ 125.709093][ T9238] ? ___cache_free+0x3c/0x300 [ 125.713764][ T9238] ? blkdev_common_ioctl+0x9c3/0x1040 [ 125.719232][ T9238] ? selinux_file_ioctl+0x8e0/0x970 [ 125.725604][ T9238] ? lo_release+0x120/0x120 [ 125.730636][ T9238] blkdev_ioctl+0x1d0/0x3c0 [ 125.735399][ T9238] block_ioctl+0x6d/0x80 [ 125.739777][ T9238] ? blkdev_iopoll+0x70/0x70 [ 125.744362][ T9238] __se_sys_ioctl+0xcb/0x140 [ 125.748958][ T9238] __x64_sys_ioctl+0x3f/0x50 [ 125.753546][ T9238] do_syscall_64+0x4a/0x90 [ 125.758079][ T9238] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 125.764520][ T9238] RIP: 0033:0x466397 [ 125.768400][ T9238] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 125.787987][ T9238] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 125.796471][ T9238] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 125.804586][ T9238] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 125.812580][ T9238] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 125.820661][ T9238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 125.828717][ T9238] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 [ 125.840908][ T9238] loop4: detected capacity change from 0 to 1051 02:23:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x1800}}], 0x1, 0x0) [ 125.891469][ T9240] loop5: p1 p2 p3 p4 [ 125.899358][ T9240] loop5: p1 start 10 is beyond EOD, truncated [ 125.905819][ T9240] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 125.921539][ T9238] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 125.933870][ T9240] loop5: p3 start 2127165541 is beyond EOD, truncated [ 125.940746][ T9240] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 125.953544][ T9238] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 125.967845][ T9238] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 125.980366][ T9238] EXT4-fs (loop4): get root inode failed [ 125.986019][ T9238] EXT4-fs (loop4): mount failed 02:23:06 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610505020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:06 executing program 4 (fault-call:3 fault-nth:20): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:06 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffea, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377", 0x2d}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:23:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x1c00}}], 0x1, 0x0) 02:23:06 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0xf, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:06 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610506020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:06 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffef, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x1f00}}], 0x1, 0x0) [ 126.457927][ T9297] loop5: detected capacity change from 0 to 1 [ 126.462813][ T9299] FAULT_INJECTION: forcing a failure. [ 126.462813][ T9299] name failslab, interval 1, probability 0, space 0, times 0 [ 126.476960][ T9299] CPU: 0 PID: 9299 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 126.487022][ T9299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.497078][ T9299] Call Trace: [ 126.500353][ T9299] dump_stack+0x137/0x19d 02:23:06 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610507020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:06 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffff0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 126.504684][ T9299] should_fail+0x23c/0x250 [ 126.509097][ T9299] ? __kernfs_new_node+0x6a/0x330 [ 126.514120][ T9299] __should_failslab+0x81/0x90 [ 126.518982][ T9299] should_failslab+0x5/0x20 [ 126.523745][ T9299] kmem_cache_alloc+0x46/0x2f0 [ 126.528518][ T9299] __kernfs_new_node+0x6a/0x330 [ 126.533443][ T9299] ? __cond_resched+0x11/0x40 [ 126.538338][ T9299] ? mutex_lock+0x9/0x30 [ 126.542782][ T9299] kernfs_new_node+0x5b/0xd0 [ 126.547458][ T9299] __kernfs_create_file+0x45/0x1a0 [ 126.552773][ T9299] sysfs_add_file_mode_ns+0x1c1/0x250 [ 126.558135][ T9299] internal_create_group+0x2e4/0x850 [ 126.563544][ T9299] sysfs_create_group+0x1b/0x20 [ 126.568406][ T9299] loop_configure+0xa21/0xcb0 [ 126.573163][ T9299] lo_ioctl+0x555/0x11f0 [ 126.577384][ T9299] ? path_openat+0x19ab/0x20b0 [ 126.582238][ T9299] ? putname+0xa5/0xc0 [ 126.586590][ T9299] ? ___cache_free+0x3c/0x300 [ 126.591250][ T9299] ? blkdev_common_ioctl+0x9c3/0x1040 [ 126.596809][ T9299] ? selinux_file_ioctl+0x8e0/0x970 [ 126.601982][ T9299] ? lo_release+0x120/0x120 [ 126.606654][ T9299] blkdev_ioctl+0x1d0/0x3c0 [ 126.611146][ T9299] block_ioctl+0x6d/0x80 [ 126.615599][ T9299] ? blkdev_iopoll+0x70/0x70 [ 126.620260][ T9299] __se_sys_ioctl+0xcb/0x140 [ 126.624838][ T9299] __x64_sys_ioctl+0x3f/0x50 [ 126.629431][ T9299] do_syscall_64+0x4a/0x90 [ 126.633869][ T9299] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 126.639816][ T9299] RIP: 0033:0x466397 [ 126.643706][ T9299] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.663386][ T9299] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 126.671965][ T9299] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 126.680181][ T9299] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 126.688140][ T9299] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 126.696093][ T9299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 126.704258][ T9299] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 [ 126.712547][ T9299] loop4: detected capacity change from 0 to 1051 [ 126.737656][ T9297] loop5: p1 p2 p3 p4 [ 126.746712][ T9297] loop5: p1 start 10 is beyond EOD, truncated 02:23:06 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:06 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="0f000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 126.752829][ T9297] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 126.762426][ T9299] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 126.779970][ T9299] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 126.802758][ T9297] loop5: p3 start 2127165541 is beyond EOD, truncated [ 126.809592][ T9297] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 126.835916][ T9299] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 126.848519][ T9299] EXT4-fs (loop4): get root inode failed [ 126.854315][ T9299] EXT4-fs (loop4): mount failed 02:23:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377", 0x2d}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:23:07 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610509020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x3000}}], 0x1, 0x0) 02:23:07 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="10000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:07 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x10, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:07 executing program 4 (fault-call:3 fault-nth:21): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:07 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f6105b1020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xe402}}], 0x1, 0x0) 02:23:07 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="1c000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 127.336583][ T9358] loop5: detected capacity change from 0 to 1 [ 127.338295][ T9359] loop4: detected capacity change from 0 to 1051 [ 127.351392][ T9359] FAULT_INJECTION: forcing a failure. [ 127.351392][ T9359] name failslab, interval 1, probability 0, space 0, times 0 [ 127.364332][ T9359] CPU: 1 PID: 9359 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 127.374537][ T9359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.384686][ T9359] Call Trace: [ 127.387997][ T9359] dump_stack+0x137/0x19d [ 127.392327][ T9359] should_fail+0x23c/0x250 [ 127.396905][ T9359] __should_failslab+0x81/0x90 [ 127.401911][ T9359] ? kobject_uevent_env+0x1a7/0xc40 [ 127.407170][ T9359] should_failslab+0x5/0x20 [ 127.411870][ T9359] kmem_cache_alloc_trace+0x49/0x310 [ 127.417224][ T9359] ? dev_uevent_filter+0x70/0x70 [ 127.422218][ T9359] kobject_uevent_env+0x1a7/0xc40 [ 127.427254][ T9359] kobject_uevent+0x18/0x20 [ 127.431862][ T9359] loop_configure+0xb3c/0xcb0 [ 127.436523][ T9359] lo_ioctl+0x555/0x11f0 [ 127.440755][ T9359] ? path_openat+0x19ab/0x20b0 [ 127.445661][ T9359] ? putname+0xa5/0xc0 [ 127.449706][ T9359] ? ___cache_free+0x3c/0x300 [ 127.454379][ T9359] ? blkdev_common_ioctl+0x9c3/0x1040 [ 127.459748][ T9359] ? selinux_file_ioctl+0x8e0/0x970 [ 127.464946][ T9359] ? lo_release+0x120/0x120 [ 127.469438][ T9359] blkdev_ioctl+0x1d0/0x3c0 [ 127.474048][ T9359] block_ioctl+0x6d/0x80 [ 127.478282][ T9359] ? blkdev_iopoll+0x70/0x70 [ 127.482854][ T9359] __se_sys_ioctl+0xcb/0x140 [ 127.487567][ T9359] __x64_sys_ioctl+0x3f/0x50 [ 127.492184][ T9359] do_syscall_64+0x4a/0x90 [ 127.496635][ T9359] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.502598][ T9359] RIP: 0033:0x466397 [ 127.506469][ T9359] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 127.526400][ T9359] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 127.534850][ T9359] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 127.542806][ T9359] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 127.550785][ T9359] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 127.558752][ T9359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 127.566756][ T9359] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 [ 127.588295][ T9358] loop5: p1 p2 p3 p4 [ 127.592624][ T9358] loop5: p1 start 10 is beyond EOD, truncated [ 127.599065][ T9358] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 127.606724][ T9359] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 127.621224][ T9359] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 127.630697][ T9358] loop5: p3 start 2127165541 is beyond EOD, truncated 02:23:07 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="c0000000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:07 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020200e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xe803}}], 0x1, 0x0) [ 127.637727][ T9358] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 127.647718][ T9359] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 127.660414][ T9359] EXT4-fs (loop4): get root inode failed [ 127.666154][ T9359] EXT4-fs (loop4): mount failed 02:23:08 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377", 0x2d}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:23:08 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020300e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:08 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="c00e0000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xf401}}], 0x1, 0x0) 02:23:08 executing program 4 (fault-call:3 fault-nth:22): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:08 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x11, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:08 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="e03f0300190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 128.200896][ T9411] FAULT_INJECTION: forcing a failure. [ 128.200896][ T9411] name failslab, interval 1, probability 0, space 0, times 0 [ 128.213746][ T9411] CPU: 0 PID: 9411 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 128.224881][ T9411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.230230][ T9416] loop5: detected capacity change from 0 to 1 [ 128.235026][ T9411] Call Trace: [ 128.235036][ T9411] dump_stack+0x137/0x19d 02:23:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x34000}}], 0x1, 0x0) 02:23:08 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020400e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 128.235061][ T9411] should_fail+0x23c/0x250 [ 128.235076][ T9411] ? __kernfs_new_node+0x6a/0x330 [ 128.258516][ T9411] __should_failslab+0x81/0x90 [ 128.263395][ T9411] should_failslab+0x5/0x20 [ 128.267901][ T9411] kmem_cache_alloc+0x46/0x2f0 [ 128.272965][ T9411] __kernfs_new_node+0x6a/0x330 [ 128.277869][ T9411] ? __cond_resched+0x11/0x40 [ 128.282829][ T9411] ? mutex_lock+0x9/0x30 [ 128.287082][ T9411] kernfs_new_node+0x5b/0xd0 [ 128.291745][ T9411] __kernfs_create_file+0x45/0x1a0 02:23:08 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="e4010020190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) [ 128.297136][ T9411] sysfs_add_file_mode_ns+0x1c1/0x250 [ 128.302604][ T9411] internal_create_group+0x2e4/0x850 [ 128.308069][ T9411] sysfs_create_group+0x1b/0x20 [ 128.313030][ T9411] loop_configure+0xa21/0xcb0 [ 128.318011][ T9411] lo_ioctl+0x555/0x11f0 [ 128.322250][ T9411] ? path_openat+0x19ab/0x20b0 [ 128.327062][ T9411] ? putname+0xa5/0xc0 [ 128.331211][ T9411] ? ___cache_free+0x3c/0x300 [ 128.335881][ T9411] ? blkdev_common_ioctl+0x9c3/0x1040 [ 128.341426][ T9411] ? selinux_file_ioctl+0x8e0/0x970 [ 128.347189][ T9411] ? lo_release+0x120/0x120 [ 128.351683][ T9411] blkdev_ioctl+0x1d0/0x3c0 [ 128.356260][ T9411] block_ioctl+0x6d/0x80 [ 128.360898][ T9411] ? blkdev_iopoll+0x70/0x70 [ 128.365497][ T9411] __se_sys_ioctl+0xcb/0x140 [ 128.370075][ T9411] __x64_sys_ioctl+0x3f/0x50 [ 128.374766][ T9411] do_syscall_64+0x4a/0x90 [ 128.385096][ T9411] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 128.390985][ T9411] RIP: 0033:0x466397 [ 128.394899][ T9411] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 128.414863][ T9411] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 128.423793][ T9411] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 128.431841][ T9411] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 128.440390][ T9411] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 128.448966][ T9411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 128.457452][ T9411] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 [ 128.468755][ T9411] loop4: detected capacity change from 0 to 1051 02:23:08 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020500e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 128.506523][ T9416] loop5: p1 p2 p3 p4 [ 128.510748][ T9416] loop5: p1 start 10 is beyond EOD, truncated [ 128.516916][ T9416] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 128.525417][ T9411] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 128.540568][ T9411] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 128.553977][ T9416] loop5: p3 start 2127165541 is beyond EOD, truncated [ 128.560849][ T9416] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 128.570187][ T9411] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 128.582496][ T9411] EXT4-fs (loop4): get root inode failed [ 128.588424][ T9411] EXT4-fs (loop4): mount failed 02:23:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 02:23:09 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="00f0ff7f190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:09 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020600e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x400300}}], 0x1, 0x0) 02:23:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x12, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:09 executing program 4 (fault-call:3 fault-nth:23): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 129.072331][ T9468] loop4: detected capacity change from 0 to 1051 [ 129.078909][ T9470] loop5: detected capacity change from 0 to 1 [ 129.088836][ T9468] FAULT_INJECTION: forcing a failure. [ 129.088836][ T9468] name failslab, interval 1, probability 0, space 0, times 0 [ 129.101961][ T9468] CPU: 1 PID: 9468 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 129.112413][ T9468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 02:23:09 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="effdffff190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:09 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020700e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x2000000}}], 0x1, 0x0) 02:23:09 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000100007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 129.122579][ T9468] Call Trace: [ 129.125922][ T9468] dump_stack+0x137/0x19d [ 129.130391][ T9468] should_fail+0x23c/0x250 [ 129.134904][ T9468] ? kzalloc+0x1d/0x30 [ 129.138981][ T9468] __should_failslab+0x81/0x90 [ 129.143790][ T9468] should_failslab+0x5/0x20 [ 129.148516][ T9468] __kmalloc+0x66/0x340 [ 129.152798][ T9468] kzalloc+0x1d/0x30 [ 129.156741][ T9468] kobject_get_path+0x7c/0x110 [ 129.161701][ T9468] kobject_uevent_env+0x1be/0xc40 [ 129.166819][ T9468] kobject_uevent+0x18/0x20 02:23:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) [ 129.171474][ T9468] loop_configure+0xb3c/0xcb0 [ 129.176224][ T9468] lo_ioctl+0x555/0x11f0 [ 129.180654][ T9468] ? path_openat+0x19ab/0x20b0 [ 129.186384][ T9468] ? putname+0xa5/0xc0 [ 129.190458][ T9468] ? ___cache_free+0x3c/0x300 [ 129.195485][ T9468] ? blkdev_common_ioctl+0x9c3/0x1040 [ 129.200863][ T9468] ? selinux_file_ioctl+0x8e0/0x970 [ 129.206068][ T9468] ? lo_release+0x120/0x120 [ 129.210635][ T9468] blkdev_ioctl+0x1d0/0x3c0 [ 129.215266][ T9468] block_ioctl+0x6d/0x80 02:23:09 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000110007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:09 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020900e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x3000000}}], 0x1, 0x0) 02:23:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) [ 129.219599][ T9468] ? blkdev_iopoll+0x70/0x70 [ 129.224263][ T9468] __se_sys_ioctl+0xcb/0x140 [ 129.228865][ T9468] __x64_sys_ioctl+0x3f/0x50 [ 129.233547][ T9468] do_syscall_64+0x4a/0x90 [ 129.238062][ T9468] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 129.243996][ T9468] RIP: 0033:0x466397 [ 129.247884][ T9468] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 129.267889][ T9468] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 129.276511][ T9468] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 129.284798][ T9468] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 129.292834][ T9468] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 129.300783][ T9468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 129.308843][ T9468] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 02:23:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, 0x0, 0x0) [ 129.375531][ T9470] loop5: p1 p2 p3 p4 [ 129.379686][ T9470] loop5: p1 start 10 is beyond EOD, truncated [ 129.385885][ T9470] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 129.394366][ T9468] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 129.416056][ T9470] loop5: p3 start 2127165541 is beyond EOD, truncated [ 129.422853][ T9470] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 129.435475][ T9468] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) 02:23:09 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x13, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:09 executing program 4 (fault-call:3 fault-nth:24): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:09 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000120007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x4000000}}], 0x1, 0x0) 02:23:09 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f61050002b100e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, 0x0, 0x0) [ 129.467089][ T9468] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 129.479901][ T9468] EXT4-fs (loop4): get root inode failed [ 129.485654][ T9468] EXT4-fs (loop4): mount failed 02:23:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, 0x0, 0x0) 02:23:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x8000000}}], 0x1, 0x0) 02:23:09 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020003e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:09 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000130007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 129.546819][ T9530] loop5: detected capacity change from 0 to 1 02:23:09 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020005e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 129.613536][ T9530] loop5: p1 p2 p3 p4 [ 129.617596][ T9530] loop5: p1 start 10 is beyond EOD, truncated [ 129.623792][ T9530] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 129.631969][ T9530] loop5: p3 start 2127165541 is beyond EOD, truncated [ 129.638792][ T9530] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 129.660513][ T9534] loop4: detected capacity change from 0 to 1051 [ 129.667765][ T9534] FAULT_INJECTION: forcing a failure. [ 129.667765][ T9534] name failslab, interval 1, probability 0, space 0, times 0 [ 129.682132][ T9534] CPU: 0 PID: 9534 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 129.692434][ T9534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.703130][ T9534] Call Trace: [ 129.706682][ T9534] dump_stack+0x137/0x19d 02:23:09 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000140007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 129.711214][ T9534] should_fail+0x23c/0x250 [ 129.716008][ T9534] __should_failslab+0x81/0x90 [ 129.721671][ T9534] should_failslab+0x5/0x20 [ 129.726449][ T9534] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 129.732340][ T9534] ? __kmalloc_node_track_caller+0x30/0x40 [ 129.738017][ T9559] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 129.739179][ T9534] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 129.754544][ T9534] __kmalloc_node_track_caller+0x30/0x40 [ 129.760787][ T9534] ? alloc_uevent_skb+0x5b/0x120 [ 129.766112][ T9534] __alloc_skb+0x187/0x420 [ 129.771161][ T9534] alloc_uevent_skb+0x5b/0x120 [ 129.776077][ T9534] kobject_uevent_env+0x863/0xc40 [ 129.781178][ T9534] kobject_uevent+0x18/0x20 [ 129.785789][ T9534] loop_configure+0xb3c/0xcb0 [ 129.790697][ T9534] lo_ioctl+0x555/0x11f0 [ 129.795118][ T9534] ? path_openat+0x19ab/0x20b0 [ 129.799869][ T9534] ? putname+0xa5/0xc0 [ 129.803923][ T9534] ? ___cache_free+0x3c/0x300 [ 129.808588][ T9534] ? blkdev_common_ioctl+0x9c3/0x1040 [ 129.813972][ T9534] ? selinux_file_ioctl+0x8e0/0x970 [ 129.819154][ T9534] ? lo_release+0x120/0x120 [ 129.823843][ T9534] blkdev_ioctl+0x1d0/0x3c0 [ 129.828430][ T9534] block_ioctl+0x6d/0x80 [ 129.832853][ T9534] ? blkdev_iopoll+0x70/0x70 [ 129.837486][ T9534] __se_sys_ioctl+0xcb/0x140 [ 129.842264][ T9534] __x64_sys_ioctl+0x3f/0x50 [ 129.846861][ T9534] do_syscall_64+0x4a/0x90 [ 129.851324][ T9534] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 129.857279][ T9534] RIP: 0033:0x466397 [ 129.861300][ T9534] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 129.881327][ T9534] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 129.890196][ T9534] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 129.898377][ T9534] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 129.906433][ T9534] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff 02:23:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x24, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 129.914733][ T9534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 129.922702][ T9534] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 [ 129.938048][ T9534] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 129.948584][ T9534] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 129.959294][ T9534] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 129.971589][ T9534] EXT4-fs (loop4): get root inode failed [ 129.977237][ T9534] EXT4-fs (loop4): mount failed [ 129.992424][ T9569] loop5: detected capacity change from 0 to 1 02:23:10 executing program 4 (fault-call:3 fault-nth:25): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:10 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}], 0x1) 02:23:10 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020006e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xa000000}}], 0x1, 0x0) 02:23:10 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000150007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x25, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 130.067763][ T9569] loop5: p1 p2 p3 p4 [ 130.071851][ T9569] loop5: p1 start 10 is beyond EOD, truncated [ 130.078072][ T9569] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 130.086411][ T9569] loop5: p3 start 2127165541 is beyond EOD, truncated [ 130.093229][ T9569] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:23:10 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}], 0x1) 02:23:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xf000000}}], 0x1, 0x0) [ 130.126776][ T9586] loop4: detected capacity change from 0 to 1051 [ 130.141084][ T9591] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 130.160665][ T9586] FAULT_INJECTION: forcing a failure. [ 130.160665][ T9586] name failslab, interval 1, probability 0, space 0, times 0 02:23:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x10080000}}], 0x1, 0x0) 02:23:10 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020007e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 130.173314][ T9586] CPU: 1 PID: 9586 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 130.181434][ T9599] loop5: detected capacity change from 0 to 1 [ 130.183513][ T9586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.200234][ T9586] Call Trace: [ 130.203681][ T9586] dump_stack+0x137/0x19d [ 130.208040][ T9586] should_fail+0x23c/0x250 [ 130.212462][ T9586] ? skb_clone+0x12c/0x1f0 [ 130.217095][ T9586] __should_failslab+0x81/0x90 [ 130.222535][ T9586] should_failslab+0x5/0x20 02:23:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x11000000}}], 0x1, 0x0) 02:23:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x18000000}}], 0x1, 0x0) [ 130.227047][ T9586] kmem_cache_alloc+0x46/0x2f0 [ 130.231845][ T9586] skb_clone+0x12c/0x1f0 [ 130.236095][ T9586] netlink_broadcast_filtered+0x50d/0xb90 [ 130.241847][ T9586] ? skb_put+0xb9/0xf0 [ 130.246182][ T9586] netlink_broadcast+0x35/0x50 [ 130.250985][ T9586] kobject_uevent_env+0x8c9/0xc40 [ 130.256126][ T9586] kobject_uevent+0x18/0x20 [ 130.260661][ T9586] loop_configure+0xb3c/0xcb0 [ 130.265352][ T9586] lo_ioctl+0x555/0x11f0 [ 130.269790][ T9586] ? path_openat+0x19ab/0x20b0 [ 130.274573][ T9586] ? putname+0xa5/0xc0 [ 130.278653][ T9586] ? ___cache_free+0x3c/0x300 [ 130.283499][ T9586] ? blkdev_common_ioctl+0x9c3/0x1040 [ 130.288942][ T9586] ? selinux_file_ioctl+0x8e0/0x970 [ 130.294129][ T9586] ? lo_release+0x120/0x120 [ 130.298822][ T9586] blkdev_ioctl+0x1d0/0x3c0 [ 130.303717][ T9586] block_ioctl+0x6d/0x80 [ 130.308051][ T9586] ? blkdev_iopoll+0x70/0x70 [ 130.312818][ T9586] __se_sys_ioctl+0xcb/0x140 [ 130.318104][ T9586] __x64_sys_ioctl+0x3f/0x50 [ 130.322958][ T9586] do_syscall_64+0x4a/0x90 [ 130.327452][ T9586] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 130.334043][ T9586] RIP: 0033:0x466397 [ 130.338191][ T9586] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.359287][ T9586] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 130.368979][ T9586] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 130.377462][ T9586] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 130.386188][ T9586] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 130.394614][ T9586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 130.403153][ T9586] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 [ 130.413842][ T9586] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 130.424637][ T9586] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 130.442295][ T9599] loop5: p1 p2 p3 p4 [ 130.451154][ T9599] loop5: p1 start 10 is beyond EOD, truncated [ 130.457275][ T9599] loop5: p2 size 1073872896 extends beyond EOD, truncated 02:23:10 executing program 4 (fault-call:3 fault-nth:26): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x1c000000}}], 0x1, 0x0) 02:23:10 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020009e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:10 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}], 0x1) 02:23:10 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000160007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:10 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x26, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 130.467940][ T9586] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 130.469181][ T9599] loop5: p3 start 2127165541 is beyond EOD, truncated [ 130.480209][ T9586] EXT4-fs (loop4): get root inode failed [ 130.486972][ T9599] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 130.492590][ T9586] EXT4-fs (loop4): mount failed 02:23:10 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020081e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x1f000000}}], 0x1, 0x0) 02:23:10 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000180007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:10 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {0x0}], 0x2) [ 130.588566][ T9637] loop4: detected capacity change from 0 to 1051 [ 130.597150][ T9638] loop5: detected capacity change from 0 to 1 [ 130.599724][ T9637] FAULT_INJECTION: forcing a failure. [ 130.599724][ T9637] name failslab, interval 1, probability 0, space 0, times 0 [ 130.615910][ T9637] CPU: 0 PID: 9637 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 130.625982][ T9637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.636222][ T9637] Call Trace: [ 130.639481][ T9637] dump_stack+0x137/0x19d [ 130.643868][ T9637] should_fail+0x23c/0x250 [ 130.648334][ T9637] __should_failslab+0x81/0x90 [ 130.653078][ T9637] should_failslab+0x5/0x20 [ 130.657605][ T9637] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 130.663305][ T9637] ? __kmalloc_node_track_caller+0x30/0x40 [ 130.669185][ T9637] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 130.674692][ T9637] __kmalloc_node_track_caller+0x30/0x40 [ 130.680325][ T9637] ? alloc_uevent_skb+0x5b/0x120 [ 130.685304][ T9637] __alloc_skb+0x187/0x420 [ 130.689888][ T9637] alloc_uevent_skb+0x5b/0x120 [ 130.694769][ T9637] kobject_uevent_env+0x863/0xc40 [ 130.699820][ T9637] kobject_uevent+0x18/0x20 [ 130.704306][ T9637] loop_configure+0xb3c/0xcb0 [ 130.709545][ T9637] lo_ioctl+0x555/0x11f0 [ 130.713896][ T9637] ? path_openat+0x19ab/0x20b0 [ 130.719255][ T9637] ? putname+0xa5/0xc0 [ 130.723309][ T9637] ? ___cache_free+0x3c/0x300 [ 130.728140][ T9637] ? blkdev_common_ioctl+0x9c3/0x1040 [ 130.733524][ T9637] ? selinux_file_ioctl+0x8e0/0x970 [ 130.738698][ T9637] ? lo_release+0x120/0x120 [ 130.743212][ T9637] blkdev_ioctl+0x1d0/0x3c0 [ 130.747779][ T9637] block_ioctl+0x6d/0x80 [ 130.752431][ T9637] ? blkdev_iopoll+0x70/0x70 [ 130.757113][ T9637] __se_sys_ioctl+0xcb/0x140 [ 130.761760][ T9637] __x64_sys_ioctl+0x3f/0x50 [ 130.766507][ T9637] do_syscall_64+0x4a/0x90 [ 130.770925][ T9637] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 130.777189][ T9637] RIP: 0033:0x466397 [ 130.781397][ T9637] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.802309][ T9637] RSP: 002b:00007f71cabe1f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 130.810997][ T9637] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000466397 [ 130.819706][ T9637] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 130.827935][ T9637] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 130.836009][ T9637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 130.844409][ T9637] R13: 0000000000000005 R14: 0000000020000558 R15: 0000000000000001 02:23:11 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24020000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x30000000}}], 0x1, 0x0) [ 130.893602][ T9638] loop5: p1 p2 p3 p4 [ 130.906672][ T9637] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 130.916467][ T9638] loop5: p1 start 10 is beyond EOD, truncated [ 130.922817][ T9638] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 130.945895][ T9637] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 130.974384][ T9638] loop5: p3 start 2127165541 is beyond EOD, truncated [ 130.981346][ T9638] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 130.999503][ T9637] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 131.011691][ T9637] EXT4-fs (loop4): get root inode failed [ 131.017457][ T9637] EXT4-fs (loop4): mount failed 02:23:11 executing program 4 (fault-call:3 fault-nth:27): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:11 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24030000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:11 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f6105000200b1e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x97ffffff}}], 0x1, 0x0) 02:23:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {0x0}], 0x2) 02:23:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x2e, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {0x0}], 0x2) 02:23:11 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020002e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:11 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24040000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 131.143190][ T9690] loop5: detected capacity change from 0 to 1 [ 131.158235][ T9693] loop4: detected capacity change from 0 to 1051 [ 131.185277][ T9690] loop5: p1 p2 p3 p4 [ 131.186816][ T9693] FAULT_INJECTION: forcing a failure. [ 131.186816][ T9693] name failslab, interval 1, probability 0, space 0, times 0 [ 131.189410][ T9690] loop5: p1 start 10 is beyond EOD, truncated [ 131.202559][ T9693] CPU: 0 PID: 9693 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 131.208762][ T9690] loop5: p2 size 1073872896 extends beyond EOD, 02:23:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xe4020000}}], 0x1, 0x0) [ 131.218970][ T9693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.218983][ T9693] Call Trace: [ 131.218990][ T9693] dump_stack+0x137/0x19d [ 131.225945][ T9690] truncated [ 131.236039][ T9693] should_fail+0x23c/0x250 [ 131.236062][ T9693] ? getname_flags+0x84/0x3d0 [ 131.256046][ T9693] __should_failslab+0x81/0x90 [ 131.260911][ T9693] should_failslab+0x5/0x20 [ 131.265439][ T9693] kmem_cache_alloc+0x46/0x2f0 [ 131.270262][ T9693] getname_flags+0x84/0x3d0 [ 131.273006][ T9690] loop5: p3 start 2127165541 is beyond EOD, [ 131.274769][ T9693] do_mkdirat+0x3b/0x200 02:23:11 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24050000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:11 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020003e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 131.274809][ T9690] truncated [ 131.274813][ T9690] loop5: p4 size 3657465856 extends beyond EOD, [ 131.280892][ T9690] truncated [ 131.297632][ T9693] __x64_sys_mkdir+0x32/0x40 [ 131.302350][ T9693] do_syscall_64+0x4a/0x90 [ 131.306787][ T9693] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 131.312681][ T9693] RIP: 0033:0x4656e7 [ 131.316590][ T9693] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 131.336389][ T9693] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 131.344805][ T9693] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004656e7 [ 131.352906][ T9693] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 131.360873][ T9693] RBP: 00007f71cabe2040 R08: 0000000000000000 R09: ffffffffffffffff [ 131.368845][ T9693] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 131.376796][ T9693] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 02:23:11 executing program 4 (fault-call:3 fault-nth:28): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000001800)=""/245, 0xf5}], 0x1) 02:23:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xe8030000}}], 0x1, 0x0) 02:23:11 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24060000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:11 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x48, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:11 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020004e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000001800)=""/245, 0xf5}], 0x1) 02:23:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xeffdffff}}], 0x1, 0x0) 02:23:11 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24070000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:11 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020005e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 131.492589][ T9732] loop5: detected capacity change from 0 to 1 [ 131.504734][ T9733] loop4: detected capacity change from 0 to 1051 [ 131.516306][ T9733] FAULT_INJECTION: forcing a failure. [ 131.516306][ T9733] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 131.529504][ T9733] CPU: 1 PID: 9733 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 131.539975][ T9733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.550018][ T9733] Call Trace: [ 131.553333][ T9733] dump_stack+0x137/0x19d [ 131.557959][ T9733] should_fail+0x23c/0x250 [ 131.562582][ T9733] should_fail_usercopy+0x16/0x20 [ 131.567678][ T9733] strncpy_from_user+0x21/0x250 [ 131.572579][ T9733] getname_flags+0xb8/0x3d0 [ 131.577068][ T9733] do_mkdirat+0x3b/0x200 [ 131.581369][ T9733] __x64_sys_mkdir+0x32/0x40 [ 131.586128][ T9733] do_syscall_64+0x4a/0x90 [ 131.590545][ T9733] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 131.596426][ T9733] RIP: 0033:0x4656e7 [ 131.600486][ T9733] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 131.620360][ T9733] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 131.629041][ T9733] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004656e7 [ 131.637096][ T9733] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 131.645065][ T9733] RBP: 00007f71cabe2040 R08: 0000000000000000 R09: ffffffffffffffff [ 131.653021][ T9733] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 131.660990][ T9733] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 02:23:11 executing program 4 (fault-call:3 fault-nth:29): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 131.736669][ T9732] loop5: p1 p2 p3 p4 [ 131.740747][ T9732] loop5: p1 start 10 is beyond EOD, truncated [ 131.747004][ T9732] loop5: p2 size 1073872896 extends beyond EOD, truncated 02:23:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000001800)=""/245, 0xf5}], 0x1) 02:23:11 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24090000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xf4010000}}], 0x1, 0x0) 02:23:11 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020006e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 131.796352][ T9732] loop5: p3 start 2127165541 is beyond EOD, truncated [ 131.803179][ T9732] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 131.806468][ T9759] loop4: detected capacity change from 0 to 1051 [ 131.820456][ T9759] FAULT_INJECTION: forcing a failure. [ 131.820456][ T9759] name failslab, interval 1, probability 0, space 0, times 0 [ 131.833473][ T9759] CPU: 0 PID: 9759 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 131.843590][ T9759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.853880][ T9759] Call Trace: [ 131.857173][ T9759] dump_stack+0x137/0x19d [ 131.861538][ T9759] should_fail+0x23c/0x250 [ 131.866007][ T9759] ? __d_alloc+0x36/0x370 [ 131.870364][ T9759] __should_failslab+0x81/0x90 [ 131.875327][ T9759] should_failslab+0x5/0x20 [ 131.879832][ T9759] kmem_cache_alloc+0x46/0x2f0 [ 131.884620][ T9759] __d_alloc+0x36/0x370 [ 131.888842][ T9759] ? queue_work_on+0x98/0xc0 02:23:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xfeffffff}}], 0x1, 0x0) [ 131.893550][ T9759] d_alloc+0x2a/0x130 [ 131.897550][ T9759] __lookup_hash+0x8f/0x180 [ 131.902204][ T9759] filename_create+0xdb/0x3c0 [ 131.906968][ T9759] do_mkdirat+0x59/0x200 [ 131.911222][ T9759] __x64_sys_mkdir+0x32/0x40 [ 131.915901][ T9759] do_syscall_64+0x4a/0x90 [ 131.920429][ T9759] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 131.926336][ T9759] RIP: 0033:0x4656e7 [ 131.930267][ T9759] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 131.950044][ T9759] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 131.959407][ T9759] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004656e7 [ 131.967977][ T9759] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 131.976174][ T9759] RBP: 00007f71cabe2040 R08: 0000000000000000 R09: ffffffffffffffff [ 131.985970][ T9759] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 02:23:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x4c, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:12 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24480100190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:12 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{0x0}, {&(0x7f0000001800)=""/245, 0xf5}], 0x2) 02:23:12 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020007e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:12 executing program 4 (fault-call:3 fault-nth:30): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:12 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000300190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 131.994719][ T9759] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 02:23:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xffff0000}}], 0x1, 0x0) 02:23:12 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000500190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:12 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{0x0}, {&(0x7f0000001800)=""/245, 0xf5}], 0x2) 02:23:12 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020009e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xfffffdef}}], 0x1, 0x0) [ 132.079657][ T9791] loop5: detected capacity change from 0 to 1 02:23:12 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000600190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 132.128851][ T1035] loop5: p1 p2 p3 p4 [ 132.140670][ T1035] loop5: p1 start 10 is beyond EOD, truncated [ 132.147170][ T1035] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 132.150621][ T9799] loop4: detected capacity change from 0 to 1051 [ 132.162044][ T9799] FAULT_INJECTION: forcing a failure. [ 132.162044][ T9799] name failslab, interval 1, probability 0, space 0, times 0 [ 132.175892][ T9799] CPU: 1 PID: 9799 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 132.182732][ T1035] loop5: p3 start 2127165541 is beyond EOD, [ 132.185956][ T9799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.185968][ T9799] Call Trace: [ 132.185975][ T9799] dump_stack+0x137/0x19d [ 132.193392][ T1035] truncated [ 132.204334][ T9799] should_fail+0x23c/0x250 [ 132.207635][ T1035] loop5: p4 size 3657465856 extends beyond EOD, [ 132.212214][ T9799] ? ext4_alloc_inode+0x27/0x300 [ 132.215458][ T1035] truncated [ 132.220096][ T9799] __should_failslab+0x81/0x90 [ 132.240602][ T9799] ? set_qf_name+0x230/0x230 [ 132.245443][ T9799] should_failslab+0x5/0x20 [ 132.249982][ T9799] kmem_cache_alloc+0x46/0x2f0 [ 132.255037][ T9799] ? ebitmap_destroy+0x91/0xa0 [ 132.260324][ T9799] ? set_qf_name+0x230/0x230 [ 132.265005][ T9799] ext4_alloc_inode+0x27/0x300 [ 132.271953][ T9799] ? set_qf_name+0x230/0x230 [ 132.276571][ T9799] new_inode_pseudo+0x38/0x1c0 [ 132.281552][ T9799] new_inode+0x21/0x120 [ 132.285794][ T9799] __ext4_new_inode+0x126/0x2f70 [ 132.290716][ T9799] ? __dquot_initialize+0x131/0x7e0 [ 132.295901][ T9799] ext4_mkdir+0x28a/0x760 [ 132.300314][ T9799] vfs_mkdir+0x2a4/0x370 [ 132.304539][ T9799] do_mkdirat+0x11d/0x200 [ 132.308867][ T9799] __x64_sys_mkdir+0x32/0x40 [ 132.313435][ T9799] do_syscall_64+0x4a/0x90 [ 132.318539][ T9799] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 132.324508][ T9799] RIP: 0033:0x4656e7 [ 132.328467][ T9799] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 132.348670][ T9799] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 132.357209][ T9799] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004656e7 [ 132.365394][ T9799] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 132.373461][ T9799] RBP: 00007f71cabe2040 R08: 0000000000000000 R09: ffffffffffffffff [ 132.381408][ T9799] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 132.390849][ T9799] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 132.411870][ T9791] loop5: p1 p2 p3 p4 [ 132.417163][ T9791] loop5: p1 start 10 is beyond EOD, truncated [ 132.423361][ T9791] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 132.431006][ T9791] loop5: p3 start 2127165541 is beyond EOD, truncated [ 132.437826][ T9791] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:23:12 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x60, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:12 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f6105000200b1e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:12 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000700190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:12 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{0x0}, {&(0x7f0000001800)=""/245, 0xf5}], 0x2) 02:23:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xffffff7f}}], 0x1, 0x0) 02:23:12 executing program 4 (fault-call:3 fault-nth:31): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:12 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000900190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:12 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xffffff97}}], 0x1, 0x0) [ 132.531177][ T9841] loop5: detected capacity change from 0 to 1 [ 132.541395][ T9839] loop4: detected capacity change from 0 to 1051 [ 132.550267][ T9839] FAULT_INJECTION: forcing a failure. [ 132.550267][ T9839] name failslab, interval 1, probability 0, space 0, times 0 [ 132.563141][ T9839] CPU: 1 PID: 9839 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 132.573213][ T9839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.583534][ T9839] Call Trace: [ 132.586900][ T9839] dump_stack+0x137/0x19d [ 132.591561][ T9839] should_fail+0x23c/0x250 [ 132.596235][ T9839] ? security_inode_alloc+0x30/0x180 [ 132.601503][ T9839] __should_failslab+0x81/0x90 [ 132.606378][ T9839] should_failslab+0x5/0x20 [ 132.610862][ T9839] kmem_cache_alloc+0x46/0x2f0 [ 132.615674][ T9839] security_inode_alloc+0x30/0x180 [ 132.620869][ T9839] inode_init_always+0x20b/0x420 [ 132.625784][ T9839] ? set_qf_name+0x230/0x230 [ 132.630437][ T9839] new_inode_pseudo+0x73/0x1c0 [ 132.635213][ T9839] new_inode+0x21/0x120 [ 132.639449][ T9839] __ext4_new_inode+0x126/0x2f70 [ 132.644378][ T9839] ? __dquot_initialize+0x131/0x7e0 [ 132.649571][ T9839] ext4_mkdir+0x28a/0x760 [ 132.653904][ T9839] vfs_mkdir+0x2a4/0x370 [ 132.658258][ T9839] do_mkdirat+0x11d/0x200 [ 132.662632][ T9839] __x64_sys_mkdir+0x32/0x40 [ 132.667225][ T9839] do_syscall_64+0x4a/0x90 [ 132.671769][ T9839] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 132.677865][ T9839] RIP: 0033:0x4656e7 [ 132.681763][ T9839] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 132.701803][ T9839] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 132.710346][ T9839] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004656e7 [ 132.718330][ T9839] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 02:23:12 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}], 0x1) [ 132.726279][ T9839] RBP: 00007f71cabe2040 R08: 0000000000000000 R09: ffffffffffffffff [ 132.734316][ T9839] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 132.742909][ T9839] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 132.755854][ T1035] loop5: p1 p2 p3 p4 [ 132.759989][ T1035] loop5: p1 start 10 is beyond EOD, truncated [ 132.766233][ T1035] loop5: p2 size 1073872896 extends beyond EOD, truncated 02:23:12 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24002000190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:12 executing program 4 (fault-call:3 fault-nth:32): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 132.793306][ T1035] loop5: p3 start 2127165541 is beyond EOD, truncated [ 132.800189][ T1035] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 132.835877][ T9841] loop5: p1 p2 p3 p4 [ 132.840072][ T9841] loop5: p1 start 10 is beyond EOD, truncated [ 132.844863][ T9867] loop4: detected capacity change from 0 to 1051 [ 132.846189][ T9841] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 132.853295][ T9867] FAULT_INJECTION: forcing a failure. [ 132.853295][ T9867] name failslab, interval 1, probability 0, space 0, times 0 [ 132.861533][ T9841] loop5: p3 start 2127165541 is beyond EOD, truncated [ 132.872947][ T9867] CPU: 0 PID: 9867 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 132.872969][ T9867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.872977][ T9867] Call Trace: [ 132.872998][ T9867] dump_stack+0x137/0x19d [ 132.879788][ T9841] loop5: p4 size 3657465856 extends beyond EOD, [ 132.889884][ T9867] should_fail+0x23c/0x250 [ 132.889913][ T9867] ? security_inode_alloc+0x30/0x180 [ 132.900043][ T9841] truncated [ 132.903372][ T9867] __should_failslab+0x81/0x90 [ 132.932316][ T9867] should_failslab+0x5/0x20 [ 132.937192][ T9867] kmem_cache_alloc+0x46/0x2f0 [ 132.941948][ T9867] security_inode_alloc+0x30/0x180 [ 132.947057][ T9867] inode_init_always+0x20b/0x420 [ 132.952040][ T9867] ? set_qf_name+0x230/0x230 [ 132.956613][ T9867] new_inode_pseudo+0x73/0x1c0 [ 132.961621][ T9867] new_inode+0x21/0x120 [ 132.965764][ T9867] __ext4_new_inode+0x126/0x2f70 [ 132.970895][ T9867] ? __dquot_initialize+0x131/0x7e0 [ 132.976250][ T9867] ext4_mkdir+0x28a/0x760 [ 132.980615][ T9867] vfs_mkdir+0x2a4/0x370 [ 132.984942][ T9867] do_mkdirat+0x11d/0x200 [ 132.989254][ T9867] __x64_sys_mkdir+0x32/0x40 [ 132.993921][ T9867] do_syscall_64+0x4a/0x90 [ 132.998357][ T9867] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.004251][ T9867] RIP: 0033:0x4656e7 [ 133.008162][ T9867] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 133.028211][ T9867] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 02:23:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x68, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xfffffffe}}], 0x1, 0x0) 02:23:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x13, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:13 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24014800190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:13 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02030100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:13 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02040100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 133.036795][ T9867] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004656e7 [ 133.044776][ T9867] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 133.053690][ T9867] RBP: 00007f71cabe2040 R08: 0000000000000000 R09: ffffffffffffffff [ 133.062691][ T9867] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 133.070758][ T9867] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 02:23:13 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000770007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x4000000000000}}], 0x1, 0x0) 02:23:13 executing program 4 (fault-call:3 fault-nth:33): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:13 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000200190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 133.123015][ T9883] loop2: detected capacity change from 0 to 1 [ 133.139907][ T9892] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=9892 comm=syz-executor.3 [ 133.174272][ T9900] loop4: detected capacity change from 0 to 1051 [ 133.180758][ T9883] loop2: p1 p2 p3 p4 [ 133.185386][ T9883] loop2: p1 start 10 is beyond EOD, truncated [ 133.190093][ T9900] FAULT_INJECTION: forcing a failure. [ 133.190093][ T9900] name failslab, interval 1, probability 0, space 0, times 0 [ 133.191459][ T9883] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 133.204166][ T9900] CPU: 1 PID: 9900 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 02:23:13 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe020c0100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:13 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000300190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 133.221422][ T9900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.231569][ T9900] Call Trace: [ 133.234930][ T9900] dump_stack+0x137/0x19d [ 133.239453][ T9900] should_fail+0x23c/0x250 [ 133.243898][ T9900] ? kcalloc+0x32/0x50 [ 133.247694][ T9912] loop5: detected capacity change from 0 to 1 [ 133.247996][ T9900] __should_failslab+0x81/0x90 [ 133.258878][ T9900] should_failslab+0x5/0x20 [ 133.263387][ T9900] __kmalloc+0x66/0x340 [ 133.267787][ T9900] ? chksum_update+0x39/0x50 [ 133.272908][ T9900] kcalloc+0x32/0x50 [ 133.277074][ T9900] ext4_find_extent+0x21c/0x7f0 [ 133.282049][ T9900] ext4_ext_map_blocks+0xd9/0x1f00 [ 133.287539][ T9900] ? __down_read_common+0x16b/0x5a0 [ 133.292814][ T9900] ? percpu_counter_add_batch+0x69/0xd0 [ 133.298566][ T9900] ? ext4_es_lookup_extent+0x206/0x490 [ 133.304875][ T9900] ext4_map_blocks+0x1be/0xef0 [ 133.309797][ T9900] ext4_getblk+0xb1/0x3d0 [ 133.314503][ T9900] ? __ext4_new_inode+0x2aed/0x2f70 [ 133.319872][ T9900] ext4_bread+0x28/0x130 [ 133.325266][ T9900] ext4_append+0xd1/0x1c0 [ 133.330248][ T9900] ext4_init_new_dir+0x177/0x500 [ 133.335446][ T9900] ext4_mkdir+0x329/0x760 [ 133.340124][ T9900] vfs_mkdir+0x2a4/0x370 [ 133.344368][ T9900] do_mkdirat+0x11d/0x200 [ 133.348917][ T9900] __x64_sys_mkdir+0x32/0x40 [ 133.353581][ T9900] do_syscall_64+0x4a/0x90 [ 133.358436][ T9900] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.364502][ T9900] RIP: 0033:0x4656e7 [ 133.368866][ T9900] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 133.388665][ T9900] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 133.397324][ T9900] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004656e7 [ 133.406352][ T9900] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 133.418478][ T9900] RBP: 00007f71cabe2040 R08: 0000000000000000 R09: ffffffffffffffff [ 133.426622][ T9900] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 133.434651][ T9900] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 133.448017][ T9883] loop2: p3 start 2127165541 is beyond EOD, truncated [ 133.455092][ T9883] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 133.455298][ T9900] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 133.463478][ T9912] loop5: p1 p2 p3 p4 [ 133.472053][ T9900] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 133.484083][ T9912] loop5: p1 start 10 is beyond EOD, truncated [ 133.491215][ T9912] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 133.500024][ T9912] loop5: p3 start 2127165541 is beyond EOD, truncated [ 133.500834][ T9900] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 133.506869][ T9912] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 133.526651][ T9900] EXT4-fs (loop4): get root inode failed [ 133.532420][ T9900] EXT4-fs (loop4): mount failed 02:23:13 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x6c, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x40030000000000}}], 0x1, 0x0) 02:23:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x68, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:13 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080200010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:13 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000400190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:13 executing program 4 (fault-call:3 fault-nth:34): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:13 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080800010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x200000000000000}}], 0x1, 0x0) [ 133.619119][ T9939] loop5: detected capacity change from 0 to 1 02:23:13 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000500190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 133.663616][ T9951] loop2: detected capacity change from 0 to 1 [ 133.683444][ T9939] loop5: p1 p2 p3 p4 [ 133.690382][ T9939] loop5: p1 start 10 is beyond EOD, truncated [ 133.696711][ T9939] loop5: p2 size 1073872896 extends beyond EOD, truncated 02:23:13 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080003010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x300000000000000}}], 0x1, 0x0) 02:23:13 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080103000800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 133.710596][ T9939] loop5: p3 start 2127165541 is beyond EOD, truncated [ 133.717450][ T9939] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 133.725313][ T9951] loop2: p1 p2 p3 p4 [ 133.731035][ T9951] loop2: p1 start 10 is beyond EOD, truncated [ 133.732383][ T9952] loop4: detected capacity change from 0 to 1051 [ 133.737435][ T9951] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 133.742282][ T9951] loop2: p3 start 2127165541 is beyond EOD, truncated [ 133.758079][ T9951] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 133.765193][ T9952] FAULT_INJECTION: forcing a failure. [ 133.765193][ T9952] name failslab, interval 1, probability 0, space 0, times 0 [ 133.778235][ T9952] CPU: 1 PID: 9952 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 133.788482][ T9952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.798549][ T9952] Call Trace: [ 133.801841][ T9952] dump_stack+0x137/0x19d [ 133.806216][ T9952] should_fail+0x23c/0x250 [ 133.811068][ T9952] ? __es_insert_extent+0x51f/0xe70 [ 133.816367][ T9952] __should_failslab+0x81/0x90 [ 133.821222][ T9952] should_failslab+0x5/0x20 [ 133.825707][ T9952] kmem_cache_alloc+0x46/0x2f0 [ 133.830587][ T9952] ? iput+0x1c2/0x590 [ 133.834566][ T9952] __es_insert_extent+0x51f/0xe70 [ 133.839577][ T9952] ? kcalloc+0x32/0x50 [ 133.843665][ T9952] ? __kmalloc+0x23d/0x340 [ 133.848074][ T9952] ? kcalloc+0x32/0x50 [ 133.852132][ T9952] ext4_es_insert_extent+0x1bb/0x19d0 [ 133.857486][ T9952] ? ext4_ext_convert_to_initialized+0xf50/0xf50 [ 133.864008][ T9952] ext4_ext_map_blocks+0xf79/0x1f00 [ 133.869191][ T9952] ? __down_read_common+0x16b/0x5a0 [ 133.874626][ T9952] ? percpu_counter_add_batch+0x69/0xd0 [ 133.880267][ T9952] ? ext4_es_lookup_extent+0x206/0x490 [ 133.885747][ T9952] ext4_map_blocks+0x1be/0xef0 [ 133.890921][ T9952] ext4_getblk+0xb1/0x3d0 [ 133.895341][ T9952] ? __ext4_new_inode+0x2aed/0x2f70 [ 133.900863][ T9952] ext4_bread+0x28/0x130 [ 133.905276][ T9952] ext4_append+0xd1/0x1c0 [ 133.909683][ T9952] ext4_init_new_dir+0x177/0x500 [ 133.914699][ T9952] ext4_mkdir+0x329/0x760 [ 133.919250][ T9952] vfs_mkdir+0x2a4/0x370 [ 133.923532][ T9952] do_mkdirat+0x11d/0x200 [ 133.928057][ T9952] __x64_sys_mkdir+0x32/0x40 [ 133.933096][ T9952] do_syscall_64+0x4a/0x90 [ 133.938277][ T9952] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.944431][ T9952] RIP: 0033:0x4656e7 [ 133.949096][ T9952] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 133.970437][ T9952] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 133.979507][ T9952] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004656e7 [ 133.987638][ T9952] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 133.996099][ T9952] RBP: 00007f71cabe2040 R08: 0000000000000000 R09: ffffffffffffffff [ 134.004487][ T9952] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 134.012923][ T9952] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 134.022239][ T9952] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 134.031775][ T9952] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 134.043312][ T9952] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 134.056250][ T9952] EXT4-fs (loop4): get root inode failed 02:23:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x74, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:14 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000600190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x400000000000000}}], 0x1, 0x0) 02:23:14 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080104000800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x40030000000000}}], 0x1, 0x0) 02:23:14 executing program 4 (fault-call:3 fault-nth:35): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 134.062342][ T9952] EXT4-fs (loop4): mount failed [ 134.069312][ T1035] loop5: p1 p2 p3 p4 [ 134.075560][ T1035] loop5: p1 start 10 is beyond EOD, truncated [ 134.082474][ T1035] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 134.090425][ T1035] loop5: p3 start 2127165541 is beyond EOD, truncated [ 134.098144][ T1035] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:23:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x40030000000000}}], 0x1, 0x0) 02:23:14 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000700190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 134.193670][T10008] loop4: detected capacity change from 0 to 1051 [ 134.207336][T10009] loop5: detected capacity change from 0 to 1 [ 134.207815][T10008] FAULT_INJECTION: forcing a failure. [ 134.207815][T10008] name failslab, interval 1, probability 0, space 0, times 0 [ 134.228055][T10008] CPU: 1 PID: 10008 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 134.238809][T10008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.250252][T10008] Call Trace: [ 134.254212][T10008] dump_stack+0x137/0x19d [ 134.258807][T10008] should_fail+0x23c/0x250 [ 134.263780][T10008] ? kcalloc+0x32/0x50 [ 134.268481][T10008] __should_failslab+0x81/0x90 [ 134.276553][T10008] should_failslab+0x5/0x20 [ 134.281371][T10008] __kmalloc+0x66/0x340 [ 134.285535][T10008] ? kcalloc+0x32/0x50 [ 134.289863][T10008] kcalloc+0x32/0x50 02:23:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x800000000000000}}], 0x1, 0x0) 02:23:14 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080102010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x40030000000000}}], 0x1, 0x0) 02:23:14 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000900190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 134.294008][T10008] ext4_find_extent+0x21c/0x7f0 [ 134.299224][T10008] ? kfree+0xf0/0x1d0 [ 134.303329][T10008] ext4_ext_map_blocks+0xd9/0x1f00 [ 134.308548][T10008] ? __down_write_common+0x45/0x890 [ 134.313753][T10008] ? __down_read_common+0x16b/0x5a0 [ 134.319226][T10008] ? percpu_counter_add_batch+0x69/0xd0 [ 134.325022][T10008] ? ext4_es_lookup_extent+0x206/0x490 [ 134.330531][T10008] ext4_map_blocks+0x70d/0xef0 [ 134.335644][T10008] ext4_getblk+0xb1/0x3d0 [ 134.340446][T10008] ext4_bread+0x28/0x130 [ 134.344946][T10008] ext4_append+0xd1/0x1c0 [ 134.349454][T10008] ext4_init_new_dir+0x177/0x500 [ 134.354518][T10008] ext4_mkdir+0x329/0x760 [ 134.359450][T10008] vfs_mkdir+0x2a4/0x370 [ 134.363726][T10008] do_mkdirat+0x11d/0x200 [ 134.368380][T10008] __x64_sys_mkdir+0x32/0x40 [ 134.373213][T10008] do_syscall_64+0x4a/0x90 [ 134.377627][T10008] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.383920][T10008] RIP: 0033:0x4656e7 [ 134.387978][T10008] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 134.409467][T10008] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 134.418573][T10008] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004656e7 [ 134.426918][T10008] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 134.435263][T10008] RBP: 00007f71cabe2040 R08: 0000000000000000 R09: ffffffffffffffff [ 134.443496][T10008] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 134.452507][T10008] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 134.497522][ T1035] loop5: p1 p2 p3 p4 [ 134.502332][ T1035] loop5: p1 start 10 is beyond EOD, truncated [ 134.508625][ T1035] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 134.517271][ T1035] loop5: p3 start 2127165541 is beyond EOD, truncated [ 134.524076][ T1035] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 134.533017][T10009] loop5: p1 p2 p3 p4 [ 134.537417][T10009] loop5: p1 start 10 is beyond EOD, truncated [ 134.543513][T10009] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 134.551213][T10009] loop5: p3 start 2127165541 is beyond EOD, truncated [ 134.558082][T10009] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:23:14 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x7a, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:14 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080103010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xa00000000000000}}], 0x1, 0x0) 02:23:14 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:14 executing program 4 (fault-call:3 fault-nth:36): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:14 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24004801190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:14 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080104010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xf00000000000000}}], 0x1, 0x0) 02:23:14 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:14 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000003190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 134.680239][T10063] loop5: detected capacity change from 0 to 1 [ 134.695965][T10065] loop4: detected capacity change from 0 to 1051 [ 134.705188][T10065] FAULT_INJECTION: forcing a failure. [ 134.705188][T10065] name failslab, interval 1, probability 0, space 0, times 0 [ 134.718042][T10065] CPU: 0 PID: 10065 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 134.728372][T10065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.738410][T10065] Call Trace: [ 134.741845][T10065] dump_stack+0x137/0x19d [ 134.746588][T10065] should_fail+0x23c/0x250 [ 134.751094][T10065] ? ext4_mb_new_blocks+0x2e7/0x1f90 [ 134.756372][T10065] __should_failslab+0x81/0x90 [ 134.761927][T10065] should_failslab+0x5/0x20 [ 134.766417][T10065] kmem_cache_alloc+0x46/0x2f0 [ 134.771456][T10065] ext4_mb_new_blocks+0x2e7/0x1f90 [ 134.776763][T10065] ? ext4_find_extent+0x6cf/0x7f0 [ 134.781789][T10065] ? ext4_ext_search_right+0x300/0x540 [ 134.787316][T10065] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 134.793304][T10065] ext4_ext_map_blocks+0x1569/0x1f00 [ 134.798599][T10065] ? __down_read_common+0x16b/0x5a0 [ 134.803968][T10065] ? percpu_counter_add_batch+0x69/0xd0 [ 134.809591][T10065] ? ext4_es_lookup_extent+0x206/0x490 [ 134.815069][T10065] ext4_map_blocks+0x70d/0xef0 [ 134.819824][T10065] ext4_getblk+0xb1/0x3d0 [ 134.824172][T10065] ext4_bread+0x28/0x130 [ 134.828427][T10065] ext4_append+0xd1/0x1c0 [ 134.832864][T10065] ext4_init_new_dir+0x177/0x500 [ 134.837800][T10065] ext4_mkdir+0x329/0x760 [ 134.842145][T10065] vfs_mkdir+0x2a4/0x370 [ 134.846654][T10065] do_mkdirat+0x11d/0x200 [ 134.851054][T10065] __x64_sys_mkdir+0x32/0x40 [ 134.855632][T10065] do_syscall_64+0x4a/0x90 [ 134.860051][T10065] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.866413][T10065] RIP: 0033:0x4656e7 [ 134.870466][T10065] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 134.890425][T10065] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 134.898993][T10065] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004656e7 [ 134.906986][T10065] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 134.915074][T10065] RBP: 00007f71cabe2040 R08: 0000000000000000 R09: ffffffffffffffff [ 134.923138][T10065] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 134.931313][T10065] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 134.946435][ T1035] loop5: p1 p2 p3 p4 [ 134.952220][ T1035] loop5: p1 start 10 is beyond EOD, truncated [ 134.958329][ T1035] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 134.971872][ T1035] loop5: p3 start 2127165541 is beyond EOD, truncated 02:23:15 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:15 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000005190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 134.979012][ T1035] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 134.988665][T10063] loop5: p1 p2 p3 p4 [ 134.994081][T10063] loop5: p1 start 10 is beyond EOD, truncated [ 135.000837][T10063] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 135.025649][T10063] loop5: p3 start 2127165541 is beyond EOD, truncated [ 135.032732][T10063] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 135.053175][ T1035] loop5: p1 p2 p3 p4 [ 135.057571][ T1035] loop5: p1 start 10 is beyond EOD, truncated [ 135.064530][ T1035] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 135.072620][ T1035] loop5: p3 start 2127165541 is beyond EOD, truncated 02:23:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x90, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x1008000000000000}}], 0x1, 0x0) 02:23:15 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080105010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:15 executing program 4 (fault-call:3 fault-nth:37): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:15 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:15 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000006190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 135.080102][ T1035] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:23:15 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 135.178054][T10120] loop5: detected capacity change from 0 to 1 [ 135.187128][T10121] loop4: detected capacity change from 0 to 1051 [ 135.211482][T10121] FAULT_INJECTION: forcing a failure. [ 135.211482][T10121] name failslab, interval 1, probability 0, space 0, times 0 [ 135.224341][T10121] CPU: 0 PID: 10121 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 135.235626][T10121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.246282][T10121] Call Trace: [ 135.250265][T10121] dump_stack+0x137/0x19d [ 135.254607][T10121] should_fail+0x23c/0x250 [ 135.259503][T10121] ? ext4_mb_new_blocks+0x2e7/0x1f90 [ 135.265003][T10121] __should_failslab+0x81/0x90 [ 135.271076][T10121] should_failslab+0x5/0x20 [ 135.276056][T10121] kmem_cache_alloc+0x46/0x2f0 [ 135.281929][T10121] ext4_mb_new_blocks+0x2e7/0x1f90 [ 135.287668][T10121] ? ext4_find_extent+0x6cf/0x7f0 [ 135.292710][T10121] ? ext4_ext_search_right+0x300/0x540 [ 135.298821][T10121] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 135.305646][T10121] ext4_ext_map_blocks+0x1569/0x1f00 [ 135.311333][T10121] ? __down_read_common+0x16b/0x5a0 [ 135.316758][T10121] ? percpu_counter_add_batch+0x69/0xd0 [ 135.322588][T10121] ? ext4_es_lookup_extent+0x206/0x490 02:23:15 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x1100000000000000}}], 0x1, 0x0) 02:23:15 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080106010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:15 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000007190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:15 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 135.328613][T10121] ext4_map_blocks+0x70d/0xef0 [ 135.334373][T10121] ext4_getblk+0xb1/0x3d0 [ 135.338765][T10121] ext4_bread+0x28/0x130 [ 135.343268][T10121] ext4_append+0xd1/0x1c0 [ 135.347615][T10121] ext4_init_new_dir+0x177/0x500 [ 135.352838][T10121] ext4_mkdir+0x329/0x760 [ 135.357338][T10121] vfs_mkdir+0x2a4/0x370 [ 135.362040][T10121] do_mkdirat+0x11d/0x200 [ 135.366574][T10121] __x64_sys_mkdir+0x32/0x40 [ 135.371174][T10121] do_syscall_64+0x4a/0x90 [ 135.375662][T10121] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 135.381826][T10121] RIP: 0033:0x4656e7 [ 135.385710][T10121] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 135.406771][T10121] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 135.415643][T10121] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004656e7 [ 135.423790][T10121] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 135.432414][T10121] RBP: 00007f71cabe2040 R08: 0000000000000000 R09: ffffffffffffffff [ 135.440587][T10121] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 135.448840][T10121] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 135.465074][T10120] loop5: p1 p2 p3 p4 [ 135.469560][T10120] loop5: p1 start 10 is beyond EOD, truncated [ 135.476565][T10120] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 135.485417][T10120] loop5: p3 start 2127165541 is beyond EOD, truncated [ 135.492752][T10120] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:23:15 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0xc0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x1800000000000000}}], 0x1, 0x0) 02:23:15 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080107010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:15 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000009190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:15 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:15 executing program 4 (fault-call:3 fault-nth:38): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:15 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000020190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 135.556718][T10120] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 135.602267][T10168] loop4: detected capacity change from 0 to 1051 [ 135.611629][T10168] FAULT_INJECTION: forcing a failure. [ 135.611629][T10168] name failslab, interval 1, probability 0, space 0, times 0 [ 135.624362][T10168] CPU: 0 PID: 10168 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 135.634790][T10168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.643501][T10175] loop5: detected capacity change from 0 to 1 02:23:15 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000148190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:15 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:15 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080109010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x1c00000000000000}}], 0x1, 0x0) [ 135.645018][T10168] Call Trace: [ 135.645026][T10168] dump_stack+0x137/0x19d [ 135.659546][T10168] should_fail+0x23c/0x250 [ 135.663988][T10168] ? ext4_mb_new_blocks+0x70f/0x1f90 [ 135.669317][T10168] __should_failslab+0x81/0x90 [ 135.674182][T10168] should_failslab+0x5/0x20 [ 135.678694][T10168] kmem_cache_alloc+0x46/0x2f0 [ 135.683497][T10168] ext4_mb_new_blocks+0x70f/0x1f90 [ 135.688708][T10168] ? ext4_find_extent+0x6cf/0x7f0 [ 135.693983][T10168] ? ext4_ext_search_right+0x300/0x540 [ 135.699470][T10168] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 135.705425][T10168] ext4_ext_map_blocks+0x1569/0x1f00 [ 135.710706][T10168] ? __down_read_common+0x16b/0x5a0 [ 135.715959][T10168] ? percpu_counter_add_batch+0xc0/0xd0 [ 135.721630][T10168] ? ext4_es_lookup_extent+0x206/0x490 [ 135.727123][T10168] ext4_map_blocks+0x70d/0xef0 [ 135.731991][T10168] ext4_getblk+0xb1/0x3d0 [ 135.736310][T10168] ext4_bread+0x28/0x130 [ 135.740541][T10168] ext4_append+0xd1/0x1c0 [ 135.744867][T10168] ext4_init_new_dir+0x177/0x500 [ 135.749923][T10168] ext4_mkdir+0x329/0x760 [ 135.754418][T10168] vfs_mkdir+0x2a4/0x370 [ 135.758681][T10168] do_mkdirat+0x11d/0x200 [ 135.763091][T10168] __x64_sys_mkdir+0x32/0x40 [ 135.768051][T10168] do_syscall_64+0x4a/0x90 [ 135.772493][T10168] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 135.778394][T10168] RIP: 0033:0x4656e7 [ 135.782268][T10168] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 135.802051][T10168] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 135.810677][T10168] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00000000004656e7 [ 135.818638][T10168] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 135.827110][T10168] RBP: 00007f71cabe2040 R08: 0000000000000000 R09: ffffffffffffffff [ 135.835391][T10168] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 135.843796][T10168] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 02:23:16 executing program 4 (fault-call:3 fault-nth:39): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 135.896508][T10175] loop5: p1 p2 p3 p4 [ 135.902945][T10175] loop5: p1 start 10 is beyond EOD, truncated [ 135.909094][T10175] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 135.932205][T10175] loop5: p3 start 2127165541 is beyond EOD, truncated [ 135.939351][T10175] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 135.950068][T10203] loop4: detected capacity change from 0 to 1051 [ 135.967155][T10203] FAULT_INJECTION: forcing a failure. [ 135.967155][T10203] name failslab, interval 1, probability 0, space 0, times 0 [ 135.980035][T10203] CPU: 0 PID: 10203 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 135.990298][T10203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.000459][T10203] Call Trace: [ 136.003976][T10203] dump_stack+0x137/0x19d [ 136.008381][T10203] should_fail+0x23c/0x250 [ 136.013617][T10203] ? __se_sys_mount+0x4e/0x2e0 [ 136.018490][T10203] __should_failslab+0x81/0x90 [ 136.023641][T10203] should_failslab+0x5/0x20 [ 136.028220][T10203] __kmalloc_track_caller+0x64/0x340 [ 136.033576][T10203] ? strnlen_user+0x137/0x1c0 [ 136.038330][T10203] strndup_user+0x73/0x120 [ 136.042999][T10203] __se_sys_mount+0x4e/0x2e0 [ 136.047658][T10203] ? mntput+0x45/0x70 [ 136.051621][T10203] ? __fpregs_load_activate+0x103/0x1b0 [ 136.057293][T10203] __x64_sys_mount+0x63/0x70 [ 136.062014][T10203] do_syscall_64+0x4a/0x90 [ 136.066605][T10203] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 136.072578][T10203] RIP: 0033:0x467afa [ 136.076463][T10203] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 02:23:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x140, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:16 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe020801b1010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x1f00000000000000}}], 0x1, 0x0) 02:23:16 executing program 2: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:16 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000110007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:16 executing program 4 (fault-call:3 fault-nth:40): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 136.096048][T10203] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 136.104527][T10203] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa [ 136.112496][T10203] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 [ 136.120549][T10203] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 [ 136.128512][T10203] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 136.136647][T10203] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 02:23:16 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100020800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x3000000000000000}}], 0x1, 0x0) 02:23:16 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000120007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:16 executing program 2: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:16 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100080800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 136.228512][T10229] loop5: detected capacity change from 0 to 1 [ 136.256242][T10228] loop4: detected capacity change from 0 to 1051 [ 136.272019][T10228] FAULT_INJECTION: forcing a failure. 