T19175] ext4_bread+0x3c/0x1b0 [ 536.134332][T19175] ext4_append+0x238/0x474 [ 536.134337][T19175] ext4_init_new_dir+0x100/0x1a8 [ 536.134343][T19175] ext4_mkdir+0x3bc/0xa28 [ 536.134348][T19175] vfs_mkdir+0x284/0x424 [ 536.134356][T19175] do_mkdirat+0x1f8/0x4c8 [ 536.134370][T19175] __arm64_sys_mkdirat+0x8c/0xa4 [ 536.134379][T19175] invoke_syscall+0x98/0x2b8 [ 536.134385][T19175] el0_svc_common+0x130/0x23c [ 536.134390][T19175] do_el0_svc+0x48/0x58 [ 536.134395][T19175] el0_svc+0x58/0x180 [ 536.134402][T19175] el0t_64_sync_handler+0x84/0x12c [ 536.134408][T19175] el0t_64_sync+0x198/0x19c [ 536.223302][T19177] loop0: detected capacity change from 0 to 32768 [ 536.226310][T19177] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19177) [ 536.226844][T19177] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 536.228056][T19177] FAULT_INJECTION: forcing a failure. [ 536.228056][T19177] name failslab, interval 1, probability 0, space 0, times 0 [ 536.228070][T19177] CPU: 0 UID: 0 PID: 19177 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 536.228078][T19177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 536.228083][T19177] Call trace: [ 536.228086][T19177] show_stack+0x2c/0x3c (C) [ 536.228098][T19177] __dump_stack+0x30/0x40 [ 536.228104][T19177] dump_stack_lvl+0xd8/0x12c [ 536.228110][T19177] dump_stack+0x1c/0x28 [ 536.228115][T19177] should_fail_ex+0x41c/0x594 [ 536.228123][T19177] should_failslab+0xc0/0x128 [ 536.228130][T19177] kmem_cache_alloc_noprof+0x80/0x3e8 [ 536.228138][T19177] jbd2_journal_add_journal_head+0x98/0x5e0 [ 536.228145][T19177] jbd2_journal_get_create_access+0x58/0x3ac [ 536.228152][T19177] __ext4_journal_get_create_access+0xf8/0x37c [ 536.228159][T19177] ext4_getblk+0x3d8/0x6c4 [ 536.228165][T19177] ext4_bread+0x3c/0x1b0 [ 536.228170][T19177] ext4_append+0x238/0x474 [ 536.228176][T19177] ext4_init_new_dir+0x100/0x1a8 [ 536.228181][T19177] ext4_mkdir+0x3bc/0xa28 [ 536.228186][T19177] vfs_mkdir+0x284/0x424 [ 536.228194][T19177] do_mkdirat+0x1f8/0x4c8 [ 536.228201][T19177] __arm64_sys_mkdirat+0x8c/0xa4 [ 536.228208][T19177] invoke_syscall+0x98/0x2b8 [ 536.228214][T19177] el0_svc_common+0x130/0x23c [ 536.228219][T19177] do_el0_svc+0x48/0x58 [ 536.228224][T19177] el0_svc+0x58/0x180 [ 536.228231][T19177] el0t_64_sync_handler+0x84/0x12c [ 536.228237][T19177] el0t_64_sync+0x198/0x19c [ 536.327749][T19179] loop0: detected capacity change from 0 to 32768 [ 536.329108][T19179] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19179) [ 536.329875][T19179] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 536.330405][T19179] FAULT_INJECTION: forcing a failure. [ 536.330405][T19179] name failslab, interval 1, probability 0, space 0, times 0 [ 536.330420][T19179] CPU: 0 UID: 0 PID: 19179 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 536.330428][T19179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 536.330433][T19179] Call trace: [ 536.330436][T19179] show_stack+0x2c/0x3c (C) [ 536.330448][T19179] __dump_stack+0x30/0x40 [ 536.330455][T19179] dump_stack_lvl+0xd8/0x12c [ 536.330461][T19179] dump_stack+0x1c/0x28 [ 536.330466][T19179] should_fail_ex+0x41c/0x594 [ 536.330473][T19179] should_failslab+0xc0/0x128 [ 536.330481][T19179] kmem_cache_alloc_noprof+0x80/0x3e8 [ 536.330488][T19179] jbd2_journal_add_journal_head+0x98/0x5e0 [ 536.330496][T19179] jbd2_journal_get_create_access+0x58/0x3ac [ 536.330503][T19179] __ext4_journal_get_create_access+0xf8/0x37c [ 536.330510][T19179] ext4_getblk+0x3d8/0x6c4 [ 536.330515][T19179] ext4_bread+0x3c/0x1b0 [ 536.330521][T19179] ext4_append+0x238/0x474 [ 536.330526][T19179] ext4_init_new_dir+0x100/0x1a8 [ 536.330532][T19179] ext4_mkdir+0x3bc/0xa28 [ 536.330537][T19179] vfs_mkdir+0x284/0x424 [ 536.330544][T19179] do_mkdirat+0x1f8/0x4c8 [ 536.330551][T19179] __arm64_sys_mkdirat+0x8c/0xa4 [ 536.330558][T19179] invoke_syscall+0x98/0x2b8 [ 536.330564][T19179] el0_svc_common+0x130/0x23c [ 536.330569][T19179] do_el0_svc+0x48/0x58 [ 536.330574][T19179] el0_svc+0x58/0x180 [ 536.330581][T19179] el0t_64_sync_handler+0x84/0x12c [ 536.330587][T19179] el0t_64_sync+0x198/0x19c [ 536.420862][T19181] loop0: detected capacity change from 0 to 32768 [ 536.422818][T19181] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19181) [ 536.424969][T19181] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 536.426847][T19181] FAULT_INJECTION: forcing a failure. [ 536.426847][T19181] name failslab, interval 1, probability 0, space 0, times 0 [ 536.428937][T19181] CPU: 1 UID: 0 PID: 19181 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 536.428957][T19181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 536.428963][T19181] Call trace: [ 536.428967][T19181] show_stack+0x2c/0x3c (C) [ 536.428983][T19181] __dump_stack+0x30/0x40 [ 536.428993][T19181] dump_stack_lvl+0xd8/0x12c [ 536.429000][T19181] dump_stack+0x1c/0x28 [ 536.429006][T19181] should_fail_ex+0x41c/0x594 [ 536.429014][T19181] should_failslab+0xc0/0x128 [ 536.429021][T19181] kmem_cache_alloc_noprof+0x80/0x3e8 [ 536.429028][T19181] jbd2_journal_add_journal_head+0x98/0x5e0 [ 536.429035][T19181] jbd2_journal_get_create_access+0x58/0x3ac [ 536.429042][T19181] __ext4_journal_get_create_access+0xf8/0x37c [ 536.429049][T19181] ext4_getblk+0x3d8/0x6c4 [ 536.429054][T19181] ext4_bread+0x3c/0x1b0 [ 536.429059][T19181] ext4_append+0x238/0x474 [ 536.429064][T19181] ext4_init_new_dir+0x100/0x1a8 [ 536.429069][T19181] ext4_mkdir+0x3bc/0xa28 [ 536.429075][T19181] vfs_mkdir+0x284/0x424 [ 536.429082][T19181] do_mkdirat+0x1f8/0x4c8 [ 536.429088][T19181] __arm64_sys_mkdirat+0x8c/0xa4 [ 536.429095][T19181] invoke_syscall+0x98/0x2b8 [ 536.429101][T19181] el0_svc_common+0x130/0x23c [ 536.429106][T19181] do_el0_svc+0x48/0x58 [ 536.429111][T19181] el0_svc+0x58/0x180 [ 536.429120][T19181] el0t_64_sync_handler+0x84/0x12c [ 536.429126][T19181] el0t_64_sync+0x198/0x19c [ 536.516275][T19184] loop0: detected capacity change from 0 to 32768 [ 536.518372][T19184] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19184) [ 536.518517][T19184] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 536.519032][T19184] FAULT_INJECTION: forcing a failure. [ 536.519032][T19184] name failslab, interval 1, probability 0, space 0, times 0 [ 536.519046][T19184] CPU: 0 UID: 0 PID: 19184 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 536.519054][T19184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 536.519059][T19184] Call trace: [ 536.519062][T19184] show_stack+0x2c/0x3c (C) [ 536.519074][T19184] __dump_stack+0x30/0x40 [ 536.519081][T19184] dump_stack_lvl+0xd8/0x12c [ 536.519087][T19184] dump_stack+0x1c/0x28 [ 536.519092][T19184] should_fail_ex+0x41c/0x594 [ 536.519100][T19184] should_failslab+0xc0/0x128 [ 536.519107][T19184] kmem_cache_alloc_noprof+0x80/0x3e8 [ 536.519115][T19184] jbd2_journal_add_journal_head+0x98/0x5e0 [ 536.519125][T19184] jbd2_journal_get_create_access+0x58/0x3ac [ 536.519132][T19184] __ext4_journal_get_create_access+0xf8/0x37c [ 536.519139][T19184] ext4_getblk+0x3d8/0x6c4 [ 536.519145][T19184] ext4_bread+0x3c/0x1b0 [ 536.519150][T19184] ext4_append+0x238/0x474 [ 536.519156][T19184] ext4_init_new_dir+0x100/0x1a8 [ 536.519161][T19184] ext4_mkdir+0x3bc/0xa28 [ 536.519167][T19184] vfs_mkdir+0x284/0x424 [ 536.519174][T19184] do_mkdirat+0x1f8/0x4c8 [ 536.519181][T19184] __arm64_sys_mkdirat+0x8c/0xa4 [ 536.519188][T19184] invoke_syscall+0x98/0x2b8 [ 536.519194][T19184] el0_svc_common+0x130/0x23c [ 536.519199][T19184] do_el0_svc+0x48/0x58 [ 536.519204][T19184] el0_svc+0x58/0x180 [ 536.519212][T19184] el0t_64_sync_handler+0x84/0x12c [ 536.519217][T19184] el0t_64_sync+0x198/0x19c [ 536.602590][T19185] loop0: detected capacity change from 0 to 32768 [ 536.605242][T19185] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 536.606497][T19185] FAULT_INJECTION: forcing a failure. [ 536.606497][T19185] name failslab, interval 1, probability 0, space 0, times 0 [ 536.606511][T19185] CPU: 0 UID: 0 PID: 19185 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 536.606519][T19185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 536.606524][T19185] Call trace: [ 536.606527][T19185] show_stack+0x2c/0x3c (C) [ 536.606539][T19185] __dump_stack+0x30/0x40 [ 536.606546][T19185] dump_stack_lvl+0xd8/0x12c [ 536.606552][T19185] dump_stack+0x1c/0x28 [ 536.606557][T19185] should_fail_ex+0x41c/0x594 [ 536.606565][T19185] should_failslab+0xc0/0x128 [ 536.606572][T19185] kmem_cache_alloc_noprof+0x80/0x3e8 [ 536.606580][T19185] jbd2_journal_add_journal_head+0x98/0x5e0 [ 536.606587][T19185] jbd2_journal_get_create_access+0x58/0x3ac [ 536.606595][T19185] __ext4_journal_get_create_access+0xf8/0x37c [ 536.606602][T19185] ext4_getblk+0x3d8/0x6c4 [ 536.606608][T19185] ext4_bread+0x3c/0x1b0 [ 536.606613][T19185] ext4_append+0x238/0x474 [ 536.606619][T19185] ext4_init_new_dir+0x100/0x1a8 [ 536.606624][T19185] ext4_mkdir+0x3bc/0xa28 [ 536.606630][T19185] vfs_mkdir+0x284/0x424 [ 536.606637][T19185] do_mkdirat+0x1f8/0x4c8 [ 536.606644][T19185] __arm64_sys_mkdirat+0x8c/0xa4 [ 536.606651][T19185] invoke_syscall+0x98/0x2b8 [ 536.606657][T19185] el0_svc_common+0x130/0x23c [ 536.606662][T19185] do_el0_svc+0x48/0x58 [ 536.606668][T19185] el0_svc+0x58/0x180 [ 536.606675][T19185] el0t_64_sync_handler+0x84/0x12c [ 536.606681][T19185] el0t_64_sync+0x198/0x19c [ 536.694382][T19187] loop0: detected capacity change from 0 to 