02:23:16 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010300080010000400ff7e", 0x24}], 0x1}, 0x0) [ 136.272019][T10228] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 136.285296][T10228] CPU: 0 PID: 10228 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 136.295866][T10228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.306097][T10228] Call Trace: [ 136.309420][T10228] dump_stack+0x137/0x19d [ 136.313862][T10228] should_fail+0x23c/0x250 [ 136.314295][T10229] loop5: p1 p2 p3 p4 [ 136.320722][T10228] should_fail_usercopy+0x16/0x20 [ 136.320748][T10228] _copy_from_user+0x1c/0xd0 [ 136.334502][T10228] strndup_user+0xb0/0x120 [ 136.339063][T10228] __se_sys_mount+0x4e/0x2e0 [ 136.343859][T10228] ? mntput+0x45/0x70 [ 136.347882][T10228] ? __fpregs_load_activate+0x8f/0x1b0 [ 136.351308][T10229] loop5: p1 start 10 is beyond EOD, [ 136.353452][T10228] ? do_mkdirat+0x1c7/0x200 [ 136.353476][T10228] __x64_sys_mount+0x63/0x70 [ 136.353493][T10228] do_syscall_64+0x4a/0x90 [ 136.358771][T10229] truncated [ 136.358777][T10229] loop5: p2 size 1073872896 extends beyond EOD, [ 136.363252][T10228] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 136.363281][T10228] RIP: 0033:0x467afa [ 136.363295][T10228] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 136.367951][T10229] truncated [ 136.403406][T10229] loop5: p3 start 2127165541 is beyond EOD, [ 136.411650][T10228] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 136.415161][T10229] truncated [ 136.421083][T10228] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa [ 136.429517][T10229] loop5: p4 size 3657465856 extends beyond EOD, [ 136.432564][T10228] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 [ 136.440727][T10229] truncated [ 136.447004][T10228] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 [ 136.447018][T10228] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 136.474253][T10228] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 136.513726][T10228] ================================================================== [ 136.522086][T10228] BUG: KCSAN: data-race in __lru_add_drain_all / mark_page_accessed [ 136.530148][T10228] [ 136.532466][T10228] write to 0xffff888237c266a8 of 1 bytes by task 9492 on cpu 0: [ 136.540085][T10228] mark_page_accessed+0x36e/0x550 [ 136.545193][T10228] shmem_file_read_iter+0x2fd/0x5c0 [ 136.550396][T10228] vfs_read+0x565/0x5d0 [ 136.554620][T10228] ksys_read+0xce/0x180 [ 136.558781][T10228] __x64_sys_read+0x3e/0x50 [ 136.563371][T10228] do_syscall_64+0x4a/0x90 [ 136.567796][T10228] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 136.573704][T10228] [ 136.576113][T10228] read to 0xffff888237c266a8 of 1 bytes by task 10228 on cpu 1: [ 136.583741][T10228] __lru_add_drain_all+0x236/0x3e0 [ 136.589127][T10228] lru_add_drain_all+0xc/0x10 [ 136.593846][T10228] invalidate_bdev+0x50/0x70 [ 136.598445][T10228] __loop_clr_fd+0x2e2/0x640 [ 136.603116][T10228] lo_ioctl+0x9eb/0x11f0 [ 136.607357][T10228] blkdev_ioctl+0x1d0/0x3c0 [ 136.611943][T10228] block_ioctl+0x6d/0x80 [ 136.616193][T10228] __se_sys_ioctl+0xcb/0x140 [ 136.621008][T10228] __x64_sys_ioctl+0x3f/0x50 [ 136.625598][T10228] do_syscall_64+0x4a/0x90 [ 136.630030][T10228] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 136.636027][T10228] [ 136.638343][T10228] value changed: 0x00 -> 0x01 [ 136.643014][T10228] [ 136.645454][T10228] Reported by Kernel Concurrency Sanitizer on: [ 136.651592][T10228] CPU: 1 PID: 10228 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 02:23:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x166, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x8000000000000000}}], 0x1, 0x0) 02:23:16 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000130007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:16 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010400080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:16 executing program 2: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:16 executing program 4 (fault-call:3 fault-nth:41): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 136.661739][T10228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.672095][T10228] ================================================================== 02:23:16 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000140007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:16 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) 02:23:16 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010c00080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x97ffffff00000000}}], 0x1, 0x0) [ 136.761941][T10276] loop5: detected capacity change from 0 to 1 [ 136.827058][T10276] loop5: p1 p2 p3 p4 [ 136.830892][T10279] loop4: detected capacity change from 0 to 1051 [ 136.831120][T10276] loop5: p1 start 10 is beyond EOD, truncated [ 136.843550][T10279] FAULT_INJECTION: forcing a failure. [ 136.843550][T10279] name failslab, interval 1, probability 0, space 0, times 0 [ 136.843600][T10276] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 136.863834][T10279] CPU: 0 PID: 10279 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 02:23:17 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) [ 136.874003][T10279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.876670][T10276] loop5: p3 start 2127165541 is beyond EOD, [ 136.884058][T10279] Call Trace: [ 136.884071][T10279] dump_stack+0x137/0x19d [ 136.884095][T10279] should_fail+0x23c/0x250 [ 136.884112][T10279] ? __se_sys_mount+0x91/0x2e0 [ 136.890336][T10276] truncated [ 136.890342][T10276] loop5: p4 size 3657465856 extends beyond EOD, [ 136.893786][T10279] __should_failslab+0x81/0x90 [ 136.898514][T10276] truncated 02:23:17 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800030010000400ff7e", 0x24}], 0x1}, 0x0) [ 136.923500][T10298] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 136.925470][T10279] should_failslab+0x5/0x20 [ 136.925491][T10279] __kmalloc_track_caller+0x64/0x340 [ 136.944780][T10279] ? strnlen_user+0x137/0x1c0 [ 136.949455][T10279] strndup_user+0x73/0x120 [ 136.953908][T10279] __se_sys_mount+0x91/0x2e0 [ 136.958513][T10279] ? mntput+0x45/0x70 [ 136.962867][T10279] ? __fpregs_load_activate+0x103/0x1b0 [ 136.968790][T10279] __x64_sys_mount+0x63/0x70 [ 136.974514][T10279] do_syscall_64+0x4a/0x90 [ 136.979207][T10279] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 136.985471][T10279] RIP: 0033:0x467afa [ 136.988322][T10302] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 136.989587][T10279] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 136.989604][T10279] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 136.989621][T10279] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa [ 136.989633][T10279] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 [ 137.047836][T10279] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 [ 137.056252][T10279] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 137.064437][T10279] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 02:23:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x204, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xe402000000000000}}], 0x1, 0x0) 02:23:17 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) 02:23:17 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000150007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:17 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010802080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:17 executing program 4 (fault-call:3 fault-nth:42): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:17 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 02:23:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xe803000000000000}}], 0x1, 0x0) 02:23:17 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010803080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:17 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000160007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 137.167880][T10321] loop5: detected capacity change from 0 to 1 [ 137.190802][T10325] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 137.243443][T10321] loop5: p1 p2 p3 p4 [ 137.248023][T10321] loop5: p1 start 10 is beyond EOD, truncated [ 137.254014][T10329] loop4: detected capacity change from 0 to 1051 [ 137.254317][T10321] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 137.275734][T10329] FAULT_INJECTION: forcing a failure. [ 137.275734][T10329] name fail_usercopy, interval 1, probability 0, space 0, times 0 02:23:17 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010804080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:17 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000180007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 137.290040][T10329] CPU: 0 PID: 10329 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 137.301790][T10329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.312707][T10329] Call Trace: [ 137.316270][T10329] dump_stack+0x137/0x19d [ 137.322138][T10329] should_fail+0x23c/0x250 [ 137.327158][T10329] should_fail_usercopy+0x16/0x20 [ 137.332319][T10329] _copy_from_user+0x1c/0xd0 [ 137.337699][T10329] strndup_user+0xb0/0x120 [ 137.342495][T10329] __se_sys_mount+0x91/0x2e0 [ 137.348574][T10329] ? mntput+0x45/0x70 [ 137.352914][T10329] ? __fpregs_load_activate+0x103/0x1b0 [ 137.355182][T10321] loop5: p3 start 2127165541 is beyond EOD, [ 137.359122][T10329] __x64_sys_mount+0x63/0x70 [ 137.359140][T10321] truncated [ 137.359149][T10329] do_syscall_64+0x4a/0x90 [ 137.365418][T10321] loop5: p4 size 3657465856 extends beyond EOD, [ 137.370151][T10329] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 137.373723][T10321] truncated [ 137.378298][T10329] RIP: 0033:0x467afa [ 137.399079][T10329] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 137.421583][T10329] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 137.430531][T10329] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa 02:23:17 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x300, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:17 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 02:23:17 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000002190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:17 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010805080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xeffdffff00000000}}], 0x1, 0x0) [ 137.438957][T10329] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 [ 137.448074][T10329] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 [ 137.456659][T10329] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 137.465477][T10329] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 02:23:17 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010806080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:17 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000003190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:17 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 02:23:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xf401000000000000}}], 0x1, 0x0) 02:23:17 executing program 4 (fault-call:3 fault-nth:43): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:17 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000004190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:17 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010807080010000400ff7e", 0x24}], 0x1}, 0x0) [ 137.550476][T10373] loop5: detected capacity change from 0 to 1 [ 137.613529][T10373] loop5: p1 p2 p3 p4 [ 137.628653][T10373] loop5: p1 start 10 is beyond EOD, truncated [ 137.628801][T10387] loop4: detected capacity change from 0 to 1051 [ 137.635678][T10373] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 137.647914][T10387] FAULT_INJECTION: forcing a failure. [ 137.647914][T10387] name failslab, interval 1, probability 0, space 0, times 0 [ 137.662768][T10373] loop5: p3 start 2127165541 is beyond EOD, truncated [ 137.664273][T10387] CPU: 0 PID: 10387 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 137.664292][T10387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.664299][T10387] Call Trace: [ 137.664306][T10387] dump_stack+0x137/0x19d [ 137.671147][T10373] loop5: p4 size 3657465856 extends beyond EOD, [ 137.681774][T10387] should_fail+0x23c/0x250 [ 137.681799][T10387] __should_failslab+0x81/0x90 [ 137.681821][T10387] ? __se_sys_mount+0xf2/0x2e0 [ 137.681846][T10387] should_failslab+0x5/0x20 [ 137.692473][T10373] truncated [ 137.696133][T10387] kmem_cache_alloc_trace+0x49/0x310 [ 137.736432][T10387] ? _copy_from_user+0x94/0xd0 [ 137.741461][T10387] __se_sys_mount+0xf2/0x2e0 [ 137.746334][T10387] ? mntput+0x45/0x70 [ 137.750580][T10387] ? __fpregs_load_activate+0x103/0x1b0 [ 137.756950][T10387] __x64_sys_mount+0x63/0x70 [ 137.761948][T10387] do_syscall_64+0x4a/0x90 [ 137.766504][T10387] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 137.773133][T10387] RIP: 0033:0x467afa [ 137.777456][T10387] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 137.798615][T10387] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 137.807969][T10387] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa [ 137.816190][T10387] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 [ 137.824557][T10387] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 [ 137.833584][T10387] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 137.841742][T10387] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 137.854077][ T1035] loop5: p1 p2 p3 p4 02:23:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x402, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xfeffffff00000000}}], 0x1, 0x0) 02:23:18 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000005190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:18 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 02:23:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010809080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:18 executing program 4 (fault-call:3 fault-nth:44): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:18 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) [ 137.858938][ T1035] loop5: p1 start 10 is beyond EOD, truncated [ 137.865710][ T1035] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 137.874124][ T1035] loop5: p3 start 2127165541 is beyond EOD, truncated [ 137.882295][ T1035] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:23:18 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000006190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe020801000108b1080010000400ff7e", 0x24}], 0x1}, 0x0) [ 137.936144][T10418] loop4: detected capacity change from 0 to 1051 [ 137.963509][T10418] FAULT_INJECTION: forcing a failure. [ 137.963509][T10418] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 137.978137][T10418] CPU: 0 PID: 10418 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 137.989068][T10418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.999782][T10418] Call Trace: [ 138.003240][T10418] dump_stack+0x137/0x19d [ 138.007582][T10418] should_fail+0x23c/0x250 [ 138.012409][T10418] should_fail_usercopy+0x16/0x20 [ 138.018377][T10418] _copy_from_user+0x1c/0xd0 [ 138.023097][T10418] __se_sys_mount+0x115/0x2e0 [ 138.028154][T10418] ? mntput+0x45/0x70 02:23:18 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000007190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xffff000000000000}}], 0x1, 0x0) 02:23:18 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 02:23:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe020801000108000c0010000400ff7e", 0x24}], 0x1}, 0x0) [ 138.032349][T10418] ? __fpregs_load_activate+0x103/0x1b0 [ 138.038695][T10418] __x64_sys_mount+0x63/0x70 [ 138.043696][T10418] do_syscall_64+0x4a/0x90 [ 138.044979][T10434] loop5: detected capacity change from 0 to 2 [ 138.048674][T10418] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 138.048704][T10418] RIP: 0033:0x467afa [ 138.048718][T10418] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 138.088197][T10418] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 138.097163][T10418] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa [ 138.106749][T10418] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 [ 138.115229][T10418] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 [ 138.123708][T10418] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 138.132117][T10418] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 138.166400][T10418] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 138.178141][T10434] loop5: p1 p2 p3 p4 [ 138.178305][T10418] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 138.182619][T10434] loop5: p1 start 10 is beyond EOD, truncated [ 138.198931][T10434] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 138.207578][T10418] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 138.207954][T10457] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 138.222251][T10418] EXT4-fs (loop4): get root inode failed [ 138.237672][T10418] EXT4-fs (loop4): mount failed [ 138.245130][T10434] loop5: p3 start 2127165541 is beyond EOD, truncated [ 138.251944][T10434] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 138.263089][ T1035] loop5: p1 p2 p3 p4 02:23:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x406, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:18 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 02:23:18 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000009190007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xffffff7f00000000}}], 0x1, 0x0) 02:23:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800030010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:18 executing program 4 (fault-call:3 fault-nth:45): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 138.267555][ T1035] loop5: p1 start 10 is beyond EOD, truncated [ 138.273771][ T1035] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 138.282502][ T1035] loop5: p3 start 2127165541 is beyond EOD, truncated [ 138.292895][ T1035] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:23:18 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) [ 138.327758][T10475] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 138.348728][T10477] loop4: detected capacity change from 0 to 1051 [ 138.363136][T10477] FAULT_INJECTION: forcing a failure. [ 138.363136][T10477] name fail_usercopy, interval 1, probability 0, space 0, times 0 02:23:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0xffffffff00000000}}], 0x1, 0x0) 02:23:18 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000770007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 138.376503][T10477] CPU: 0 PID: 10477 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 138.386666][T10477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.396809][T10477] Call Trace: [ 138.400243][T10477] dump_stack+0x137/0x19d [ 138.402955][T10489] loop5: detected capacity change from 0 to 2 [ 138.404784][T10477] should_fail+0x23c/0x250 [ 138.404825][T10477] should_fail_usercopy+0x16/0x20 [ 138.420462][T10477] _copy_from_user+0x1c/0xd0 02:23:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800040010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:18 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) [ 138.425082][T10477] __se_sys_mount+0x115/0x2e0 [ 138.429769][T10477] ? mntput+0x45/0x70 [ 138.433849][T10477] ? __fpregs_load_activate+0x8f/0x1b0 [ 138.440156][T10477] __x64_sys_mount+0x63/0x70 [ 138.444758][T10477] do_syscall_64+0x4a/0x90 [ 138.449384][T10477] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 138.455547][T10477] RIP: 0033:0x467afa 02:23:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}], 0x1, 0x0) [ 138.459657][T10477] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 138.479740][T10477] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 138.485838][T10503] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 138.489032][T10477] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa [ 138.505988][T10477] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 [ 138.514535][T10477] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 [ 138.520492][T10505] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=10505 comm=syz-executor.3 [ 138.522952][T10477] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 138.522967][T10477] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 138.569068][T10477] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 138.583054][T10489] loop5: p1 p2 p3 p4 [ 138.585877][T10477] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 138.587662][T10489] loop5: p1 start 10 is beyond EOD, truncated [ 138.602586][T10489] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 138.607080][T10477] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 138.622025][T10477] EXT4-fs (loop4): get root inode failed [ 138.627825][T10477] EXT4-fs (loop4): mount failed [ 138.636741][T10489] loop5: p3 start 2127165541 is beyond EOD, truncated [ 138.644240][T10489] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:23:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x480, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:18 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) 02:23:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe020801000108000c0010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:18 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000100007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0) 02:23:18 executing program 4 (fault-call:3 fault-nth:46): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:18 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) 02:23:18 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000110007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080007000400ff7e", 0x24}], 0x1}, 0x0) 02:23:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}], 0x1, 0x0) [ 138.750960][T10531] loop5: detected capacity change from 0 to 2 [ 138.751110][T10535] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 138.803564][T10531] loop5: p1 p2 p3 p4 [ 138.812185][T10531] loop5: p1 start 10 is beyond EOD, truncated [ 138.819001][T10531] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 138.825886][T10532] loop4: detected capacity change from 0 to 1051 [ 138.843769][T10532] FAULT_INJECTION: forcing a failure. 02:23:19 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe0208010001080008000a000400ff7e", 0x24}], 0x1}, 0x0) 02:23:19 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}], 0x1}, 0x0) [ 138.843769][T10532] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 138.857314][T10532] CPU: 0 PID: 10532 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 138.867684][T10532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.877012][T10531] loop5: p3 start 2127165541 is beyond EOD, [ 138.878361][T10532] Call Trace: [ 138.878370][T10532] dump_stack+0x137/0x19d [ 138.878403][T10532] should_fail+0x23c/0x250 [ 138.878417][T10532] should_fail_usercopy+0x16/0x20 [ 138.878432][T10532] strncpy_from_user+0x21/0x250 [ 138.878452][T10532] getname_flags+0xb8/0x3d0 [ 138.884819][T10531] truncated [ 138.888047][T10532] ? should_fail+0xd6/0x250 [ 138.888069][T10532] user_path_at_empty+0x28/0x50 [ 138.888085][T10532] __se_sys_mount+0x209/0x2e0 [ 138.888098][T10532] ? mntput+0x45/0x70 [ 138.892409][T10531] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 138.940154][T10532] ? __fpregs_load_activate+0x103/0x1b0 [ 138.945710][T10532] __x64_sys_mount+0x63/0x70 [ 138.950315][T10532] do_syscall_64+0x4a/0x90 [ 138.954795][T10532] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 138.961313][T10532] RIP: 0033:0x467afa [ 138.965388][T10532] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 138.985432][T10532] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 138.993952][T10532] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa 02:23:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x4f5, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:19 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000120007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}], 0x1, 0x0) 02:23:19 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080210000400ff7e", 0x24}], 0x1}, 0x0) 02:23:19 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) [ 139.002315][T10532] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 [ 139.010567][T10532] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 [ 139.018887][T10532] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 139.026943][T10532] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 139.038431][ T1035] loop5: p1 p2 p3 p4 [ 139.045105][ T1035] loop5: p1 start 10 is beyond EOD, truncated 02:23:19 executing program 4 (fault-call:3 fault-nth:47): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:19 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) 02:23:19 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000130007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 139.051214][ T1035] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 139.071626][T10575] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 139.091400][ T1035] loop5: p3 start 2127165541 is beyond EOD, truncated 02:23:19 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) 02:23:19 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080310000400ff7e", 0x24}], 0x1}, 0x0) [ 139.098418][ T1035] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 139.121687][T10584] loop4: detected capacity change from 0 to 1051 [ 139.129036][T10584] FAULT_INJECTION: forcing a failure. [ 139.129036][T10584] name failslab, interval 1, probability 0, space 0, times 0 [ 139.142035][T10584] CPU: 0 PID: 10584 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 02:23:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xa}}], 0x1, 0x0) 02:23:19 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000140007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 139.152221][T10584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.162483][T10584] Call Trace: [ 139.166221][T10584] dump_stack+0x137/0x19d [ 139.170835][T10584] should_fail+0x23c/0x250 [ 139.175333][T10584] __should_failslab+0x81/0x90 [ 139.178794][T10595] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 139.180279][T10584] ? alloc_fs_context+0x46/0x500 [ 139.194413][T10584] should_failslab+0x5/0x20 [ 139.198921][T10584] kmem_cache_alloc_trace+0x49/0x310 [ 139.204304][T10584] alloc_fs_context+0x46/0x500 [ 139.209104][T10584] ? strncmp+0x34/0x70 [ 139.213267][T10584] fs_context_for_mount+0x1d/0x20 [ 139.217754][T10598] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 139.218343][T10584] path_mount+0xdf5/0x1ce0 [ 139.232301][T10584] __se_sys_mount+0x23d/0x2e0 [ 139.237073][T10584] ? mntput+0x45/0x70 [ 139.241064][T10584] __x64_sys_mount+0x63/0x70 [ 139.245659][T10584] do_syscall_64+0x4a/0x90 [ 139.250163][T10584] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 139.256191][T10584] RIP: 0033:0x467afa [ 139.260175][T10584] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 139.279878][T10584] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 139.288539][T10584] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa [ 139.297069][T10584] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 [ 139.305269][T10584] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 [ 139.313502][T10584] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 139.321875][T10584] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 139.354773][T10592] loop5: detected capacity change from 0 to 2 [ 139.391504][T10592] loop5: p1 p2 p3 p4 [ 139.395749][T10592] loop5: p1 start 10 is beyond EOD, truncated [ 139.401864][T10592] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 139.413049][T10592] loop5: p3 start 2127165541 is beyond EOD, truncated [ 139.419891][T10592] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:23:19 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x500, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:19 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd020801000108", 0x1b}], 0x1}, 0x0) 02:23:19 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080410000400ff7e", 0x24}], 0x1}, 0x0) 02:23:19 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000150007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}], 0x1, 0x0) 02:23:19 executing program 4 (fault-call:3 fault-nth:48): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:19 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080510000400ff7e", 0x24}], 0x1}, 0x0) 02:23:19 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd020801000108", 0x1b}], 0x1}, 0x0) [ 139.501813][T10628] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 139.525697][T10631] loop4: detected capacity change from 0 to 1051 [ 139.538876][T10635] loop5: detected capacity change from 0 to 2 [ 139.553960][T10631] FAULT_INJECTION: forcing a failure. [ 139.553960][T10631] name failslab, interval 1, probability 0, space 0, times 0 [ 139.567272][T10631] CPU: 1 PID: 10631 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 139.577563][T10631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.587703][T10631] Call Trace: [ 139.591074][T10631] dump_stack+0x137/0x19d [ 139.595435][T10631] should_fail+0x23c/0x250 02:23:19 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000160007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:19 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080610000400ff7e", 0x24}], 0x1}, 0x0) 02:23:19 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd020801000108", 0x1b}], 0x1}, 0x0) 02:23:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x11}}], 0x1, 0x0) [ 139.599866][T10631] __should_failslab+0x81/0x90 [ 139.604633][T10631] ? alloc_fs_context+0x46/0x500 [ 139.609737][T10631] should_failslab+0x5/0x20 [ 139.614320][T10631] kmem_cache_alloc_trace+0x49/0x310 [ 139.619669][T10631] alloc_fs_context+0x46/0x500 [ 139.624578][T10631] ? strncmp+0x34/0x70 [ 139.628647][T10631] fs_context_for_mount+0x1d/0x20 [ 139.633715][T10631] path_mount+0xdf5/0x1ce0 [ 139.638223][T10631] __se_sys_mount+0x23d/0x2e0 [ 139.642921][T10631] ? mntput+0x45/0x70 [ 139.646924][T10631] ? __fpregs_load_activate+0x103/0x1b0 [ 139.652588][T10631] __x64_sys_mount+0x63/0x70 [ 139.657359][T10631] do_syscall_64+0x4a/0x90 [ 139.661828][T10631] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 139.667920][T10631] RIP: 0033:0x467afa [ 139.671806][T10631] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 139.691886][T10631] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 139.700734][T10631] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa [ 139.708706][T10631] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 [ 139.717090][T10631] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 [ 139.725162][T10631] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 139.733115][T10631] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 02:23:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x600, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:20 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000180007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:20 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080710000400ff7e", 0x24}], 0x1}, 0x0) 02:23:20 executing program 4 (fault-call:3 fault-nth:49): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:20 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd0208010001080008001000", 0x20}], 0x1}, 0x0) 02:23:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x18}}], 0x1, 0x0) [ 139.781769][T10635] loop5: p1 p2 p3 p4 [ 139.785949][T10635] loop5: p1 start 10 is beyond EOD, truncated [ 139.792060][T10635] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 139.817224][T10635] loop5: p3 start 2127165541 is beyond EOD, truncated [ 139.824203][T10635] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:23:20 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd0208010001080008001000", 0x20}], 0x1}, 0x0) 02:23:20 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000770007041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1c}}], 0x1, 0x0) [ 139.925469][T10686] loop4: detected capacity change from 0 to 1051 [ 139.942967][T10686] FAULT_INJECTION: forcing a failure. [ 139.942967][T10686] name failslab, interval 1, probability 0, space 0, times 0 [ 139.955938][T10686] CPU: 1 PID: 10686 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 139.966210][T10688] loop5: detected capacity change from 0 to 3 02:23:20 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080910000400ff7e", 0x24}], 0x1}, 0x0) [ 139.966270][T10686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.977240][T10694] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=119 sclass=netlink_route_socket pid=10694 comm=syz-executor.3 [ 139.982832][T10686] Call Trace: [ 139.982843][T10686] dump_stack+0x137/0x19d [ 140.004181][T10686] should_fail+0x23c/0x250 [ 140.008609][T10686] __should_failslab+0x81/0x90 [ 140.013536][T10686] ? legacy_init_fs_context+0x2d/0x70 [ 140.018918][T10686] should_failslab+0x5/0x20 02:23:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x30}}], 0x1, 0x0) 02:23:20 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe0208010001080008b110000400ff7e", 0x24}], 0x1}, 0x0) [ 140.023624][T10686] kmem_cache_alloc_trace+0x49/0x310 [ 140.029065][T10686] ? kmem_cache_alloc_trace+0x215/0x310 [ 140.035141][T10686] ? alloc_fs_context+0x46/0x500 [ 140.040602][T10686] legacy_init_fs_context+0x2d/0x70 [ 140.046172][T10686] alloc_fs_context+0x419/0x500 [ 140.051043][T10686] fs_context_for_mount+0x1d/0x20 [ 140.056283][T10686] path_mount+0xdf5/0x1ce0 [ 140.061552][T10686] __se_sys_mount+0x23d/0x2e0 [ 140.066265][T10686] ? mntput+0x45/0x70 [ 140.070654][T10686] __x64_sys_mount+0x63/0x70 [ 140.075250][T10686] do_syscall_64+0x4a/0x90 [ 140.079871][T10686] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 140.086191][T10686] RIP: 0033:0x467afa [ 140.090181][T10686] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 140.110161][T10686] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 140.118581][T10686] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa [ 140.126584][T10686] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 [ 140.134892][T10686] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 [ 140.143044][T10686] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 140.151016][T10686] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 140.184563][T10688] loop5: p1 p2 p3 p4 [ 140.189484][T10688] loop5: p1 start 10 is beyond EOD, truncated [ 140.195622][T10688] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 140.203417][T10688] loop5: p3 start 2127165541 is beyond EOD, truncated [ 140.210519][T10688] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:23:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x604, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:20 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190207041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4}}], 0x1, 0x0) 02:23:20 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080018000400ff7e", 0x24}], 0x1}, 0x0) 02:23:20 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd0208010001080008001000", 0x20}], 0x1}, 0x0) 02:23:20 executing program 4 (fault-call:3 fault-nth:50): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:20 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080021000400ff7e", 0x24}], 0x1}, 0x0) 02:23:20 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400", 0x22}], 0x1}, 0x0) 02:23:20 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190307041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2e4}}], 0x1, 0x0) [ 140.304015][T10727] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=537 sclass=netlink_route_socket pid=10727 comm=syz-executor.3 [ 140.317844][T10725] loop5: detected capacity change from 0 to 3 [ 140.383656][ T1035] loop5: p1 p2 p3 p4 [ 140.395009][T10732] loop4: detected capacity change from 0 to 1051 [ 140.398037][ T1035] loop5: p1 start 10 is beyond EOD, truncated [ 140.406866][T10732] FAULT_INJECTION: forcing a failure. [ 140.406866][T10732] name failslab, interval 1, probability 0, space 0, times 0 [ 140.408091][ T1035] loop5: p2 size 1073872896 extends beyond EOD, truncated 02:23:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x300}}], 0x1, 0x0) [ 140.421369][T10732] CPU: 1 PID: 10732 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 140.438956][T10732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.441567][T10746] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=793 sclass=netlink_route_socket pid=10746 comm=syz-executor.3 [ 140.449148][T10732] Call Trace: [ 140.449159][T10732] dump_stack+0x137/0x19d [ 140.449183][T10732] should_fail+0x23c/0x250 [ 140.474474][T10732] ? ext4_mount+0x40/0x40 [ 140.478971][T10732] ? getname_kernel+0x37/0x1d0 02:23:20 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190407041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 140.483753][T10732] __should_failslab+0x81/0x90 [ 