32768 [ 536.696274][T19187] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19187) [ 536.698562][T19187] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 536.700712][T19187] FAULT_INJECTION: forcing a failure. [ 536.700712][T19187] name failslab, interval 1, probability 0, space 0, times 0 [ 536.702845][T19187] CPU: 1 UID: 0 PID: 19187 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 536.702867][T19187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 536.702874][T19187] Call trace: [ 536.702878][T19187] show_stack+0x2c/0x3c (C) [ 536.702894][T19187] __dump_stack+0x30/0x40 [ 536.702905][T19187] dump_stack_lvl+0xd8/0x12c [ 536.702912][T19187] dump_stack+0x1c/0x28 [ 536.702918][T19187] should_fail_ex+0x41c/0x594 [ 536.702926][T19187] should_failslab+0xc0/0x128 [ 536.702934][T19187] kmem_cache_alloc_noprof+0x80/0x3e8 [ 536.702941][T19187] jbd2_journal_add_journal_head+0x98/0x5e0 [ 536.702949][T19187] jbd2_journal_get_create_access+0x58/0x3ac [ 536.702955][T19187] __ext4_journal_get_create_access+0xf8/0x37c [ 536.702962][T19187] ext4_getblk+0x3d8/0x6c4 [ 536.702968][T19187] ext4_bread+0x3c/0x1b0 [ 536.702973][T19187] ext4_append+0x238/0x474 [ 536.702978][T19187] ext4_init_new_dir+0x100/0x1a8 [ 536.702984][T19187] ext4_mkdir+0x3bc/0xa28 [ 536.702989][T19187] vfs_mkdir+0x284/0x424 [ 536.702996][T19187] do_mkdirat+0x1f8/0x4c8 [ 536.703003][T19187] __arm64_sys_mkdirat+0x8c/0xa4 [ 536.703010][T19187] invoke_syscall+0x98/0x2b8 [ 536.703015][T19187] el0_svc_common+0x130/0x23c [ 536.703021][T19187] do_el0_svc+0x48/0x58 [ 536.703025][T19187] el0_svc+0x58/0x180 [ 536.703032][T19187] el0t_64_sync_handler+0x84/0x12c [ 536.703038][T19187] el0t_64_sync+0x198/0x19c [ 536.790625][T19189] loop0: detected capacity change from 0 to 32768 [ 536.794031][T19189] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19189) [ 536.794154][T19189] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 536.794629][T19189] FAULT_INJECTION: forcing a failure. [ 536.794629][T19189] name failslab, interval 1, probability 0, space 0, times 0 [ 536.794642][T19189] CPU: 0 UID: 0 PID: 19189 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 536.794649][T19189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 536.794654][T19189] Call trace: [ 536.794657][T19189] show_stack+0x2c/0x3c (C) [ 536.794669][T19189] __dump_stack+0x30/0x40 [ 536.794676][T19189] dump_stack_lvl+0xd8/0x12c [ 536.794681][T19189] dump_stack+0x1c/0x28 [ 536.794686][T19189] should_fail_ex+0x41c/0x594 [ 536.794694][T19189] should_failslab+0xc0/0x128 [ 536.794701][T19189] kmem_cache_alloc_noprof+0x80/0x3e8 [ 536.794708][T19189] jbd2_journal_add_journal_head+0x98/0x5e0 [ 536.794716][T19189] jbd2_journal_get_create_access+0x58/0x3ac [ 536.794723][T19189] __ext4_journal_get_create_access+0xf8/0x37c [ 536.794730][T19189] ext4_getblk+0x3d8/0x6c4 [ 536.794735][T19189] ext4_bread+0x3c/0x1b0 [ 536.794740][T19189] ext4_append+0x238/0x474 [ 536.794746][T19189] ext4_init_new_dir+0x100/0x1a8 [ 536.794751][T19189] ext4_mkdir+0x3bc/0xa28 [ 536.794757][T19189] vfs_mkdir+0x284/0x424 [ 536.794764][T19189] do_mkdirat+0x1f8/0x4c8 [ 536.794771][T19189] __arm64_sys_mkdirat+0x8c/0xa4 [ 536.794778][T19189] invoke_syscall+0x98/0x2b8 [ 536.794784][T19189] el0_svc_common+0x130/0x23c [ 536.794789][T19189] do_el0_svc+0x48/0x58 [ 536.794794][T19189] el0_svc+0x58/0x180 [ 536.794801][T19189] el0t_64_sync_handler+0x84/0x12c [ 536.794806][T19189] el0t_64_sync+0x198/0x19c [ 536.883862][T19190] loop0: detected capacity change from 0 to 32768 [ 536.885835][T19190] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19190) [ 536.885980][T19190] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 536.886475][T19190] FAULT_INJECTION: forcing a failure. [ 536.886475][T19190] name failslab, interval 1, probability 0, space 0, times 0 [ 536.886488][T19190] CPU: 0 UID: 0 PID: 19190 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 536.886496][T19190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 536.886500][T19190] Call trace: [ 536.886503][T19190] show_stack+0x2c/0x3c (C) [ 536.886516][T19190] __dump_stack+0x30/0x40 [ 536.886523][T19190] dump_stack_lvl+0xd8/0x12c [ 536.886529][T19190] dump_stack+0x1c/0x28 [ 536.886534][T19190] should_fail_ex+0x41c/0x594 [ 536.886542][T19190] should_failslab+0xc0/0x128 [ 536.886549][T19190] kmem_cache_alloc_noprof+0x80/0x3e8 [ 536.886557][T19190] jbd2_journal_add_journal_head+0x98/0x5e0 [ 536.886564][T19190] jbd2_journal_get_create_access+0x58/0x3ac [ 536.886572][T19190] __ext4_journal_get_create_access+0xf8/0x37c [ 536.886579][T19190] ext4_getblk+0x3d8/0x6c4 [ 536.886584][T19190] ext4_bread+0x3c/0x1b0 [ 536.886590][T19190] ext4_append+0x238/0x474 [ 536.886595][T19190] ext4_init_new_dir+0x100/0x1a8 [ 536.886601][T19190] ext4_mkdir+0x3bc/0xa28 [ 536.886607][T19190] vfs_mkdir+0x284/0x424 [ 536.886614][T19190] do_mkdirat+0x1f8/0x4c8 [ 536.886621][T19190] __arm64_sys_mkdirat+0x8c/0xa4 [ 536.886628][T19190] invoke_syscall+0x98/0x2b8 [ 536.886634][T19190] el0_svc_common+0x130/0x23c [ 536.886639][T19190] do_el0_svc+0x48/0x58 [ 536.886644][T19190] el0_svc+0x58/0x180 [ 536.886651][T19190] el0t_64_sync_handler+0x84/0x12c [ 536.886657][T19190] el0t_64_sync+0x198/0x19c [ 536.976972][T19192] loop0: detected capacity change from 0 to 32768 [ 536.978770][T19192] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19192) [ 536.978884][T19192] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 536.982870][T19192] FAULT_INJECTION: forcing a failure. [ 536.982870][T19192] name failslab, interval 1, probability 0, space 0, times 0 [ 536.982903][T19192] CPU: 0 UID: 0 PID: 19192 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 536.982915][T19192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 536.982922][T19192] Call trace: [ 536.982926][T19192] show_stack+0x2c/0x3c (C) [ 536.982939][T19192] __dump_stack+0x30/0x40 [ 536.982946][T19192] dump_stack_lvl+0xd8/0x12c [ 536.982952][T19192] dump_stack+0x1c/0x28 [ 536.982957][T19192] should_fail_ex+0x41c/0x594 [ 536.982965][T19192] should_failslab+0xc0/0x128 [ 536.982972][T19192] kmem_cache_alloc_noprof+0x80/0x3e8 [ 536.982979][T19192] jbd2_journal_add_journal_head+0x98/0x5e0 [ 536.982986][T19192] jbd2_journal_get_create_access+0x58/0x3ac [ 536.982993][T19192] __ext4_journal_get_create_access+0xf8/0x37c [ 536.983000][T19192] ext4_getblk+0x3d8/0x6c4 [ 536.983006][T19192] ext4_bread+0x3c/0x1b0 [ 536.983011][T19192] ext4_append+0x238/0x474 [ 536.983017][T19192] ext4_init_new_dir+0x100/0x1a8 [ 536.983022][T19192] ext4_mkdir+0x3bc/0xa28 [ 536.983027][T19192] vfs_mkdir+0x284/0x424 [ 536.983035][T19192] do_mkdirat+0x1f8/0x4c8 [ 536.983041][T19192] __arm64_sys_mkdirat+0x8c/0xa4 [ 536.983049][T19192] invoke_syscall+0x98/0x2b8 [ 536.983054][T19192] el0_svc_common+0x130/0x23c [ 536.983059][T19192] do_el0_svc+0x48/0x58 [ 536.983065][T19192] el0_svc+0x58/0x180 [ 536.983071][T19192] el0t_64_sync_handler+0x84/0x12c [ 536.983077][T19192] el0t_64_sync+0x198/0x19c [ 537.069051][T19194] loop0: detected capacity change from 0 to 32768 [ 537.071050][T19194] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19194) [ 537.071181][T19194] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 537.095294][T19194] FAULT_INJECTION: forcing a failure. [ 537.095294][T19194] name failslab, interval 1, probability 0, space 0, times 0 [ 537.095326][T19194] CPU: 0 UID: 0 PID: 19194 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 537.095337][T19194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 537.095343][T19194] Call trace: [ 537.095347][T19194] show_stack+0x2c/0x3c (C) [ 537.095366][T19194] __dump_stack+0x30/0x40 [ 537.095376][T19194] dump_stack_lvl+0xd8/0x12c [ 537.095386][T19194] dump_stack+0x1c/0x28 [ 537.095393][T19194] should_fail_ex+0x41c/0x594 [ 537.095402][T19194] should_failslab+0xc0/0x128 [ 537.095410][T19194] kmem_cache_alloc_noprof+0x80/0x3e8 [ 537.095418][T19194] jbd2_journal_add_journal_head+0x98/0x5e0 [ 537.095425][T19194] jbd2_journal_get_create_access+0x58/0x3ac [ 537.095432][T19194] __ext4_journal_get_create_access+0xf8/0x37c [ 537.095439][T19194] ext4_getblk+0x3d8/0x6c4 [ 537.095445][T19194] ext4_bread+0x3c/0x1b0 [ 537.095450][T19194] ext4_append+0x238/0x474 [ 537.095456][T19194] ext4_init_new_dir+0x100/0x1a8 [ 537.095461][T19194] ext4_mkdir+0x3bc/0xa28 [ 537.095467][T19194] vfs_mkdir+0x284/0x424 [ 537.095474][T19194] do_mkdirat+0x1f8/0x4c8 [ 537.095481][T19194] __arm64_sys_mkdirat+0x8c/0xa4 [ 537.095488][T19194] invoke_syscall+0x98/0x2b8 [ 537.095494][T19194] el0_svc_common+0x130/0x23c [ 537.095500][T19194] do_el0_svc+0x48/0x58 [ 537.095505][T19194] el0_svc+0x58/0x180 [ 537.095512][T19194] el0t_64_sync_handler+0x84/0x12c [ 537.095518][T19194] el0t_64_sync+0x198/0x19c [ 537.182003][T19196] loop0: detected capacity change from 0 to 32768 [ 537.184616][T19196] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 537.186112][T19196] FAULT_INJECTION: forcing a failure. [ 537.186112][T19196] name failslab, interval 1, probability 0, space 0, times 0 [ 537.186268][T19196] CPU: 0 UID: 0 PID: 19196 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 537.186283][T19196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 537.186291][T19196] Call trace: [ 537.186296][T19196] show_stack+0x2c/0x3c (C) [ 537.186313][T19196] __dump_stack+0x30/0x40 [ 537.186321][T19196] dump_stack_lvl+0xd8/0x12c [ 