140.488707][T10732] should_failslab+0x5/0x20 [ 140.493207][T10732] kmem_cache_alloc+0x46/0x2f0 [ 140.498059][T10732] ? avc_has_perm_noaudit+0x19a/0x240 [ 140.503530][T10732] ? ext4_mount+0x40/0x40 [ 140.507898][T10732] getname_kernel+0x37/0x1d0 [ 140.512748][T10732] ? ext4_mount+0x40/0x40 [ 140.514238][T10752] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1049 sclass=netlink_route_socket pid=10752 comm=syz-executor.3 [ 140.517536][T10732] kern_path+0x19/0x40 [ 140.517558][T10732] blkdev_get_by_path+0x54/0x1b0 [ 140.539998][T10732] mount_bdev+0x47/0x290 [ 140.544254][T10732] ? ext4_errno_to_code+0x110/0x110 [ 140.548840][ T1035] loop5: p3 start 2127165541 is beyond EOD, truncated [ 140.549579][T10732] ext4_mount+0x2d/0x40 [ 140.556360][ T1035] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 140.560472][T10732] legacy_get_tree+0x70/0xc0 [ 140.572132][T10732] vfs_get_tree+0x4a/0x1a0 [ 140.576551][T10732] path_mount+0x11d4/0x1ce0 [ 140.581052][T10732] __se_sys_mount+0x23d/0x2e0 [ 140.585737][T10732] ? mntput+0x45/0x70 [ 140.589727][T10732] ? __fpregs_load_activate+0x103/0x1b0 [ 140.595362][T10732] __x64_sys_mount+0x63/0x70 [ 140.599965][T10732] do_syscall_64+0x4a/0x90 [ 140.604372][T10732] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 140.610259][T10732] RIP: 0033:0x467afa [ 140.614191][T10732] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 140.633881][T10732] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 140.642388][T10732] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa [ 140.650703][T10732] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 [ 140.658833][T10732] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 [ 140.667027][T10732] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 140.675261][T10732] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 140.686452][T10725] loop5: p1 p2 p3 p4 [ 140.690821][T10725] loop5: p1 start 10 is beyond EOD, truncated [ 140.696934][T10725] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 140.705018][T10725] loop5: p3 start 2127165541 is beyond EOD, truncated [ 140.711808][T10725] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:23:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x700, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8}}], 0x1, 0x0) 02:23:20 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190507041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:20 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080002000400ff7e", 0x24}], 0x1}, 0x0) 02:23:20 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400", 0x22}], 0x1}, 0x0) 02:23:20 executing program 4 (fault-call:3 fault-nth:51): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:20 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400", 0x22}], 0x1}, 0x0) 02:23:21 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080007000400ff7e", 0x24}], 0x1}, 0x0) [ 140.818766][T10774] loop4: detected capacity change from 0 to 1051 [ 140.822491][T10779] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1305 sclass=netlink_route_socket pid=10779 comm=syz-executor.3 [ 140.825685][T10773] loop5: detected capacity change from 0 to 3 [ 140.851946][T10774] FAULT_INJECTION: forcing a failure. [ 140.851946][T10774] name failslab, interval 1, probability 0, space 0, times 0 02:23:21 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff", 0x23}], 0x1}, 0x0) [ 140.864805][T10774] CPU: 1 PID: 10774 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 140.875129][T10774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.885449][T10774] Call Trace: [ 140.888738][T10774] dump_stack+0x137/0x19d [ 140.893199][T10774] should_fail+0x23c/0x250 [ 140.897655][T10774] __should_failslab+0x81/0x90 [ 140.902767][T10774] ? alloc_super+0x3a/0x520 [ 140.907542][T10774] should_failslab+0x5/0x20 [ 140.912154][T10774] kmem_cache_alloc_trace+0x49/0x310 02:23:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x810}}], 0x1, 0x0) 02:23:21 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe0208010001080008000a000400ff7e", 0x24}], 0x1}, 0x0) 02:23:21 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190607041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 140.917441][T10774] ? __blkdev_get+0xc1/0x6d0 [ 140.922175][T10774] ? mount_bdev+0x290/0x290 [ 140.926770][T10774] alloc_super+0x3a/0x520 [ 140.931990][T10774] ? mount_bdev+0x290/0x290 [ 140.936932][T10774] sget+0x1a5/0x400 [ 140.940832][T10774] ? test_bdev_super+0x30/0x30 [ 140.945779][T10774] mount_bdev+0xd3/0x290 [ 140.950105][T10774] ? ext4_mount+0x40/0x40 [ 140.954520][T10774] ? ext4_errno_to_code+0x110/0x110 [ 140.960034][T10774] ext4_mount+0x2d/0x40 [ 140.964298][T10774] legacy_get_tree+0x70/0xc0 [ 140.968897][T10774] vfs_get_tree+0x4a/0x1a0 [ 140.973502][T10774] path_mount+0x11d4/0x1ce0 [ 140.978350][T10774] __se_sys_mount+0x23d/0x2e0 [ 140.983057][T10774] ? mntput+0x45/0x70 [ 140.987304][T10774] ? __fpregs_load_activate+0x103/0x1b0 [ 140.994147][T10774] __x64_sys_mount+0x63/0x70 [ 140.999480][T10774] do_syscall_64+0x4a/0x90 [ 141.000449][T10803] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1561 sclass=netlink_route_socket pid=10803 comm=syz-executor.3 [ 141.004020][T10774] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 141.004055][T10774] RIP: 0033:0x467afa [ 141.026991][T10774] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 141.047310][T10774] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 141.056048][T10774] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa [ 141.065000][T10774] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 [ 141.073003][T10774] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 [ 141.081154][T10774] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 141.089127][T10774] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 141.125140][ T1035] loop5: p1 p2 p3 p4 [ 141.129304][ T1035] loop5: p1 start 10 is beyond EOD, truncated [ 141.135773][ T1035] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 141.143412][ T1035] loop5: p3 start 2127165541 is beyond EOD, truncated [ 141.150307][ T1035] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 141.158767][T10773] loop5: p1 p2 p3 p4 [ 141.162995][T10773] loop5: p1 start 10 is beyond EOD, truncated [ 141.169370][T10773] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 141.177660][T10773] loop5: p3 start 2127165541 is beyond EOD, truncated [ 141.184666][T10773] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:23:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x900, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:21 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff", 0x23}], 0x1}, 0x0) 02:23:21 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080018000400ff7e", 0x24}], 0x1}, 0x0) 02:23:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}}], 0x1, 0x0) 02:23:21 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190707041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:21 executing program 4 (fault-call:3 fault-nth:52): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:21 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff", 0x23}], 0x1}, 0x0) 02:23:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}}], 0x1, 0x0) 02:23:21 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190907041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:21 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080021000400ff7e", 0x24}], 0x1}, 0x0) 02:23:21 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800030010000400ff7e", 0x24}], 0x1}, 0x0) [ 141.307651][T10833] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1817 sclass=netlink_route_socket pid=10833 comm=syz-executor.3 [ 141.333026][T10834] loop5: detected capacity change from 0 to 4 [ 141.353862][T10834] loop5: p1 p2 p3 p4 02:23:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0xe, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 141.373812][T10834] loop5: p1 start 10 is beyond EOD, truncated [ 141.380454][T10834] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 141.395986][T10834] loop5: p3 start 2127165541 is beyond EOD, truncated [ 141.403000][T10834] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 141.410236][T10835] loop4: detected capacity change from 0 to 1051 [ 141.423019][T10835] FAULT_INJECTION: forcing a failure. [ 141.423019][T10835] name failslab, interval 1, probability 0, space 0, times 0 [ 141.423716][T10852] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2329 sclass=netlink_route_socket pid=10852 comm=syz-executor.3 [ 141.435779][T10835] CPU: 1 PID: 10835 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 141.459252][T10835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.469800][T10835] Call Trace: [ 141.473076][T10835] dump_stack+0x137/0x19d [ 141.477520][T10835] should_fail+0x23c/0x250 [ 141.482034][T10835] ? kzalloc+0x1d/0x30 [ 141.486185][T10835] __should_failslab+0x81/0x90 [ 141.491119][T10835] should_failslab+0x5/0x20 [ 141.495631][T10835] __kmalloc+0x66/0x340 [ 141.500087][T10835] kzalloc+0x1d/0x30 [ 141.504071][T10835] security_sb_alloc+0x3c/0x180 [ 141.509045][T10835] alloc_super+0x10b/0x520 [ 141.513560][T10835] ? mount_bdev+0x290/0x290 [ 141.518104][T10835] sget+0x1a5/0x400 [ 141.521990][T10835] ? test_bdev_super+0x30/0x30 [ 141.526815][T10835] mount_bdev+0xd3/0x290 [ 141.531461][T10835] ? ext4_mount+0x40/0x40 [ 141.535861][T10835] ? ext4_errno_to_code+0x110/0x110 [ 141.541208][T10835] ext4_mount+0x2d/0x40 [ 141.545525][T10835] legacy_get_tree+0x70/0xc0 [ 141.550442][T10835] vfs_get_tree+0x4a/0x1a0 [ 141.555037][T10835] path_mount+0x11d4/0x1ce0 [ 141.559739][T10835] __se_sys_mount+0x23d/0x2e0 [ 141.564484][T10835] ? mntput+0x45/0x70 [ 141.568449][T10835] __x64_sys_mount+0x63/0x70 [ 141.573016][T10835] do_syscall_64+0x4a/0x90 [ 141.577502][T10835] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 141.583477][T10835] RIP: 0033:0x467afa [ 141.587379][T10835] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 141.607227][T10835] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 141.615631][T10835] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa 02:23:21 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0xa00, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:21 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010020400ff7e", 0x24}], 0x1}, 0x0) 02:23:21 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190010041dfffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 141.623714][T10835] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 [ 141.631675][T10835] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 [ 141.639854][T10835] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 141.647812][T10835] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 02:23:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1008}}], 0x1, 0x0) 02:23:21 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010030400ff7e", 0x24}], 0x1}, 0x0) 02:23:21 executing program 4 (fault-call:3 fault-nth:53): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 141.672387][ T1035] loop5: p1 p2 p3 p4 [ 141.676651][T10865] loop2: detected capacity change from 0 to 1 [ 141.683752][ T1035] loop5: p1 start 10 is beyond EOD, truncated [ 141.689951][ T1035] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 141.698749][ T1035] loop5: p3 start 2127165541 is beyond EOD, truncated [ 141.705908][ T1035] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:23:21 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010040400ff7e", 0x24}], 0x1}, 0x0) 02:23:21 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="240000001900070410fffd946f610500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}}], 0x1, 0x0) [ 141.723613][T10865] loop2: p1 p2 p3 p4 [ 141.733276][T10865] loop2: p1 start 10 is beyond EOD, truncated [ 141.739600][T10865] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 141.752913][T10865] loop2: p3 start 2127165541 is beyond EOD, truncated [ 141.759926][T10865] loop2: p4 size 3657465856 extends beyond EOD, truncated 02:23:21 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610b00020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:21 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010050400ff7e", 0x24}], 0x1}, 0x0) [ 141.795806][T10897] loop5: detected capacity change from 0 to 5 [ 141.820357][T10899] loop4: detected capacity change from 0 to 1051 [ 141.843721][T10899] FAULT_INJECTION: forcing a failure. [ 141.843721][T10899] name failslab, interval 1, probability 0, space 0, times 0 [ 141.857296][T10899] CPU: 0 PID: 10899 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 141.861335][T10897] loop5: p1 p2 p3 p4 [ 141.867867][T10899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.867883][T10899] Call Trace: [ 141.867890][T10899] dump_stack+0x137/0x19d [ 141.867922][T10899] should_fail+0x23c/0x250 [ 141.872212][T10897] loop5: p1 start 10 is beyond EOD, [ 141.882209][T10899] ? __list_lru_init+0x70/0x680 [ 141.882236][T10899] __should_failslab+0x81/0x90 [ 141.882258][T10899] should_failslab+0x5/0x20 [ 141.882272][T10899] __kmalloc+0x66/0x340 [ 141.885559][T10897] truncated [ 141.889856][T10899] ? prealloc_memcg_shrinker+0x444/0x460 [ 141.894388][T10897] loop5: p2 size 1073872896 extends beyond EOD, [ 141.899638][T10899] __list_lru_init+0x70/0x680 [ 141.904502][T10897] truncated [ 141.909218][T10899] alloc_super+0x490/0x520 [ 141.918488][T10897] loop5: p3 start 2127165541 is beyond EOD, [ 141.920925][T10899] ? mount_bdev+0x290/0x290 [ 141.920949][T10899] sget+0x1a5/0x400 [ 141.926634][T10897] truncated [ 141.932879][T10899] ? test_bdev_super+0x30/0x30 [ 141.937803][T10897] loop5: p4 size 3657465856 extends beyond EOD, [ 141.940969][T10899] mount_bdev+0xd3/0x290 [ 141.945378][T10897] truncated [ 141.951734][T10899] ? ext4_mount+0x40/0x40 [ 141.987952][T10899] ? ext4_errno_to_code+0x110/0x110 [ 141.993725][T10899] ext4_mount+0x2d/0x40 [ 141.998644][T10899] legacy_get_tree+0x70/0xc0 [ 142.003764][T10899] vfs_get_tree+0x4a/0x1a0 [ 142.008522][T10899] path_mount+0x11d4/0x1ce0 [ 142.013681][T10899] __se_sys_mount+0x23d/0x2e0 [ 142.019023][T10899] ? mntput+0x45/0x70 [ 142.023556][T10899] ? __fpregs_load_activate+0x103/0x1b0 [ 142.029655][T10899] __x64_sys_mount+0x63/0x70 [ 142.034898][T10899] do_syscall_64+0x4a/0x90 [ 142.040151][T10899] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.046638][T10899] RIP: 0033:0x467afa [ 142.050552][T10899] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 142.071873][T10899] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 142.081069][T10899] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa [ 142.089277][T10899] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 02:23:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0x5, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0xa68, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:22 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f612500020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:22 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010060400ff7e", 0x24}], 0x1}, 0x0) 02:23:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1800}}], 0x1, 0x0) 02:23:22 executing program 4 (fault-call:3 fault-nth:54): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 142.097496][T10899] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 [ 142.106141][T10899] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 142.114979][T10899] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 142.178412][T10930] loop2: detected capacity change from 0 to 1 02:23:22 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010070400ff7e", 0x24}], 0x1}, 0x0) [ 142.223847][T10930] loop2: p1 p2 p3 p4 [ 142.229495][T10930] loop2: p1 start 10 is beyond EOD, truncated [ 142.235817][T10930] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 142.246797][T10930] loop2: p3 start 2127165541 is beyond EOD, truncated [ 142.247894][T10942] loop5: detected capacity change from 0 to 5 [ 142.256924][T10930] loop2: p4 size 3657465856 extends beyond EOD, truncated 02:23:22 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610502020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1c00}}], 0x1, 0x0) [ 142.276809][T10943] loop4: detected capacity change from 0 to 1051 [ 142.300657][T10943] FAULT_INJECTION: forcing a failure. [ 142.300657][T10943] name failslab, interval 1, probability 0, space 0, times 0 [ 142.315103][T10943] CPU: 1 PID: 10943 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 02:23:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00}}], 0x1, 0x0) [ 142.326032][T10943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.336714][T10943] Call Trace: [ 142.340236][T10943] dump_stack+0x137/0x19d [ 142.344763][T10943] should_fail+0x23c/0x250 [ 142.349404][T10943] __should_failslab+0x81/0x90 [ 142.354716][T10943] should_failslab+0x5/0x20 [ 142.359851][T10943] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 142.365784][T10943] ? __list_lru_init+0x70/0x680 [ 142.370820][T10943] ? __kmalloc_node+0x30/0x40 02:23:22 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610503020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:22 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010090400ff7e", 0x24}], 0x1}, 0x0) [ 142.376069][T10943] __kmalloc_node+0x30/0x40 [ 142.380770][T10943] kvmalloc_node+0x81/0xf0 [ 142.382670][T10942] loop5: p1 p2 p3 p4 [ 142.385834][T10943] __list_lru_init+0x2d7/0x680 [ 142.385861][T10943] alloc_super+0x490/0x520 [ 142.397860][T10942] loop5: p1 start 10 is beyond EOD, [ 142.399751][T10943] ? mount_bdev+0x290/0x290 [ 142.399766][T10942] truncated [ 142.399775][T10943] sget+0x1a5/0x400 [ 142.405264][T10942] loop5: p2 size 1073872896 extends beyond EOD, [ 142.409730][T10943] ? test_bdev_super+0x30/0x30 [ 142.412844][T10942] truncated [ 142.431320][T10943] mount_bdev+0xd3/0x290 [ 142.432410][T10942] loop5: p3 start 2127165541 is beyond EOD, [ 142.435914][T10943] ? ext4_mount+0x40/0x40 [ 142.435939][T10943] ? ext4_errno_to_code+0x110/0x110 [ 142.442178][T10942] truncated [ 142.442184][T10942] loop5: p4 size 3657465856 extends beyond EOD, [ 142.447276][T10943] ext4_mount+0x2d/0x40 [ 142.447298][T10943] legacy_get_tree+0x70/0xc0 [ 142.452676][T10942] truncated [ 142.474775][T10943] vfs_get_tree+0x4a/0x1a0 [ 142.479292][T10943] path_mount+0x11d4/0x1ce0 [ 142.483952][T10943] __se_sys_mount+0x23d/0x2e0 [ 142.488886][T10943] ? mntput+0x45/0x70 [ 142.493278][T10943] ? __fpregs_load_activate+0x103/0x1b0 [ 142.499233][T10943] __x64_sys_mount+0x63/0x70 [ 142.504174][T10943] do_syscall_64+0x4a/0x90 [ 142.508752][T10943] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.514993][T10943] RIP: 0033:0x467afa [ 142.519238][T10943] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 142.540484][T10943] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 142.549630][T10943] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa [ 142.557682][T10943] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 [ 142.565866][T10943] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 [ 142.573927][T10943] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 142.582504][T10943] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 02:23:22 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:22 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010b10400ff7e", 