537.186327][T19196] dump_stack+0x1c/0x28 [ 537.186332][T19196] should_fail_ex+0x41c/0x594 [ 537.186341][T19196] should_failslab+0xc0/0x128 [ 537.186348][T19196] kmem_cache_alloc_noprof+0x80/0x3e8 [ 537.186362][T19196] jbd2_journal_add_journal_head+0x98/0x5e0 [ 537.186370][T19196] jbd2_journal_get_create_access+0x58/0x3ac [ 537.186379][T19196] __ext4_journal_get_create_access+0xf8/0x37c [ 537.186386][T19196] ext4_getblk+0x3d8/0x6c4 [ 537.186392][T19196] ext4_bread+0x3c/0x1b0 [ 537.186397][T19196] ext4_append+0x238/0x474 [ 537.186403][T19196] ext4_init_new_dir+0x100/0x1a8 [ 537.186408][T19196] ext4_mkdir+0x3bc/0xa28 [ 537.186414][T19196] vfs_mkdir+0x284/0x424 [ 537.186421][T19196] do_mkdirat+0x1f8/0x4c8 [ 537.186428][T19196] __arm64_sys_mkdirat+0x8c/0xa4 [ 537.186435][T19196] invoke_syscall+0x98/0x2b8 [ 537.186441][T19196] el0_svc_common+0x130/0x23c [ 537.186446][T19196] do_el0_svc+0x48/0x58 [ 537.186451][T19196] el0_svc+0x58/0x180 [ 537.186459][T19196] el0t_64_sync_handler+0x84/0x12c [ 537.186464][T19196] el0t_64_sync+0x198/0x19c [ 537.283667][T19198] loop0: detected capacity change from 0 to 32768 [ 537.284493][T19198] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19198) [ 537.284577][T19198] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 537.304238][T19198] FAULT_INJECTION: forcing a failure. [ 537.304238][T19198] name failslab, interval 1, probability 0, space 0, times 0 [ 537.304266][T19198] CPU: 0 UID: 0 PID: 19198 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 537.304279][T19198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 537.304286][T19198] Call trace: [ 537.304290][T19198] show_stack+0x2c/0x3c (C) [ 537.304303][T19198] __dump_stack+0x30/0x40 [ 537.304311][T19198] dump_stack_lvl+0xd8/0x12c [ 537.304316][T19198] dump_stack+0x1c/0x28 [ 537.304321][T19198] should_fail_ex+0x41c/0x594 [ 537.304329][T19198] should_failslab+0xc0/0x128 [ 537.304336][T19198] kmem_cache_alloc_noprof+0x80/0x3e8 [ 537.304344][T19198] jbd2_journal_add_journal_head+0x98/0x5e0 [ 537.304351][T19198] jbd2_journal_get_create_access+0x58/0x3ac [ 537.304363][T19198] __ext4_journal_get_create_access+0xf8/0x37c [ 537.304371][T19198] ext4_getblk+0x3d8/0x6c4 [ 537.304377][T19198] ext4_bread+0x3c/0x1b0 [ 537.304383][T19198] ext4_append+0x238/0x474 [ 537.304390][T19198] ext4_init_new_dir+0x100/0x1a8 [ 537.304396][T19198] ext4_mkdir+0x3bc/0xa28 [ 537.304402][T19198] vfs_mkdir+0x284/0x424 [ 537.304412][T19198] do_mkdirat+0x1f8/0x4c8 [ 537.304420][T19198] __arm64_sys_mkdirat+0x8c/0xa4 [ 537.304428][T19198] invoke_syscall+0x98/0x2b8 [ 537.304434][T19198] el0_svc_common+0x130/0x23c [ 537.304439][T19198] do_el0_svc+0x48/0x58 [ 537.304444][T19198] el0_svc+0x58/0x180 [ 537.304451][T19198] el0t_64_sync_handler+0x84/0x12c [ 537.304457][T19198] el0t_64_sync+0x198/0x19c [ 537.388752][T19199] loop0: detected capacity change from 0 to 32768 [ 537.390428][T19199] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 537.391181][T19199] FAULT_INJECTION: forcing a failure. [ 537.391181][T19199] name failslab, interval 1, probability 0, space 0, times 0 [ 537.391194][T19199] CPU: 0 UID: 0 PID: 19199 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 537.391201][T19199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 537.391205][T19199] Call trace: [ 537.391208][T19199] show_stack+0x2c/0x3c (C) [ 537.391221][T19199] __dump_stack+0x30/0x40 [ 537.391228][T19199] dump_stack_lvl+0xd8/0x12c [ 537.391233][T19199] dump_stack+0x1c/0x28 [ 537.391238][T19199] should_fail_ex+0x41c/0x594 [ 537.391246][T19199] should_failslab+0xc0/0x128 [ 537.391253][T19199] kmem_cache_alloc_noprof+0x80/0x3e8 [ 537.391260][T19199] jbd2_journal_add_journal_head+0x98/0x5e0 [ 537.391268][T19199] jbd2_journal_get_create_access+0x58/0x3ac [ 537.391275][T19199] __ext4_journal_get_create_access+0xf8/0x37c [ 537.391282][T19199] ext4_getblk+0x3d8/0x6c4 [ 537.391288][T19199] ext4_bread+0x3c/0x1b0 [ 537.391293][T19199] ext4_append+0x238/0x474 [ 537.391299][T19199] ext4_init_new_dir+0x100/0x1a8 [ 537.391304][T19199] ext4_mkdir+0x3bc/0xa28 [ 537.391309][T19199] vfs_mkdir+0x284/0x424 [ 537.391317][T19199] do_mkdirat+0x1f8/0x4c8 [ 537.391324][T19199] __arm64_sys_mkdirat+0x8c/0xa4 [ 537.391331][T19199] invoke_syscall+0x98/0x2b8 [ 537.391336][T19199] el0_svc_common+0x130/0x23c [ 537.391342][T19199] do_el0_svc+0x48/0x58 [ 537.391347][T19199] el0_svc+0x58/0x180 [ 537.391353][T19199] el0t_64_sync_handler+0x84/0x12c [ 537.391367][T19199] el0t_64_sync+0x198/0x19c [ 537.467229][T19200] loop0: detected capacity change from 0 to 32768 [ 537.468274][T19200] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19200) [ 537.468352][T19200] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 537.493974][T19200] FAULT_INJECTION: forcing a failure. [ 537.493974][T19200] name failslab, interval 1, probability 0, space 0, times 0 [ 537.494007][T19200] CPU: 0 UID: 0 PID: 19200 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 537.494019][T19200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 537.494026][T19200] Call trace: [ 537.494030][T19200] show_stack+0x2c/0x3c (C) [ 537.494045][T19200] __dump_stack+0x30/0x40 [ 537.494052][T19200] dump_stack_lvl+0xd8/0x12c [ 537.494058][T19200] dump_stack+0x1c/0x28 [ 537.494063][T19200] should_fail_ex+0x41c/0x594 [ 537.494070][T19200] should_failslab+0xc0/0x128 [ 537.494078][T19200] kmem_cache_alloc_noprof+0x80/0x3e8 [ 537.494085][T19200] jbd2_journal_add_journal_head+0x98/0x5e0 [ 537.494092][T19200] jbd2_journal_get_create_access+0x58/0x3ac [ 537.494100][T19200] __ext4_journal_get_create_access+0xf8/0x37c [ 537.494107][T19200] ext4_getblk+0x3d8/0x6c4 [ 537.494113][T19200] ext4_bread+0x3c/0x1b0 [ 537.494118][T19200] ext4_append+0x238/0x474 [ 537.494124][T19200] ext4_init_new_dir+0x100/0x1a8 [ 537.494129][T19200] ext4_mkdir+0x3bc/0xa28 [ 537.494135][T19200] vfs_mkdir+0x284/0x424 [ 537.494142][T19200] do_mkdirat+0x1f8/0x4c8 [ 537.494149][T19200] __arm64_sys_mkdirat+0x8c/0xa4 [ 537.494156][T19200] invoke_syscall+0x98/0x2b8 [ 537.494162][T19200] el0_svc_common+0x130/0x23c [ 537.494167][T19200] do_el0_svc+0x48/0x58 [ 537.494172][T19200] el0_svc+0x58/0x180 [ 537.494180][T19200] el0t_64_sync_handler+0x84/0x12c [ 537.494185][T19200] el0t_64_sync+0x198/0x19c [ 537.582714][T19202] loop0: detected capacity change from 0 to 32768 [ 537.584148][T19202] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 537.586203][T19202] FAULT_INJECTION: forcing a failure. [ 537.586203][T19202] name failslab, interval 1, probability 0, space 0, times 0 [ 537.586217][T19202] CPU: 1 UID: 0 PID: 19202 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 537.586225][T19202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 537.586230][T19202] Call trace: [ 537.586232][T19202] show_stack+0x2c/0x3c (C) [ 537.586245][T19202] __dump_stack+0x30/0x40 [ 537.586251][T19202] dump_stack_lvl+0xd8/0x12c [ 537.586257][T19202] dump_stack+0x1c/0x28 [ 537.586261][T19202] should_fail_ex+0x41c/0x594 [ 537.586269][T19202] should_failslab+0xc0/0x128 [ 537.586276][T19202] kmem_cache_alloc_noprof+0x80/0x3e8 [ 537.586283][T19202] jbd2_journal_add_journal_head+0x98/0x5e0 [ 537.586290][T19202] jbd2_journal_get_create_access+0x58/0x3ac [ 537.586297][T19202] __ext4_journal_get_create_access+0xf8/0x37c [ 537.586304][T19202] ext4_getblk+0x3d8/0x6c4 [ 537.586309][T19202] ext4_bread+0x3c/0x1b0 [ 537.586314][T19202] ext4_append+0x238/0x474 [ 537.586320][T19202] ext4_init_new_dir+0x100/0x1a8 [ 537.586325][T19202] ext4_mkdir+0x3bc/0xa28 [ 537.586330][T19202] vfs_mkdir+0x284/0x424 [ 537.586337][T19202] do_mkdirat+0x1f8/0x4c8 [ 537.586344][T19202] __arm64_sys_mkdirat+0x8c/0xa4 [ 537.586350][T19202] invoke_syscall+0x98/0x2b8 [ 537.586356][T19202] el0_svc_common+0x130/0x23c [ 537.586361][T19202] do_el0_svc+0x48/0x58 [ 537.586366][T19202] el0_svc+0x58/0x180 [ 537.586379][T19202] el0t_64_sync_handler+0x84/0x12c [ 537.586387][T19202] el0t_64_sync+0x198/0x19c [ 537.681018][T19204] loop0: detected capacity change from 0 to 32768 [ 537.683064][T19204] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19204) [ 537.685504][T19204] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 537.687613][T19204] FAULT_INJECTION: forcing a failure. [ 537.687613][T19204] name failslab, interval 1, probability 0, space 0, times 0 [ 537.690061][T19204] CPU: 1 UID: 0 PID: 19204 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 537.690081][T19204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 537.690092][T19204] Call trace: [ 537.690096][T19204] show_stack+0x2c/0x3c (C) [ 537.690113][T19204] __dump_stack+0x30/0x40 [ 537.690120][T19204] dump_stack_lvl+0xd8/0x12c [ 537.690126][T19204] dump_stack+0x1c/0x28 [ 537.690131][T19204] should_fail_ex+0x41c/0x594 [ 537.690139][T19204] should_failslab+0xc0/0x128 [ 537.690146][T19204] kmem_cache_alloc_noprof+0x80/0x3e8 [ 537.690153][T19204] jbd2_journal_add_journal_head+0x98/0x5e0 [ 537.690160][T19204] jbd2_journal_get_create_access+0x58/0x3ac [ 537.690167][T19204] __ext4_journal_get_create_access+0xf8/0x37c [ 537.690174][T19204] ext4_getblk+0x3d8/0x6c4 [ 537.690179][T19204] ext4_bread+0x3c/0x1b0 [ 537.690184][T19204] ext4_append+0x238/0x474 [ 537.690190][T19204] ext4_init_new_dir+0x100/0x1a8 [ 537.690195][T19204] ext4_mkdir+0x3bc/0xa28 [ 537.690200][T19204] vfs_mkdir+0x284/0x424 [ 537.690207][T19204] do_mkdirat+0x1f8/0x4c8 [ 537.690214][T19204] __arm64_sys_mkdirat+0x8c/0xa4 [ 537.690221][T19204] invoke_syscall+0x98/0x2b8 [ 537.690227][T19204] el0_svc_common+0x130/0x23c [ 537.690232][T19204] do_el0_svc+0x48/0x58 [ 537.690237][T19204] el0_svc+0x58/0x180 [ 537.690244][T19204] el0t_64_sync_handler+0x84/0x12c [ 537.690249][T19204] el0t_64_sync+0x198/0x19c [ 537.783534][T19206] loop0: detected capacity change from 0 to 32768 [ 537.785498][T19206] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19206) [ 537.788045][T19206] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 537.790144][T19206] FAULT_INJECTION: forcing a failure. [ 537.790144][T19206] name failslab, interval 1, probability 0, space 0, times 0 [ 537.792491][T19206] CPU: 1 UID: 0 PID: 19206 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 537.792514][T19206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 537.792520][T19206] Call trace: [ 537.792523][T19206] show_stack+0x2c/0x3c (C) [ 537.792540][T19206] __dump_stack+0x30/0x40 [ 537.792550][T19206] dump_stack_lvl+0xd8/0x12c [ 537.792557][T19206] dump_stack+0x1c/0x28 [ 537.792563][T19206] should_fail_ex+0x41c/0x594 [ 537.792572][T19206] should_failslab+0xc0/0x128 [ 537.792579][T19206] kmem_cache_alloc_noprof+0x80/0x3e8 [ 537.792587][T19206] jbd2_journal_add_journal_head+0x98/0x5e0 [ 537.792594][T19206] jbd2_journal_get_create_access+0x58/0x3ac [ 537.792602][T19206] __ext4_journal_get_create_access+0xf8/0x37c [ 537.792608][T19206] ext4_getblk+0x3d8/0x6c4 [ 537.792614][T19206] ext4_bread+0x3c/0x1b0 [ 537.792619][T19206] ext4_append+0x238/0x474 [ 537.792625][T19206] ext4_init_new_dir+0x100/0x1a8 [ 537.792630][T19206] ext4_mkdir+0x3bc/0xa28 [ 537.792635][T19206] vfs_mkdir+0x284/0x424 [ 537.792643][T19206] do_mkdirat+0x1f8/0x4c8 [ 537.792650][T19206] __arm64_sys_mkdirat+0x8c/0xa4 [ 537.792657][T19206] invoke_syscall+0x98/0x2b8 [ 537.792662][T19206] el0_svc_common+0x130/0x23c [ 537.792668][T19206] do_el0_svc+0x48/0x58 [ 537.792673][T19206] el0_svc+0x58/0x180 [ 537.792680][T19206] el0t_64_sync_handler+0x84/0x12c [ 537.792685][T19206] el0t_64_sync+0x198/0x19c [ 537.886594][T19208] loop0: detected capacity change from 0 to 32768 [ 537.889006][T19208] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19208) [ 537.891450][T19208] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 537.893616][T19208] FAULT_INJECTION: forcing a failure. [ 537.893616][T19208] name failslab, interval 1, probability 0, space 0, times 0 [ 537.895903][T19208] CPU: 1 UID: 0 PID: 19208 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 537.895917][T19208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 537.895922][T19208] Call trace: [ 537.895926][T19208] show_stack+0x2c/0x3c (C) [ 537.895942][T19208] __dump_stack+0x30/0x40 [ 537.895953][T19208] dump_stack_lvl+0xd8/0x12c [ 537.895960][T19208] dump_stack+0x1c/0x28 [ 537.895966][T19208] should_fail_ex+0x41c/0x594 [ 537.895974][T19208] should_failslab+0xc0/0x128 [ 537.895981][T19208] kmem_cache_alloc_noprof+0x80/0x3e8 [ 537.895989][T19208] jbd2_journal_add_journal_head+0x98/0x5e0 [ 537.895996][T19208] jbd2_journal_get_create_access+0x58/0x3ac [ 537.896003][T19208] __ext4_journal_get_create_access+0xf8/0x37c [ 537.896010][T19208] ext4_getblk+0x3d8/0x6c4 [ 537.896015][T19208] ext4_bread+0x3c/0x1b0 [ 537.896021][T19208] ext4_append+0x238/0x474 [ 537.896026][T19208] ext4_init_new_dir+0x100/0x1a8 [ 537.896031][T19208] ext4_mkdir+0x3bc/0xa28 [ 537.896037][T19208] vfs_mkdir+0x284/0x424 [ 537.896044][T19208] do_mkdirat+0x1f8/0x4c8 [ 537.896051][T19208] __arm64_sys_mkdirat+0x8c/0xa4 [ 537.896058][T19208] invoke_syscall+0x98/0x2b8 [ 537.896064][T19208] el0_svc_common+0x130/0x23c [ 537.896069][T19208] do_el0_svc+0x48/0x58 [ 537.896074][T19208] el0_svc+0x58/0x180 [ 537.896081][T19208] el0t_64_sync_handler+0x84/0x12c [ 537.896086][T19208] el0t_64_sync+0x198/0x19c [ 537.980375][T19210] loop0: detected capacity change from 0 to 32768 [ 537.982342][T19210] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19210) [ 537.985019][T19210] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 537.986947][T19210] FAULT_INJECTION: forcing a failure. [ 537.986947][T19210] name failslab, interval 1, probability 0, space 0, times 0 [ 537.989025][T19210] CPU: 1 UID: 0 PID: 19210 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 537.989044][T19210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 537.989050][T19210] Call trace: [ 537.989053][T19210] show_stack+0x2c/0x3c (C) [ 537.989069][T19210] __dump_stack+0x30/0x40 [ 537.989080][T19210] dump_stack_lvl+0xd8/0x12c [ 537.989089][T19210] dump_stack+0x1c/0x28 [ 537.989097][T19210] should_fail_ex+0x41c/0x594 [ 537.989106][T19210] should_failslab+0xc0/0x128 [ 537.989114][T19210] kmem_cache_alloc_noprof+0x80/0x3e8 [ 537.989124][T19210] jbd2_journal_add_journal_head+0x98/0x5e0 [ 537.989131][T19210] jbd2_journal_get_create_access+0x58/0x3ac [ 537.989139][T19210] __ext4_journal_get_create_access+0xf8/0x37c [ 537.989145][T19210] ext4_getblk+0x3d8/0x6c4 [ 537.989151][T19210] ext4_bread+0x3c/0x1b0 [ 537.989156][T19210] ext4_append+0x238/0x474 [ 537.989161][T19210] ext4_init_new_dir+0x100/0x1a8 [ 537.989166][T19210] ext4_mkdir+0x3bc/0xa28 [ 537.989172][T19210] vfs_mkdir+0x284/0x424 [ 537.989179][T19210] do_mkdirat+0x1f8/0x4c8 [ 537.989186][T19210] __arm64_sys_mkdirat+0x8c/0xa4 [ 537.989193][T19210] invoke_syscall+0x98/0x2b8 [ 537.989198][T19210] el0_svc_common+0x130/0x23c [ 537.989203][T19210] do_el0_svc+0x48/0x58 [ 537.989208][T19210] el0_svc+0x58/0x180 [ 537.989215][T19210] el0t_64_sync_handler+0x84/0x12c [ 537.989221][T19210] el0t_64_sync+0x198/0x19c [ 538.075612][T19212] loop0: detected capacity change from 0 to 32768 [ 538.077550][T19212] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19212) [ 538.079362][T19212] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 538.079943][T19212] FAULT_INJECTION: forcing a failure. [ 538.079943][T19212] name failslab, interval 1, probability 0, space 0, times 0 [ 538.079956][T19212] CPU: 0 UID: 0 PID: 19212 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 538.079964][T19212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 538.079969][T19212] Call trace: [ 538.079971][T19212] show_stack+0x2c/0x3c (C) [ 538.079985][T19212] __dump_stack+0x30/0x40 [ 538.079992][T19212] dump_stack_lvl+0xd8/0x12c [ 538.079997][T19212] dump_stack+0x1c/0x28 [ 538.080002][T19212] should_fail_ex+0x41c/0x594 [ 538.080010][T19212] should_failslab+0xc0/0x128 [ 538.080018][T19212] kmem_cache_alloc_noprof+0x80/0x3e8 [ 538.080025][T19212] jbd2_journal_add_journal_head+0x98/0x5e0 [ 538.080033][T19212] jbd2_journal_get_create_access+0x58/0x3ac [ 538.080040][T19212] __ext4_journal_get_create_access+0xf8/0x37c [ 538.080047][T19212] ext4_getblk+0x3d8/0x6c4 [ 538.080053][T19212] ext4_bread+0x3c/0x1b0 [ 538.080058][T19212] ext4_append+0x238/0x474 [ 538.080064][T19212] ext4_init_new_dir+0x100/0x1a8 [ 538.080070][T19212] ext4_mkdir+0x3bc/0xa28 [ 538.080075][T19212] vfs_mkdir+0x284/0x424 [ 538.080083][T19212] do_mkdirat+0x1f8/0x4c8 [ 538.080090][T19212] __arm64_sys_mkdirat+0x8c/0xa4 [ 538.080097][T19212] invoke_syscall+0x98/0x2b8 [ 538.080103][T19212] el0_svc_common+0x130/0x23c [ 538.080108][T19212] do_el0_svc+0x48/0x58 [ 538.080113][T19212] el0_svc+0x58/0x180 [ 538.080120][T19212] el0t_64_sync_handler+0x84/0x12c [ 538.080126][T19212] el0t_64_sync+0x198/0x19c [ 538.178980][T19213] loop0: detected capacity change from 0 to 32768 [ 538.180197][T19213] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19213) [ 538.180316][T19213] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 538.200635][T19213] FAULT_INJECTION: forcing a failure. [ 538.200635][T19213] name failslab, interval 1, probability 0, space 0, times 0 [ 538.200665][T19213] CPU: 0 UID: 0 PID: 19213 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 538.200675][T19213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 538.200679][T19213] Call trace: [ 538.200683][T19213] show_stack+0x2c/0x3c (C) [ 538.200695][T19213] __dump_stack+0x30/0x40 [ 538.200702][T19213] dump_stack_lvl+0xd8/0x12c [ 538.200707][T19213] dump_stack+0x1c/0x28 [ 538.200712][T19213] should_fail_ex+0x41c/0x594 [ 538.200720][T19213] should_failslab+0xc0/0x128 [ 538.200727][T19213] kmem_cache_alloc_noprof+0x80/0x3e8 [ 538.200735][T19213] jbd2_journal_add_journal_head+0x98/0x5e0 [ 538.200742][T19213] jbd2_journal_get_create_access+0x58/0x3ac [ 538.200749][T19213] __ext4_journal_get_create_access+0xf8/0x37c [ 538.200756][T19213] ext4_getblk+0x3d8/0x6c4 [ 538.200762][T19213] ext4_bread+0x3c/0x1b0 [ 538.200767][T19213] ext4_append+0x238/0x474 [ 538.200772][T19213] ext4_init_new_dir+0x100/0x1a8 [ 538.200778][T19213] ext4_mkdir+0x3bc/0xa28 [ 538.200783][T19213] vfs_mkdir+0x284/0x424 [ 538.200790][T19213] do_mkdirat+0x1f8/0x4c8 [ 538.200797][T19213] __arm64_sys_mkdirat+0x8c/0xa4 [ 538.200804][T19213] invoke_syscall+0x98/0x2b8 [ 538.200810][T19213] el0_svc_common+0x130/0x23c [ 538.200815][T19213] do_el0_svc+0x48/0x58 [ 538.200820][T19213] el0_svc+0x58/0x180 [ 538.200827][T19213] el0t_64_sync_handler+0x84/0x12c [ 538.200833][T19213] el0t_64_sync+0x198/0x19c [ 538.276601][T19215] loop0: detected capacity change from 0 to 32768 [ 538.278722][T19215] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 538.279860][T19215] FAULT_INJECTION: forcing a failure. [ 538.279860][T19215] name failslab, interval 1, probability 0, space 0, times 0 [ 