0x24}], 0x1}, 0x0) 02:23:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0xa69, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:22 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610504020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3000}}], 0x1, 0x0) [ 142.696480][T10997] FAULT_INJECTION: forcing a failure. [ 142.696480][T10997] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 142.710369][T10997] CPU: 1 PID: 10997 Comm: syz-executor.2 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 142.721822][T10997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.732769][T10997] Call Trace: [ 142.736191][T10997] dump_stack+0x137/0x19d [ 142.740626][T10997] should_fail+0x23c/0x250 [ 142.745299][T10997] should_fail_usercopy+0x16/0x20 [ 142.750613][T10997] _copy_from_user+0x1c/0xd0 [ 142.755446][T10997] __copy_msghdr_from_user+0x44/0x350 [ 142.761722][T10997] ? __fget_light+0x21b/0x260 [ 142.766526][T10997] __sys_sendmsg+0x135/0x270 [ 142.771220][T10997] ? kstrtouint_from_user+0x104/0x130 [ 142.777303][T10997] ? do_anonymous_page+0x411/0x8b0 [ 142.782811][T10997] ? fsnotify_perm+0x59/0x2e0 [ 142.787629][T10997] ? __fsnotify_parent+0x32f/0x430 [ 142.793121][T10997] ? vfs_write+0x50c/0x770 [ 142.797724][T10997] ? __fget_light+0x21b/0x260 [ 142.802853][T10997] ? __cond_resched+0x11/0x40 [ 142.807878][T10997] ? fput+0x2d/0x130 [ 142.811776][T10997] ? ksys_write+0x157/0x180 [ 142.816458][T10997] __x64_sys_sendmsg+0x42/0x50 [ 142.821724][T10997] do_syscall_64+0x4a/0x90 [ 142.827456][T10997] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.834079][T10997] RIP: 0033:0x4665d9 [ 142.838347][T10997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 142.858757][T10997] RSP: 002b:00007f24cc40e188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 142.867502][T10997] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 142.875760][T10997] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 142.884609][T10997] RBP: 00007f24cc40e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 142.893209][T10997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.902693][T10997] R13: 00007ffd01b9e0ef R14: 00007f24cc40e300 R15: 0000000000022000 [ 142.908051][T10996] loop5: detected capacity change from 0 to 5 [ 142.935287][T10996] loop5: p1 p2 p3 p4 [ 142.939650][T10996] loop5: p1 start 10 is beyond EOD, truncated 02:23:23 executing program 4 (fault-call:3 fault-nth:55): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:23 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010002000ff7e", 0x24}], 0x1}, 0x0) 02:23:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xe402}}], 0x1, 0x0) 02:23:23 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610505020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:23 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:23 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000400fe7e", 0x24}], 0x1}, 0x0) [ 142.945979][T10996] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 142.956399][T10996] loop5: p3 start 2127165541 is beyond EOD, truncated [ 142.963525][T10996] loop5: p4 size 3657465856 extends beyond EOD, truncated 02:23:23 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610506020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 143.020565][T11030] FAULT_INJECTION: forcing a failure. [ 143.020565][T11030] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 143.030734][T11033] loop4: detected capacity change from 0 to 1051 [ 143.035359][T11030] CPU: 1 PID: 11030 Comm: syz-executor.2 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 143.044809][T11033] FAULT_INJECTION: forcing a failure. [ 143.044809][T11033] name failslab, interval 1, probability 0, space 0, times 0 [ 143.052735][T11030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.077511][T11030] Call Trace: [ 143.080895][T11030] dump_stack+0x137/0x19d [ 143.085333][T11030] should_fail+0x23c/0x250 [ 143.089891][T11030] should_fail_usercopy+0x16/0x20 [ 143.095133][T11030] _copy_from_user+0x1c/0xd0 [ 143.100176][T11030] iovec_from_user+0xc4/0x2d0 [ 143.105016][T11030] ? should_fail+0xd6/0x250 [ 143.109558][T11030] __import_iovec+0x49/0x270 [ 143.114222][T11030] ? __copy_msghdr_from_user+0x232/0x350 [ 143.120118][T11030] import_iovec+0x69/0x80 [ 143.124445][T11030] __sys_sendmsg+0x1ab/0x270 [ 143.129143][T11030] ? do_anonymous_page+0x411/0x8b0 [ 143.134280][T11030] ? fsnotify_perm+0x59/0x2e0 [ 143.139269][T11030] ? __fsnotify_parent+0x32f/0x430 [ 143.144736][T11030] ? get_pid_task+0x8b/0xc0 [ 143.149313][T11030] ? vfs_write+0x50c/0x770 [ 143.153801][T11030] ? __fget_light+0x21b/0x260 [ 143.158546][T11030] ? __cond_resched+0x11/0x40 [ 143.163205][T11030] ? fput+0x2d/0x130 [ 143.167292][T11030] ? ksys_write+0x157/0x180 [ 143.171772][T11030] __x64_sys_sendmsg+0x42/0x50 [ 143.176701][T11030] do_syscall_64+0x4a/0x90 [ 143.181280][T11030] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.187257][T11030] RIP: 0033:0x4665d9 [ 143.191157][T11030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 143.211530][T11030] RSP: 002b:00007f24cc40e188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 143.220017][T11030] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 143.228095][T11030] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 143.236059][T11030] RBP: 00007f24cc40e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 143.244023][T11030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.252060][T11030] R13: 00007ffd01b9e0ef R14: 00007f24cc40e300 R15: 0000000000022000 [ 143.260348][T11033] CPU: 0 PID: 11033 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 143.270648][T11033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.281358][T11033] Call Trace: [ 143.284650][T11033] dump_stack+0x137/0x19d [ 143.289071][T11033] should_fail+0x23c/0x250 [ 143.293541][T11033] ? __list_lru_init+0x70/0x680 [ 143.298420][T11033] __should_failslab+0x81/0x90 [ 143.303189][T11033] should_failslab+0x5/0x20 [ 143.307737][T11033] __kmalloc+0x66/0x340 [ 143.312114][T11033] __list_lru_init+0x70/0x680 [ 143.316793][T11033] alloc_super+0x4bf/0x520 [ 143.321423][T11033] ? mount_bdev+0x290/0x290 [ 143.326344][T11033] sget+0x1a5/0x400 [ 143.330171][T11033] ? test_bdev_super+0x30/0x30 [ 143.335094][T11033] mount_bdev+0xd3/0x290 [ 143.339333][T11033] ? ext4_mount+0x40/0x40 [ 143.343699][T11033] ? ext4_errno_to_code+0x110/0x110 [ 143.349124][T11033] ext4_mount+0x2d/0x40 [ 143.353411][T11033] legacy_get_tree+0x70/0xc0 [ 143.358125][T11033] vfs_get_tree+0x4a/0x1a0 [ 143.361575][T11048] FAULT_INJECTION: forcing a failure. [ 143.361575][T11048] name failslab, interval 1, probability 0, space 0, times 0 [ 143.362735][T11033] path_mount+0x11d4/0x1ce0 [ 143.362754][T11033] __se_sys_mount+0x23d/0x2e0 [ 143.362769][T11033] ? mntput+0x45/0x70 [ 143.388586][T11033] ? __fpregs_load_activate+0x103/0x1b0 [ 143.394654][T11033] __x64_sys_mount+0x63/0x70 [ 143.399230][T11033] do_syscall_64+0x4a/0x90 [ 143.404153][T11033] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.410178][T11033] RIP: 0033:0x467afa [ 143.414076][T11033] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 143.434426][T11033] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 143.443110][T11033] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa [ 143.451261][T11033] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 [ 143.459263][T11033] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 02:23:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0xa6a, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:23 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000402ff7e", 0x24}], 0x1}, 0x0) 02:23:23 executing program 2 (fault-call:1 fault-nth:2): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xe803}}], 0x1, 0x0) 02:23:23 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610507020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 143.467214][T11033] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 143.475543][T11033] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 143.484113][T11048] CPU: 1 PID: 11048 Comm: syz-executor.2 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 143.495100][T11048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.505426][T11048] Call Trace: [ 143.508761][T11048] dump_stack+0x137/0x19d [ 143.513345][T11048] should_fail+0x23c/0x250 [ 143.517848][T11048] __should_failslab+0x81/0x90 [ 143.522691][T11048] should_failslab+0x5/0x20 [ 143.527253][T11048] kmem_cache_alloc_node+0x58/0x2b0 [ 143.532941][T11048] ? __alloc_skb+0xed/0x420 [ 143.537544][T11048] __alloc_skb+0xed/0x420 [ 143.542001][T11048] netlink_sendmsg+0x4c7/0x7c0 [ 143.546871][T11048] ? netlink_getsockopt+0x720/0x720 [ 143.552176][T11048] ____sys_sendmsg+0x360/0x4d0 [ 143.556961][T11048] ? import_iovec+0x69/0x80 [ 143.561666][T11048] __sys_sendmsg+0x1ed/0x270 [ 143.566371][T11048] ? __fsnotify_parent+0x32f/0x430 02:23:23 executing program 4 (fault-call:3 fault-nth:56): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) 02:23:23 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000403ff7e", 0x24}], 0x1}, 0x0) 02:23:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf401}}], 0x1, 0x0) 02:23:23 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610509020000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 143.571571][T11048] ? get_pid_task+0x8b/0xc0 [ 143.576356][T11048] ? vfs_write+0x50c/0x770 [ 143.580776][T11048] ? __fget_light+0x21b/0x260 [ 143.585528][T11048] ? __cond_resched+0x11/0x40 [ 143.590217][T11048] ? fput+0x2d/0x130 [ 143.594170][T11048] ? ksys_write+0x157/0x180 [ 143.598728][T11048] __x64_sys_sendmsg+0x42/0x50 [ 143.603524][T11048] do_syscall_64+0x4a/0x90 [ 143.607944][T11048] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.613870][T11048] RIP: 0033:0x4665d9 02:23:23 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000404ff7e", 0x24}], 0x1}, 0x0) [ 143.617810][T11048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 143.637590][T11048] RSP: 002b:00007f24cc40e188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 143.646001][T11048] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 143.654251][T11048] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 143.662221][T11048] RBP: 00007f24cc40e1d0 R08: 0000000000000000 R09: 0000000000000000 02:23:23 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500810000e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:23 executing program 2 (fault-call:1 fault-nth:3): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) [ 143.670544][T11048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.678627][T11048] R13: 00007ffd01b9e0ef R14: 00007f24cc40e300 R15: 0000000000022000 [ 143.698847][T11073] loop5: detected capacity change from 0 to 5 [ 143.735393][T11076] loop4: detected capacity change from 0 to 1051 [ 143.737583][T11073] loop5: p1 p2 p3 p4 [ 143.751986][T11073] loop5: p1 start 10 is beyond EOD, truncated [ 143.759838][T11073] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 143.760478][T11076] FAULT_INJECTION: forcing a failure. [ 143.760478][T11076] name failslab, interval 1, probability 0, space 0, times 0 [ 143.780434][T11088] FAULT_INJECTION: forcing a failure. [ 143.780434][T11088] name failslab, interval 1, probability 0, space 0, times 0 [ 143.781430][T11076] CPU: 1 PID: 11076 Comm: syz-executor.4 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 143.806987][T11076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.817650][T11076] Call Trace: [ 143.821220][T11076] dump_stack+0x137/0x19d [ 143.827804][T11076] should_fail+0x23c/0x250 [ 143.832633][T11076] ? __list_lru_init+0x70/0x680 [ 143.839108][T11076] __should_failslab+0x81/0x90 [ 143.845621][T11076] should_failslab+0x5/0x20 [ 143.850682][T11076] __kmalloc+0x66/0x340 [ 143.855506][T11076] __list_lru_init+0x70/0x680 [ 143.860346][T11076] alloc_super+0x4bf/0x520 [ 143.865183][T11076] ? mount_bdev+0x290/0x290 [ 143.869972][T11076] sget+0x1a5/0x400 [ 143.874005][T11076] ? test_bdev_super+0x30/0x30 [ 143.879324][T11076] mount_bdev+0xd3/0x290 [ 143.884049][T11076] ? ext4_mount+0x40/0x40 [ 143.889193][T11076] ? ext4_errno_to_code+0x110/0x110 [ 143.895090][T11076] ext4_mount+0x2d/0x40 [ 143.899550][T11076] legacy_get_tree+0x70/0xc0 [ 143.904359][T11076] vfs_get_tree+0x4a/0x1a0 [ 143.909880][T11076] path_mount+0x11d4/0x1ce0 [ 143.915838][T11076] __se_sys_mount+0x23d/0x2e0 [ 143.921313][T11076] ? mntput+0x45/0x70 [ 143.925559][T11076] ? __fpregs_load_activate+0x103/0x1b0 [ 143.931991][T11076] __x64_sys_mount+0x63/0x70 [ 143.936604][T11076] do_syscall_64+0x4a/0x90 [ 143.941196][T11076] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.947896][T11076] RIP: 0033:0x467afa [ 143.951801][T11076] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 143.975114][T11076] RSP: 002b:00007f71cabe1fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 143.984236][T11076] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 0000000000467afa [ 143.994610][T11076] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f71cabe2000 [ 144.006060][T11076] RBP: 00007f71cabe2040 R08: 00007f71cabe2040 R09: 0000000020000000 [ 144.019492][T11076] R10: 0000000000000081 R11: 0000000000000202 R12: 0000000020000000 [ 144.030577][T11076] R13: 0000000020000040 R14: 00007f71cabe2000 R15: 0000000020000080 [ 144.040715][T11088] CPU: 0 PID: 11088 Comm: syz-executor.2 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 144.053265][T11088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.066259][T11088] Call Trace: [ 144.069712][T11088] dump_stack+0x137/0x19d [ 144.075157][T11088] should_fail+0x23c/0x250 [ 144.080842][T11088] __should_failslab+0x81/0x90 [ 144.087491][T11088] should_failslab+0x5/0x20 [ 144.088616][T11073] loop5: p3 start 2127165541 is beyond EOD, truncated [ 144.093987][T11088] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 144.094087][T11088] ? __kmalloc_node_track_caller+0x30/0x40 [ 144.104407][T11073] loop5: p4 size 3657465856 extends beyond EOD, [ 144.112694][T11088] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 144.121533][T11073] truncated [ 144.130868][T11088] __kmalloc_node_track_caller+0x30/0x40 [ 144.130899][T11088] ? netlink_sendmsg+0x4c7/0x7c0 [ 144.153530][T11088] __alloc_skb+0x187/0x420 [ 144.158092][T11088] netlink_sendmsg+0x4c7/0x7c0 [ 144.162961][T11088] ? netlink_getsockopt+0x720/0x720 [ 144.168501][T11088] ____sys_sendmsg+0x360/0x4d0 [ 144.174067][T11088] ? import_iovec+0x69/0x80 [ 144.178886][T11088] __sys_sendmsg+0x1ed/0x270 [ 144.184099][T11088] ? __fsnotify_parent+0x32f/0x430 [ 144.189311][T11088] ? get_pid_task+0x8b/0xc0 [ 144.194531][T11088] ? vfs_write+0x50c/0x770 [ 144.199756][T11088] ? __fget_light+0x21b/0x260 [ 144.204921][T11088] ? __cond_resched+0x11/0x40 [ 144.209588][T11088] ? fput+0x2d/0x130 [ 144.213743][T11088] ? ksys_write+0x157/0x180 [ 144.218756][T11088] __x64_sys_sendmsg+0x42/0x50 [ 144.224510][T11088] do_syscall_64+0x4a/0x90 [ 144.229927][T11088] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.236287][T11088] RIP: 0033:0x4665d9 [ 144.240323][T11088] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.262344][T11088] RSP: 002b:00007f24cc40e188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 144.271229][T11088] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 144.279998][T11088] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 02:23:24 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0xa4) syz_read_part_table(0xa6b, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="020181ffffff0a000000ff45ac0480ffffff81800800000000000000024000ffffffecd3cac765f8c97e8877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 02:23:24 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000405ff7e", 0x24}], 0x1}, 0x0) 02:23:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}}], 0x1, 0x0) 02:23:24 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020200e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:24 executing program 2 (fault-call:1 fault-nth:4): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:24 executing program 4 (fault-call:3 fault-nth:57): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x1, &(0x7f0000000540)=[{&(0x7f0000000480)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000dcb300000000000000000b0000000003000008008000004200001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)=ANY=[]) [ 144.288277][T11088] RBP: 00007f24cc40e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 144.296714][T11088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.305642][T11088] R13: 00007ffd01b9e0ef R14: 00007f24cc40e300 R15: 0000000000022000 02:23:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) 02:23:24 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000190007041dfffd946f610500020300e8fe02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:24 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080010000406ff7e", 0x24}], 0x1}, 0x0) [ 144.387181][T11115] loop5: detected capacity change from 0 to 5 [ 144.393171][T11113] FAULT_INJECTION: forcing a failure. [ 144.393171][T11113] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 144.410343][T11113] CPU: 0 PID: 11113 Comm: syz-executor.2 Tainted: G W 5.13.0-rc4-syzkaller #0 [ 144.422176][T11113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.433387][T11113] Call Trace: 02:23:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}}], 0x1, 0x0) [ 144.437279][T11113] dump_stack+0x137/0x19d [ 144.441721][T11113] should_fail+0x23c/0x250 [ 144.447059][T11113] should_fail_usercopy+0x16/0x20 [ 144.452549][T11113] _copy_from_iter_full+0x148/0xa10 [ 144.458572][T11113] ? check_stack_object+0x61/0x70 [ 144.464814][T11113] ? __virt_addr_valid+0x15a/0x1a0 [ 144.470797][T11113] ? __check_object_size+0x253/0x310 [ 144.476539][T11113] netlink_sendmsg+0x579/0x7c0 [ 144.481638][T11113] ? netlink_getsockopt+0x720/0x720 [ 144.487759][T11113] ____sys_sendmsg+0x360/0x4d0 [ 144.492767][T11113] ? import_iovec+0x69/0x80 [ 144.497888][T11113] __sys_sendmsg+0x1ed/0x270 [ 144.503630][T11113] ? __fsnotify_parent+0x32f/0x430 [ 144.513529][T11113] ? get_pid_task+0x8b/0xc0 [ 144.518806][T11113] ? vfs_write+0x50c/0x770 [ 144.523301][T11113] ? __fget_light+0x21b/0x260 [ 144.528183][T11113] ? __cond_resched+0x11/0x40 [ 144.533557][T11113] ? fput+0x2d/0x130 [ 144.537557][T11113] ? ksys_write+0x157/0x180 [ 144.542303][T11113] __x64_sys_sendmsg+0x42/0x50 [ 144.547128][T11113] do_syscall_64+0x4a/0x90 [ 144.551979][T11113] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.558103][T11113] RIP: 0033:0x4665d9 [ 144.562423][T11113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.583925][T11113] RSP: 002b:00007f24cc40e188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 144.592700][T11113] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 144.600751][T11113] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 144.609389][T11113] RBP: 00007f24cc40e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 144.620429][T11113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.631233][T11113] R13: 00007ffd01b9e0ef R14: 00007f24cc40e300 R15: 0000000000022000 02:23:24 executing program 2 (fault-call:1 fault-nth:5): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fd02080100010800080010000400ff7e", 0x24}], 0x1}, 0x0) 02:23:24 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)