538.279874][T19215] CPU: 0 UID: 0 PID: 19215 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 538.279882][T19215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 538.279886][T19215] Call trace: [ 538.279889][T19215] show_stack+0x2c/0x3c (C) [ 538.279901][T19215] __dump_stack+0x30/0x40 [ 538.279908][T19215] dump_stack_lvl+0xd8/0x12c [ 538.279913][T19215] dump_stack+0x1c/0x28 [ 538.279918][T19215] should_fail_ex+0x41c/0x594 [ 538.279926][T19215] should_failslab+0xc0/0x128 [ 538.279933][T19215] kmem_cache_alloc_noprof+0x80/0x3e8 [ 538.279941][T19215] jbd2_journal_add_journal_head+0x98/0x5e0 [ 538.279948][T19215] jbd2_journal_get_create_access+0x58/0x3ac [ 538.279955][T19215] __ext4_journal_get_create_access+0xf8/0x37c [ 538.279962][T19215] ext4_getblk+0x3d8/0x6c4 [ 538.279968][T19215] ext4_bread+0x3c/0x1b0 [ 538.279973][T19215] ext4_append+0x238/0x474 [ 538.279979][T19215] ext4_init_new_dir+0x100/0x1a8 [ 538.279984][T19215] ext4_mkdir+0x3bc/0xa28 [ 538.279989][T19215] vfs_mkdir+0x284/0x424 [ 538.279997][T19215] do_mkdirat+0x1f8/0x4c8 [ 538.280004][T19215] __arm64_sys_mkdirat+0x8c/0xa4 [ 538.280011][T19215] invoke_syscall+0x98/0x2b8 [ 538.280017][T19215] el0_svc_common+0x130/0x23c [ 538.280022][T19215] do_el0_svc+0x48/0x58 [ 538.280027][T19215] el0_svc+0x58/0x180 [ 538.280034][T19215] el0t_64_sync_handler+0x84/0x12c [ 538.280040][T19215] el0t_64_sync+0x198/0x19c [ 538.366078][T19216] loop0: detected capacity change from 0 to 32768 [ 538.368478][T19216] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19216) [ 538.368583][T19216] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 538.369029][T19216] FAULT_INJECTION: forcing a failure. [ 538.369029][T19216] name failslab, interval 1, probability 0, space 0, times 0 [ 538.369042][T19216] CPU: 0 UID: 0 PID: 19216 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 538.369050][T19216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 538.369054][T19216] Call trace: [ 538.369056][T19216] show_stack+0x2c/0x3c (C) [ 538.369069][T19216] __dump_stack+0x30/0x40 [ 538.369075][T19216] dump_stack_lvl+0xd8/0x12c [ 538.369081][T19216] dump_stack+0x1c/0x28 [ 538.369086][T19216] should_fail_ex+0x41c/0x594 [ 538.369094][T19216] should_failslab+0xc0/0x128 [ 538.369102][T19216] kmem_cache_alloc_noprof+0x80/0x3e8 [ 538.369109][T19216] jbd2_journal_add_journal_head+0x98/0x5e0 [ 538.369116][T19216] jbd2_journal_get_create_access+0x58/0x3ac [ 538.369128][T19216] __ext4_journal_get_create_access+0xf8/0x37c [ 538.369136][T19216] ext4_getblk+0x3d8/0x6c4 [ 538.369142][T19216] ext4_bread+0x3c/0x1b0 [ 538.369148][T19216] ext4_append+0x238/0x474 [ 538.369154][T19216] ext4_init_new_dir+0x100/0x1a8 [ 538.369160][T19216] ext4_mkdir+0x3bc/0xa28 [ 538.369166][T19216] vfs_mkdir+0x284/0x424 [ 538.369173][T19216] do_mkdirat+0x1f8/0x4c8 [ 538.369180][T19216] __arm64_sys_mkdirat+0x8c/0xa4 [ 538.369187][T19216] invoke_syscall+0x98/0x2b8 [ 538.369193][T19216] el0_svc_common+0x130/0x23c [ 538.369198][T19216] do_el0_svc+0x48/0x58 [ 538.369203][T19216] el0_svc+0x58/0x180 [ 538.369210][T19216] el0t_64_sync_handler+0x84/0x12c [ 538.369216][T19216] el0t_64_sync+0x198/0x19c [ 538.459994][T19219] loop0: detected capacity change from 0 to 32768 [ 538.461967][T19219] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19219) [ 538.463978][T19219] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 538.464505][T19219] FAULT_INJECTION: forcing a failure. [ 538.464505][T19219] name failslab, interval 1, probability 0, space 0, times 0 [ 538.464518][T19219] CPU: 0 UID: 0 PID: 19219 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 538.464526][T19219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 538.464531][T19219] Call trace: [ 538.464534][T19219] show_stack+0x2c/0x3c (C) [ 538.464546][T19219] __dump_stack+0x30/0x40 [ 538.464553][T19219] dump_stack_lvl+0xd8/0x12c [ 538.464559][T19219] dump_stack+0x1c/0x28 [ 538.464564][T19219] should_fail_ex+0x41c/0x594 [ 538.464572][T19219] should_failslab+0xc0/0x128 [ 538.464579][T19219] kmem_cache_alloc_noprof+0x80/0x3e8 [ 538.464587][T19219] jbd2_journal_add_journal_head+0x98/0x5e0 [ 538.464595][T19219] jbd2_journal_get_create_access+0x58/0x3ac [ 538.464602][T19219] __ext4_journal_get_create_access+0xf8/0x37c [ 538.464609][T19219] ext4_getblk+0x3d8/0x6c4 [ 538.464615][T19219] ext4_bread+0x3c/0x1b0 [ 538.464620][T19219] ext4_append+0x238/0x474 [ 538.464626][T19219] ext4_init_new_dir+0x100/0x1a8 [ 538.464632][T19219] ext4_mkdir+0x3bc/0xa28 [ 538.464638][T19219] vfs_mkdir+0x284/0x424 [ 538.464645][T19219] do_mkdirat+0x1f8/0x4c8 [ 538.464652][T19219] __arm64_sys_mkdirat+0x8c/0xa4 [ 538.464659][T19219] invoke_syscall+0x98/0x2b8 [ 538.464665][T19219] el0_svc_common+0x130/0x23c [ 538.464670][T19219] do_el0_svc+0x48/0x58 [ 538.464675][T19219] el0_svc+0x58/0x180 [ 538.464682][T19219] el0t_64_sync_handler+0x84/0x12c [ 538.464688][T19219] el0t_64_sync+0x198/0x19c [ 538.564793][T19221] loop0: detected capacity change from 0 to 32768 [ 538.566129][T19221] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19221) [ 538.566248][T19221] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 538.567203][T19221] FAULT_INJECTION: forcing a failure. [ 538.567203][T19221] name failslab, interval 1, probability 0, space 0, times 0 [ 538.567216][T19221] CPU: 0 UID: 0 PID: 19221 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 538.567225][T19221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 538.567229][T19221] Call trace: [ 538.567232][T19221] show_stack+0x2c/0x3c (C) [ 538.567245][T19221] __dump_stack+0x30/0x40 [ 538.567252][T19221] dump_stack_lvl+0xd8/0x12c [ 538.567257][T19221] dump_stack+0x1c/0x28 [ 538.567262][T19221] should_fail_ex+0x41c/0x594 [ 538.567270][T19221] should_failslab+0xc0/0x128 [ 538.567278][T19221] kmem_cache_alloc_noprof+0x80/0x3e8 [ 538.567286][T19221] jbd2_journal_add_journal_head+0x98/0x5e0 [ 538.567293][T19221] jbd2_journal_get_create_access+0x58/0x3ac [ 538.567300][T19221] __ext4_journal_get_create_access+0xf8/0x37c [ 538.567307][T19221] ext4_getblk+0x3d8/0x6c4 [ 538.567313][T19221] ext4_bread+0x3c/0x1b0 [ 538.567318][T19221] ext4_append+0x238/0x474 [ 538.567324][T19221] ext4_init_new_dir+0x100/0x1a8 [ 538.567329][T19221] ext4_mkdir+0x3bc/0xa28 [ 538.567335][T19221] vfs_mkdir+0x284/0x424 [ 538.567342][T19221] do_mkdirat+0x1f8/0x4c8 [ 538.567349][T19221] __arm64_sys_mkdirat+0x8c/0xa4 [ 538.567362][T19221] invoke_syscall+0x98/0x2b8 [ 538.567369][T19221] el0_svc_common+0x130/0x23c [ 538.567375][T19221] do_el0_svc+0x48/0x58 [ 538.567381][T19221] el0_svc+0x58/0x180 [ 538.567389][T19221] el0t_64_sync_handler+0x84/0x12c [ 538.567396][T19221] el0t_64_sync+0x198/0x19c [ 538.661409][T19222] loop0: detected capacity change from 0 to 32768 [ 538.662224][T19222] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19222) [ 538.662303][T19222] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 538.662779][T19222] FAULT_INJECTION: forcing a failure. [ 538.662779][T19222] name failslab, interval 1, probability 0, space 0, times 0 [ 538.662792][T19222] CPU: 0 UID: 0 PID: 19222 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 538.662800][T19222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 538.662804][T19222] Call trace: [ 538.662807][T19222] show_stack+0x2c/0x3c (C) [ 538.662821][T19222] __dump_stack+0x30/0x40 [ 538.662827][T19222] dump_stack_lvl+0xd8/0x12c [ 538.662833][T19222] dump_stack+0x1c/0x28 [ 538.662838][T19222] should_fail_ex+0x41c/0x594 [ 538.662846][T19222] should_failslab+0xc0/0x128 [ 538.662853][T19222] kmem_cache_alloc_noprof+0x80/0x3e8 [ 538.662861][T19222] jbd2_journal_add_journal_head+0x98/0x5e0 [ 538.662868][T19222] jbd2_journal_get_create_access+0x58/0x3ac [ 538.662875][T19222] __ext4_journal_get_create_access+0xf8/0x37c [ 538.662883][T19222] ext4_getblk+0x3d8/0x6c4 [ 538.662888][T19222] ext4_bread+0x3c/0x1b0 [ 538.662893][T19222] ext4_append+0x238/0x474 [ 538.662899][T19222] ext4_init_new_dir+0x100/0x1a8 [ 538.662904][T19222] ext4_mkdir+0x3bc/0xa28 [ 538.662910][T19222] vfs_mkdir+0x284/0x424 [ 538.662917][T19222] do_mkdirat+0x1f8/0x4c8 [ 538.662924][T19222] __arm64_sys_mkdirat+0x8c/0xa4 [ 538.662931][T19222] invoke_syscall+0x98/0x2b8 [ 538.662937][T19222] el0_svc_common+0x130/0x23c [ 538.662942][T19222] do_el0_svc+0x48/0x58 [ 538.662948][T19222] el0_svc+0x58/0x180 [ 538.662955][T19222] el0t_64_sync_handler+0x84/0x12c [ 538.662961][T19222] el0t_64_sync+0x198/0x19c [ 538.752615][T19224] loop0: detected capacity change from 0 to 32768 [ 538.755493][T19224] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 538.756550][T19224] FAULT_INJECTION: forcing a failure. [ 538.756550][T19224] name failslab, interval 1, probability 0, space 0, times 0 [ 538.756564][T19224] CPU: 0 UID: 0 PID: 19224 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 538.756572][T19224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 538.756576][T19224] Call trace: [ 538.756579][T19224] show_stack+0x2c/0x3c (C) [ 538.756592][T19224] __dump_stack+0x30/0x40 [ 538.756599][T19224] dump_stack_lvl+0xd8/0x12c [ 538.756604][T19224] dump_stack+0x1c/0x28 [ 538.756609][T19224] should_fail_ex+0x41c/0x594 [ 538.756617][T19224] should_failslab+0xc0/0x128 [ 538.756624][T19224] kmem_cache_alloc_noprof+0x80/0x3e8 [ 538.756632][T19224] jbd2_journal_add_journal_head+0x98/0x5e0 [ 538.756639][T19224] jbd2_journal_get_create_access+0x58/0x3ac [ 538.756646][T19224] __ext4_journal_get_create_access+0xf8/0x37c [ 538.756653][T19224] ext4_getblk+0x3d8/0x6c4 [ 538.756659][T19224] ext4_bread+0x3c/0x1b0 [ 538.756664][T19224] ext4_append+0x238/0x474 [ 538.756670][T19224] ext4_init_new_dir+0x100/0x1a8 [ 538.756675][T19224] ext4_mkdir+0x3bc/0xa28 [ 538.756681][T19224] vfs_mkdir+0x284/0x424 [ 538.756688][T19224] do_mkdirat+0x1f8/0x4c8 [ 538.756695][T19224] __arm64_sys_mkdirat+0x8c/0xa4 [ 538.756702][T19224] invoke_syscall+0x98/0x2b8 [ 538.756708][T19224] el0_svc_common+0x130/0x23c [ 538.756713][T19224] do_el0_svc+0x48/0x58 [ 538.756718][T19224] el0_svc+0x58/0x180 [ 538.756725][T19224] el0t_64_sync_handler+0x84/0x12c [ 538.756731][T19224] el0t_64_sync+0x198/0x19c [ 538.842438][T19225] loop0: detected capacity change from 0 to 32768 [ 538.844986][T19225] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19225) [ 538.847265][T19225] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 538.849251][T19225] FAULT_INJECTION: forcing a failure. [ 538.849251][T19225] name failslab, interval 1, probability 0, space 0, times 0 [ 538.851194][T19225] CPU: 1 UID: 0 PID: 19225 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 538.851210][T19225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 538.851216][T19225] Call trace: [ 538.851219][T19225] show_stack+0x2c/0x3c (C) [ 538.851236][T19225] __dump_stack+0x30/0x40 [ 538.851248][T19225] dump_stack_lvl+0xd8/0x12c [ 538.851256][T19225] dump_stack+0x1c/0x28 [ 538.851262][T19225] should_fail_ex+0x41c/0x594 [ 538.851270][T19225] should_failslab+0xc0/0x128 [ 538.851278][T19225] kmem_cache_alloc_noprof+0x80/0x3e8 [ 538.851286][T19225] jbd2_journal_add_journal_head+0x98/0x5e0 [ 538.851293][T19225] jbd2_journal_get_create_access+0x58/0x3ac [ 538.851300][T19225] __ext4_journal_get_create_access+0xf8/0x37c [ 538.851307][T19225] ext4_getblk+0x3d8/0x6c4 [ 538.851313][T19225] ext4_bread+0x3c/0x1b0 [ 538.851318][T19225] ext4_append+0x238/0x474 [ 538.851323][T19225] ext4_init_new_dir+0x100/0x1a8 [ 538.851329][T19225] ext4_mkdir+0x3bc/0xa28 [ 538.851334][T19225] vfs_mkdir+0x284/0x424 [ 538.851341][T19225] do_mkdirat+0x1f8/0x4c8 [ 538.851348][T19225] __arm64_sys_mkdirat+0x8c/0xa4 [ 538.851355][T19225] invoke_syscall+0x98/0x2b8 [ 538.851361][T19225] el0_svc_common+0x130/0x23c [ 538.851366][T19225] do_el0_svc+0x48/0x58 [ 538.851375][T19225] el0_svc+0x58/0x180 [ 538.851383][T19225] el0t_64_sync_handler+0x84/0x12c [ 538.851390][T19225] el0t_64_sync+0x198/0x19c [ 538.944739][T19228] loop0: detected capacity change from 0 to 32768 [ 538.946153][T19228] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19228) [ 538.946516][T19228] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 538.949520][T19228] FAULT_INJECTION: forcing a failure. [ 538.949520][T19228] name failslab, interval 1, probability 0, space 0, times 0 [ 538.949534][T19228] CPU: 0 UID: 0 PID: 19228 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 538.949542][T19228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 538.949546][T19228] Call trace: [ 538.949549][T19228] show_stack+0x2c/0x3c (C) [ 538.949561][T19228] __dump_stack+0x30/0x40 [ 538.949567][T19228] dump_stack_lvl+0xd8/0x12c [ 538.949573][T19228] dump_stack+0x1c/0x28 [ 538.949578][T19228] should_fail_ex+0x41c/0x594 [ 538.949586][T19228] should_failslab+0xc0/0x128 [ 538.949593][T19228] kmem_cache_alloc_noprof+0x80/0x3e8 [ 538.949600][T19228] jbd2_journal_add_journal_head+0x98/0x5e0 [ 538.949607][T19228] jbd2_journal_get_create_access+0x58/0x3ac [ 538.949614][T19228] __ext4_journal_get_create_access+0xf8/0x37c [ 538.949621][T19228] ext4_getblk+0x3d8/0x6c4 [ 538.949627][T19228] ext4_bread+0x3c/0x1b0 [ 538.949632][T19228] ext4_append+0x238/0x474 [ 538.949638][T19228] ext4_init_new_dir+0x100/0x1a8 [ 538.949643][T19228] ext4_mkdir+0x3bc/0xa28 [ 538.949648][T19228] vfs_mkdir+0x284/0x424 [ 538.949656][T19228] do_mkdirat+0x1f8/0x4c8 [ 538.949663][T19228] __arm64_sys_mkdirat+0x8c/0xa4 [ 538.949670][T19228] invoke_syscall+0x98/0x2b8 [ 538.949676][T19228] el0_svc_common+0x130/0x23c [ 538.949681][T19228] do_el0_svc+0x48/0x58 [ 538.949686][T19228] el0_svc+0x58/0x180 [ 538.949693][T19228] el0t_64_sync_handler+0x84/0x12c [ 538.949699][T19228] el0t_64_sync+0x198/0x19c [ 539.039058][T19229] loop0: detected capacity change from 0 to 32768 [ 539.043122][T19229] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19229) [ 539.043221][T19229] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 539.044091][T19229] FAULT_INJECTION: forcing a failure. [ 539.044091][T19229] name failslab, interval 1, probability 0, space 0, times 0 [ 539.044105][T19229] CPU: 0 UID: 0 PID: 19229 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 539.044113][T19229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 539.044117][T19229] Call trace: [ 539.044120][T19229] show_stack+0x2c/0x3c (C) [ 539.044132][T19229] __dump_stack+0x30/0x40 [ 539.044139][T19229] dump_stack_lvl+0xd8/0x12c [ 539.044145][T19229] dump_stack+0x1c/0x28 [ 539.044150][T19229] should_fail_ex+0x41c/0x594 [ 539.044158][T19229] should_failslab+0xc0/0x128 [ 539.044165][T19229] kmem_cache_alloc_noprof+0x80/0x3e8 [ 539.044172][T19229] jbd2_journal_add_journal_head+0x98/0x5e0 [ 539.044180][T19229] jbd2_journal_get_create_access+0x58/0x3ac [ 539.044187][T19229] __ext4_journal_get_create_access+0xf8/0x37c [ 539.044194][T19229] ext4_getblk+0x3d8/0x6c4 [ 539.044200][T19229] ext4_bread+0x3c/0x1b0 [ 539.044205][T19229] ext4_append+0x238/0x474 [ 539.044211][T19229] ext4_init_new_dir+0x100/0x1a8 [ 539.044216][T19229] ext4_mkdir+0x3bc/0xa28 [ 539.044222][T19229] vfs_mkdir+0x284/0x424 [ 539.044229][T19229] do_mkdirat+0x1f8/0x4c8 [ 539.044236][T19229] __arm64_sys_mkdirat+0x8c/0xa4 [ 539.044243][T19229] invoke_syscall+0x98/0x2b8 [ 539.044249][T19229] el0_svc_common+0x130/0x23c [ 539.044254][T19229] do_el0_svc+0x48/0x58 [ 539.044259][T19229] el0_svc+0x58/0x180 [ 539.044266][T19229] el0t_64_sync_handler+0x84/0x12c [ 539.044272][T19229] el0t_64_sync+0x198/0x19c [ 539.133177][T19231] loop0: detected capacity change from 0 to 32768 [ 539.135168][T19231] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19231) [ 539.137385][T19231] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 539.139451][T19231] FAULT_INJECTION: forcing a failure. [ 539.139451][T19231] name failslab, interval 1, probability 0, space 0, times 0 [ 539.141527][T19231] CPU: 1 UID: 0 PID: 19231 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 539.141552][T19231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 539.141559][T19231] Call trace: [ 539.141563][T19231] show_stack+0x2c/0x3c (C) [ 539.141578][T19231] __dump_stack+0x30/0x40 [ 539.141586][T19231] dump_stack_lvl+0xd8/0x12c [ 539.141591][T19231] dump_stack+0x1c/0x28 [ 539.141596][T19231] should_fail_ex+0x41c/0x594 [ 539.141604][T19231] should_failslab+0xc0/0x128 [ 539.141612][T19231] kmem_cache_alloc_noprof+0x80/0x3e8 [ 539.141619][T19231] jbd2_journal_add_journal_head+0x98/0x5e0 [ 539.141626][T19231] jbd2_journal_get_create_access+0x58/0x3ac [ 539.141633][T19231] __ext4_journal_get_create_access+0xf8/0x37c [ 539.141640][T19231] ext4_getblk+0x3d8/0x6c4 [ 539.141646][T19231] ext4_bread+0x3c/0x1b0 [ 539.141651][T19231] ext4_append+0x238/0x474 [ 539.141656][T19231] ext4_init_new_dir+0x100/0x1a8 [ 539.141661][T19231] ext4_mkdir+0x3bc/0xa28 [ 539.141666][T19231] vfs_mkdir+0x284/0x424 [ 539.141673][T19231] do_mkdirat+0x1f8/0x4c8 [ 539.141680][T19231] __arm64_sys_mkdirat+0x8c/0xa4 [ 539.141687][T19231] invoke_syscall+0x98/0x2b8 [ 539.141693][T19231] el0_svc_common+0x130/0x23c [ 539.141698][T19231] do_el0_svc+0x48/0x58 [ 539.141702][T19231] el0_svc+0x58/0x180 [ 539.141709][T19231] el0t_64_sync_handler+0x84/0x12c [ 539.141715][T19231] el0t_64_sync+0x198/0x19c [ 539.228658][T19234] loop0: detected capacity change from 0 to 32768 [ 539.230453][T19234] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19234) [ 539.230555][T19234] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 539.230996][T19234] FAULT_INJECTION: forcing a failure. [ 539.230996][T19234] name failslab, interval 1, probability 0, space 0, times 0 [ 539.231008][T19234] CPU: 0 UID: 0 PID: 19234 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 539.231016][T19234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 539.231021][T19234] Call trace: [ 539.231023][T19234] show_stack+0x2c/0x3c (C) [ 539.231036][T19234] __dump_stack+0x30/0x40 [ 539.231042][T19234] dump_stack_lvl+0xd8/0x12c [ 539.231048][T19234] dump_stack+0x1c/0x28 [ 539.231053][T19234] should_fail_ex+0x41c/0x594 [ 539.231061][T19234] should_failslab+0xc0/0x128 [ 539.231068][T19234] kmem_cache_alloc_noprof+0x80/0x3e8 [ 539.231076][T19234] jbd2_journal_add_journal_head+0x98/0x5e0 [ 539.231083][T19234] jbd2_journal_get_create_access+0x58/0x3ac [ 539.231090][T19234] __ext4_journal_get_create_access+0xf8/0x37c [ 539.231097][T19234] ext4_getblk+0x3d8/0x6c4 [ 539.231103][T19234] ext4_bread+0x3c/0x1b0 [ 539.231108][T19234] ext4_append+0x238/0x474 [ 539.231114][T19234] ext4_init_new_dir+0x100/0x1a8 [ 539.231120][T19234] ext4_mkdir+0x3bc/0xa28 [ 539.231125][T19234] vfs_mkdir+0x284/0x424 [ 539.231132][T19234] do_mkdirat+0x1f8/0x4c8 [ 539.231139][T19234] __arm64_sys_mkdirat+0x8c/0xa4 [ 539.231146][T19234] invoke_syscall+0x98/0x2b8 [ 539.231152][T19234] el0_svc_common+0x130/0x23c [ 539.231157][T19234] do_el0_svc+0x48/0x58 [ 539.231162][T19234] el0_svc+0x58/0x180 [ 539.231169][T19234] el0t_64_sync_handler+0x84/0x12c [ 539.231175][T19234] el0t_64_sync+0x198/0x19c [ 539.310950][T19235] loop0: detected capacity change from 0 to 32768 [ 539.311976][T19235] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19235) [ 539.312059][T19235] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 539.335267][T19235] FAULT_INJECTION: forcing a failure. [ 539.335267][T19235] name failslab, interval 1, probability 0, space 0, times 0 [ 539.335299][T19235] CPU: 0 UID: 0 PID: 19235 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 539.335310][T19235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 539.335317][T19235] Call trace: [ 539.335321][T19235] show_stack+0x2c/0x3c (C) [ 539.335336][T19235] __dump_stack+0x30/0x40 [ 539.335344][T19235] dump_stack_lvl+0xd8/0x12c [ 539.335349][T19235] dump_stack+0x1c/0x28 [ 539.335355][T19235] should_fail_ex+0x41c/0x594 [ 539.335368][T19235] should_failslab+0xc0/0x128 [ 539.335378][T19235] kmem_cache_alloc_noprof+0x80/0x3e8 [ 539.335386][T19235] jbd2_journal_add_journal_head+0x98/0x5e0 [ 539.335393][T19235] jbd2_journal_get_create_access+0x58/0x3ac [ 539.335400][T19235] __ext4_journal_get_create_access+0xf8/0x37c [ 539.335408][T19235] ext4_getblk+0x3d8/0x6c4 [ 539.335413][T19235] ext4_bread+0x3c/0x1b0 [ 539.335419][T19235] ext4_append+0x238/0x474 [ 539.335424][T19235] ext4_init_new_dir+0x100/0x1a8 [ 539.335430][T19235] ext4_mkdir+0x3bc/0xa28 [ 539.335435][T19235] vfs_mkdir+0x284/0x424 [ 539.335443][T19235] do_mkdirat+0x1f8/0x4c8 [ 539.335450][T19235] __arm64_sys_mkdirat+0x8c/0xa4 [ 539.335457][T19235] invoke_syscall+0x98/0x2b8 [ 539.335462][T19235] el0_svc_common+0x130/0x23c [ 539.335467][T19235] do_el0_svc+0x48/0x58 [ 539.335473][T19235] el0_svc+0x58/0x180 [ 539.335479][T19235] el0t_64_sync_handler+0x84/0x12c [ 539.335486][T19235] el0t_64_sync+0x198/0x19c [ 539.419604][T19237] loop0: detected capacity change from 0 to 32768 [ 539.421517][T19237] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 539.423455][T19237] FAULT_INJECTION: forcing a failure. [ 539.423455][T19237] name failslab, interval 1, probability 0, space 0, times 0 [ 539.423481][T19237] CPU: 0 UID: 0 PID: 19237 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 539.423494][T19237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 539.423499][T19237] Call trace: [ 539.423502][T19237] show_stack+0x2c/0x3c (C) [ 539.423514][T19237] __dump_stack+0x30/0x40 [ 539.423522][T19237] dump_stack_lvl+0xd8/0x12c [ 539.423527][T19237] dump_stack+0x1c/0x28 [ 539.423532][T19237] should_fail_ex+0x41c/0x594 [ 539.423540][T19237] should_failslab+0xc0/0x128 [ 539.423548][T19237] kmem_cache_alloc_noprof+0x80/0x3e8 [ 539.423555][T19237] jbd2_journal_add_journal_head+0x98/0x5e0 [ 539.423562][T19237] jbd2_journal_get_create_access+0x58/0x3ac [ 539.423570][T19237] __ext4_journal_get_create_access+0xf8/0x37c [ 539.423577][T19237] ext4_getblk+0x3d8/0x6c4 [ 539.423583][T19237] ext4_bread+0x3c/0x1b0 [ 539.423588][T19237] ext4_append+0x238/0x474 [ 539.423593][T19237] ext4_init_new_dir+0x100/0x1a8 [ 539.423599][T19237] ext4_mkdir+0x3bc/0xa28 [ 539.423604][T19237] vfs_mkdir+0x284/0x424 [ 539.423612][T19237] do_mkdirat+0x1f8/0x4c8 [ 539.423619][T19237] __arm64_sys_mkdirat+0x8c/0xa4 [ 539.423626][T19237] invoke_syscall+0x98/0x2b8 [ 539.423632][T19237] el0_svc_common+0x130/0x23c [ 539.423637][T19237] do_el0_svc+0x48/0x58 [ 539.423642][T19237] el0_svc+0x58/0x180 [ 539.423649][T19237] el0t_64_sync_handler+0x84/0x12c [ 539.423655][T19237] el0t_64_sync+0x198/0x19c [ 539.514335][T19238] loop0: detected capacity change from 0 to 32768 [ 539.516732][T19238] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19238) [ 539.517118][T19238] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 539.517613][T19238] FAULT_INJECTION: forcing a failure. [ 539.517613][T19238] name failslab, interval 1, probability 0, space 0, times 0 [ 539.517626][T19238] CPU: 0 UID: 0 PID: 19238 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 539.517634][T19238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 539.517638][T19238] Call trace: [ 539.517641][T19238] show_stack+0x2c/0x3c (C) [ 539.517654][T19238] __dump_stack+0x30/0x40 [ 539.517660][T19238] dump_stack_lvl+0xd8/0x12c [ 539.517665][T19238] dump_stack+0x1c/0x28 [ 539.517670][T19238] should_fail_ex+0x41c/0x594 [ 539.517678][T19238] should_failslab+0xc0/0x128 [ 539.517686][T19238] kmem_cache_alloc_noprof+0x80/0x3e8 [ 539.517693][T19238] jbd2_journal_add_journal_head+0x98/0x5e0 [ 539.517701][T19238] jbd2_journal_get_create_access+0x58/0x3ac [ 539.517708][T19238] __ext4_journal_get_create_access+0xf8/0x37c [ 539.517715][T19238] ext4_getblk+0x3d8/0x6c4 [ 539.517724][T19238] ext4_bread+0x3c/0x1b0 [ 539.517731][T19238] ext4_append+0x238/0x474 [ 539.517738][T19238] ext4_init_new_dir+0x100/0x1a8 [ 539.517744][T19238] ext4_mkdir+0x3bc/0xa28 [ 539.517750][T19238] vfs_mkdir+0x284/0x424 [ 539.517758][T19238] do_mkdirat+0x1f8/0x4c8 [ 539.517764][T19238] __arm64_sys_mkdirat+0x8c/0xa4 [ 539.517772][T19238] invoke_syscall+0x98/0x2b8 [ 539.517777][T19238] el0_svc_common+0x130/0x23c [ 539.517783][T19238] do_el0_svc+0x48/0x58 [ 539.517788][T19238] el0_svc+0x58/0x180 [ 539.517795][T19238] el0t_64_sync_handler+0x84/0x12c [ 539.517801][T19238] el0t_64_sync+0x198/0x19c [ 539.601332][T19240] loop0: detected capacity change from 0 to 32768 [ 539.603545][T19240] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19240) [ 539.606047][T19240] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 539.634250][T19240] FAULT_INJECTION: forcing a failure. [ 539.634250][T19240] name failslab, interval 1, probability 0, space 0, times 0 [ 539.636520][T19240] CPU: 1 UID: 0 PID: 19240 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 539.636543][T19240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 539.636550][T19240] Call trace: [ 539.636555][T19240] show_stack+0x2c/0x3c (C) [ 539.636572][T19240] __dump_stack+0x30/0x40 [ 539.636582][T19240] dump_stack_lvl+0xd8/0x12c [ 539.636588][T19240] dump_stack+0x1c/0x28 [ 539.636594][T19240] should_fail_ex+0x41c/0x594 [ 539.636604][T19240] should_failslab+0xc0/0x128 [ 539.636613][T19240] kmem_cache_alloc_noprof+0x80/0x3e8 [ 539.636622][T19240] jbd2_journal_add_journal_head+0x98/0x5e0 [ 539.636629][T19240] jbd2_journal_get_create_access+0x58/0x3ac [ 539.636637][T19240] __ext4_journal_get_create_access+0xf8/0x37c [ 539.636644][T19240] ext4_getblk+0x3d8/0x6c4 [ 539.636649][T19240] ext4_bread+0x3c/0x1b0 [ 539.636654][T19240] ext4_append+0x238/0x474 [ 539.636660][T19240] ext4_init_new_dir+0x100/0x1a8 [ 539.636665][T19240] ext4_mkdir+0x3bc/0xa28 [ 539.636670][T19240] vfs_mkdir+0x284/0x424 [ 539.636677][T19240] do_mkdirat+0x1f8/0x4c8 [ 539.636684][T19240] __arm64_sys_mkdirat+0x8c/0xa4 [ 539.636691][T19240] invoke_syscall+0x98/0x2b8 [ 539.636697][T19240] el0_svc_common+0x130/0x23c [ 539.636702][T19240] do_el0_svc+0x48/0x58 [ 539.636707][T19240] el0_svc+0x58/0x180 [ 539.636714][T19240] el0t_64_sync_handler+0x84/0x12c [ 539.636719][T19240] el0t_64_sync+0x198/0x19c [ 539.713767][T19242] loop0: detected capacity change from 0 to 32768 [ 539.715765][T19242] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 539.717669][T19242] FAULT_INJECTION: forcing a failure. [ 539.717669][T19242] name failslab, interval 1, probability 0, space 0, times 0 [ 539.719885][T19242] CPU: 1 UID: 0 PID: 19242 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 539.719911][T19242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 539.719924][T19242] Call trace: [ 539.719928][T19242] show_stack+0x2c/0x3c (C) [ 539.719944][T19242] __dump_stack+0x30/0x40 [ 539.719952][T19242] dump_stack_lvl+0xd8/0x12c [ 539.719959][T19242] dump_stack+0x1c/0x28 [ 539.719964][T19242] should_fail_ex+0x41c/0x594 [ 539.719972][T19242] should_failslab+0xc0/0x128 [ 539.719979][T19242] kmem_cache_alloc_noprof+0x80/0x3e8 [ 539.719986][T19242] jbd2_journal_add_journal_head+0x98/0x5e0 [ 539.719993][T19242] jbd2_journal_get_create_access+0x58/0x3ac [ 539.720000][T19242] __ext4_journal_get_create_access+0xf8/0x37c [ 539.720007][T19242] ext4_getblk+0x3d8/0x6c4 [ 539.720013][T19242] ext4_bread+0x3c/0x1b0 [ 539.720018][T19242] ext4_append+0x238/0x474 [ 539.720023][T19242] ext4_init_new_dir+0x100/0x1a8 [ 539.720028][T19242] ext4_mkdir+0x3bc/0xa28 [ 539.720033][T19242] vfs_mkdir+0x284/0x424 [ 539.720041][T19242] do_mkdirat+0x1f8/0x4c8 [ 539.720047][T19242] __arm64_sys_mkdirat+0x8c/0xa4 [ 539.720054][T19242] invoke_syscall+0x98/0x2b8 [ 539.720060][T19242] el0_svc_common+0x130/0x23c [ 539.720065][T19242] do_el0_svc+0x48/0x58 [ 539.720070][T19242] el0_svc+0x58/0x180 [ 539.720077][T19242] el0t_64_sync_handler+0x84/0x12c [ 539.720083][T19242] el0t_64_sync+0x198/0x19c [ 539.805620][T19244] loop0: detected capacity change from 0 to 32768 [ 539.808138][T19244] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19244) [ 539.808519][T19244] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 539.808994][T19244] FAULT_INJECTION: forcing a failure. [ 539.808994][T19244] name failslab, interval 1, probability 0, space 0, times 0 [ 539.809007][T19244] CPU: 0 UID: 0 PID: 19244 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 539.809015][T19244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 539.809019][T19244] Call trace: [ 539.809022][T19244] show_stack+0x2c/0x3c (C) [ 539.809036][T19244] __dump_stack+0x30/0x40 [ 539.809043][T19244] dump_stack_lvl+0xd8/0x12c [ 539.809048][T19244] dump_stack+0x1c/0x28 [ 539.809053][T19244] should_fail_ex+0x41c/0x594 [ 539.809061][T19244] should_failslab+0xc0/0x128 [ 539.809069][T19244] kmem_cache_alloc_noprof+0x80/0x3e8 [ 539.809076][T19244] jbd2_journal_add_journal_head+0x98/0x5e0 [ 539.809083][T19244] jbd2_journal_get_create_access+0x58/0x3ac [ 539.809090][T19244] __ext4_journal_get_create_access+0xf8/0x37c [ 539.809097][T19244] ext4_getblk+0x3d8/0x6c4 [ 539.809103][T19244] ext4_bread+0x3c/0x1b0 [ 539.809108][T19244] ext4_append+0x238/0x474 [ 539.809114][T19244] ext4_init_new_dir+0x100/0x1a8 [ 539.809124][T19244] ext4_mkdir+0x3bc/0xa28 [ 539.809130][T19244] vfs_mkdir+0x284/0x424 [ 539.809138][T19244] do_mkdirat+0x1f8/0x4c8 [ 539.809145][T19244] __arm64_sys_mkdirat+0x8c/0xa4 [ 539.809153][T19244] invoke_syscall+0x98/0x2b8 [ 539.809159][T19244] el0_svc_common+0x130/0x23c [ 539.809165][T19244] do_el0_svc+0x48/0x58 [ 539.809170][T19244] el0_svc+0x58/0x180 [ 539.809178][T19244] el0t_64_sync_handler+0x84/0x12c [ 539.809183][T19244] el0t_64_sync+0x198/0x19c [ 539.905885][T19246] loop0: detected capacity change from 0 to 32768 [ 539.907927][T19246] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19246) [ 539.910323][T19246] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 539.912353][T19246] FAULT_INJECTION: forcing a failure. [ 539.912353][T19246] name failslab, interval 1, probability 0, space 0, times 0 [ 539.914519][T19246] CPU: 1 UID: 0 PID: 19246 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 539.914541][T19246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 539.914550][T19246] Call trace: [ 539.914555][T19246] show_stack+0x2c/0x3c (C) [ 539.914572][T19246] __dump_stack+0x30/0x40 [ 539.914579][T19246] dump_stack_lvl+0xd8/0x12c [ 539.914585][T19246] dump_stack+0x1c/0x28 [ 539.914591][T19246] should_fail_ex+0x41c/0x594 [ 539.914599][T19246] should_failslab+0xc0/0x128 [ 539.914606][T19246] kmem_cache_alloc_noprof+0x80/0x3e8 [ 539.914613][T19246] jbd2_journal_add_journal_head+0x98/0x5e0 [ 539.914621][T19246] jbd2_journal_get_create_access+0x58/0x3ac [ 539.914628][T19246] __ext4_journal_get_create_access+0xf8/0x37c [ 539.914635][T19246] ext4_getblk+0x3d8/0x6c4 [ 539.914640][T19246] ext4_bread+0x3c/0x1b0 [ 539.914645][T19246] ext4_append+0x238/0x474 [ 539.914651][T19246] ext4_init_new_dir+0x100/0x1a8 [ 539.914656][T19246] ext4_mkdir+0x3bc/0xa28 [ 539.914661][T19246] vfs_mkdir+0x284/0x424 [ 539.914668][T19246] do_mkdirat+0x1f8/0x4c8 [ 539.914675][T19246] __arm64_sys_mkdirat+0x8c/0xa4 [ 539.914682][T19246] invoke_syscall+0x98/0x2b8 [ 539.914687][T19246] el0_svc_common+0x130/0x23c [ 539.914692][T19246] do_el0_svc+0x48/0x58 [ 539.914697][T19246] el0_svc+0x58/0x180 [ 539.914704][T19246] el0t_64_sync_handler+0x84/0x12c [ 539.914710][T19246] el0t_64_sync+0x198/0x19c [ 539.999597][T19248] loop0: detected capacity change from 0 to 32768 [ 540.001909][T19248] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19248) [ 540.002478][T19248] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 540.003084][T19248] FAULT_INJECTION: forcing a failure. [ 540.003084][T19248] name failslab, interval 1, probability 0, space 0, times 0 [ 540.003097][T19248] CPU: 0 UID: 0 PID: 19248 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 540.003105][T19248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 540.003110][T19248] Call trace: [ 540.003113][T19248] show_stack+0x2c/0x3c (C) [ 540.003126][T19248] __dump_stack+0x30/0x40 [ 540.003134][T19248] dump_stack_lvl+0xd8/0x12c [ 540.003139][T19248] dump_stack+0x1c/0x28 [ 540.003145][T19248] should_fail_ex+0x41c/0x594 [ 540.003153][T19248] should_failslab+0xc0/0x128 [ 540.003160][T19248] kmem_cache_alloc_noprof+0x80/0x3e8 [ 540.003168][T19248] jbd2_journal_add_journal_head+0x98/0x5e0 [ 540.003175][T19248] jbd2_journal_get_create_access+0x58/0x3ac [ 540.003182][T19248] __ext4_journal_get_create_access+0xf8/0x37c [ 540.003190][T19248] ext4_getblk+0x3d8/0x6c4 [ 540.003195][T19248] ext4_bread+0x3c/0x1b0 [ 540.003200][T19248] ext4_append+0x238/0x474 [ 540.003206][T19248] ext4_init_new_dir+0x100/0x1a8 [ 540.003212][T19248] ext4_mkdir+0x3bc/0xa28 [ 540.003217][T19248] vfs_mkdir+0x284/0x424 [ 540.003224][T19248] do_mkdirat+0x1f8/0x4c8 [ 540.003231][T19248] __arm64_sys_mkdirat+0x8c/0xa4 [ 540.003238][T19248] invoke_syscall+0x98/0x2b8 [ 540.003244][T19248] el0_svc_common+0x130/0x23c [ 540.003249][T19248] do_el0_svc+0x48/0x58 [ 540.003254][T19248] el0_svc+0x58/0x180 [ 540.003261][T19248] el0t_64_sync_handler+0x84/0x12c [ 540.003267][T19248] el0t_64_sync+0x198/0x19c [ 540.095890][T19249] loop0: detected capacity change from 0 to 32768 [ 540.098523][T19249] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19249) [ 540.098673][T19249] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 540.102531][T19249] FAULT_INJECTION: forcing a failure. [ 540.102531][T19249] name failslab, interval 1, probability 0, space 0, times 0 [ 540.104573][T19249] CPU: 1 UID: 0 PID: 19249 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 540.104585][T19249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 540.104590][T19249] Call trace: [ 540.104594][T19249] show_stack+0x2c/0x3c (C) [ 540.104606][T19249] __dump_stack+0x30/0x40 [ 540.104613][T19249] dump_stack_lvl+0xd8/0x12c [ 540.104618][T19249] dump_stack+0x1c/0x28 [ 540.104623][T19249] should_fail_ex+0x41c/0x594 [ 540.104631][T19249] should_failslab+0xc0/0x128 [ 540.104638][T19249] kmem_cache_alloc_noprof+0x80/0x3e8 [ 540.104646][T19249] jbd2_journal_add_journal_head+0x98/0x5e0 [ 540.104653][T19249] jbd2_journal_get_create_access+0x58/0x3ac [ 540.104660][T19249] __ext4_journal_get_create_access+0xf8/0x37c [ 540.104666][T19249] ext4_getblk+0x3d8/0x6c4 [ 540.104672][T19249] ext4_bread+0x3c/0x1b0 [ 540.104677][T19249] ext4_append+0x238/0x474 [ 540.104682][T19249] ext4_init_new_dir+0x100/0x1a8 [ 540.104688][T19249] ext4_mkdir+0x3bc/0xa28 [ 540.104693][T19249] vfs_mkdir+0x284/0x424 [ 540.104700][T19249] do_mkdirat+0x1f8/0x4c8 [ 540.104707][T19249] __arm64_sys_mkdirat+0x8c/0xa4 [ 540.104714][T19249] invoke_syscall+0x98/0x2b8 [ 540.104719][T19249] el0_svc_common+0x130/0x23c [ 540.104724][T19249] do_el0_svc+0x48/0x58 [ 540.104729][T19249] el0_svc+0x58/0x180 [ 540.104736][T19249] el0t_64_sync_handler+0x84/0x12c [ 540.104742][T19249] el0t_64_sync+0x198/0x19c [ 540.104751][T19249] journal_alloc_journal_head: 43 callbacks suppressed [ 540.104756][T19249] ENOMEM in journal_alloc_journal_head, retrying. [ 540.194585][T19252] loop0: detected capacity change from 0 to 32768 [ 540.196955][T19252] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19252) [ 540.199303][T19252] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 540.201334][T19252] FAULT_INJECTION: forcing a failure. [ 540.201334][T19252] name failslab, interval 1, probability 0, space 0, times 0 [ 540.203387][T19252] CPU: 1 UID: 0 PID: 19252 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 540.203403][T19252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 540.203408][T19252] Call trace: [ 540.203411][T19252] show_stack+0x2c/0x3c (C) [ 540.203423][T19252] __dump_stack+0x30/0x40 [ 540.203430][T19252] dump_stack_lvl+0xd8/0x12c [ 540.203435][T19252] dump_stack+0x1c/0x28 [ 540.203440][T19252] should_fail_ex+0x41c/0x594 [ 540.203448][T19252] should_failslab+0xc0/0x128 [ 540.203454][T19252] kmem_cache_alloc_noprof+0x80/0x3e8 [ 540.203462][T19252] jbd2_journal_add_journal_head+0x98/0x5e0 [ 540.203469][T19252] jbd2_journal_get_create_access+0x58/0x3ac [ 540.203476][T19252] __ext4_journal_get_create_access+0xf8/0x37c [ 540.203482][T19252] ext4_getblk+0x3d8/0x6c4 [ 540.203488][T19252] ext4_bread+0x3c/0x1b0 [ 540.203493][T19252] ext4_append+0x238/0x474 [ 540.203498][T19252] ext4_init_new_dir+0x100/0x1a8 [ 540.203503][T19252] ext4_mkdir+0x3bc/0xa28 [ 540.203509][T19252] vfs_mkdir+0x284/0x424 [ 540.203516][T19252] do_mkdirat+0x1f8/0x4c8 [ 540.203522][T19252] __arm64_sys_mkdirat+0x8c/0xa4 [ 540.203530][T19252] invoke_syscall+0x98/0x2b8 [ 540.203535][T19252] el0_svc_common+0x130/0x23c [ 540.203540][T19252] do_el0_svc+0x48/0x58 [ 540.203545][T19252] el0_svc+0x58/0x180 [ 540.203552][T19252] el0t_64_sync_handler+0x84/0x12c [ 540.203558][T19252] el0t_64_sync+0x198/0x19c [ 540.209226][T19252] ENOMEM in journal_alloc_journal_head, retrying. [ 540.292694][T19253] loop0: detected capacity change from 0 to 32768 [ 540.295382][T19253] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19253) [ 540.297740][T19253] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 540.299870][T19253] FAULT_INJECTION: forcing a failure. [ 540.299870][T19253] name failslab, interval 1, probability 0, space 0, times 0 [ 540.301966][T19253] CPU: 1 UID: 0 PID: 19253 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 540.301984][T19253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 540.301990][T19253] Call trace: [ 540.301994][T19253] show_stack+0x2c/0x3c (C) [ 540.302010][T19253] __dump_stack+0x30/0x40 [ 540.302021][T19253] dump_stack_lvl+0xd8/0x12c [ 540.302028][T19253] dump_stack+0x1c/0x28 [ 540.302034][T19253] should_fail_ex+0x41c/0x594 [ 540.302042][T19253] should_failslab+0xc0/0x128 [ 540.302049][T19253] kmem_cache_alloc_noprof+0x80/0x3e8 [ 540.302057][T19253] jbd2_journal_add_journal_head+0x98/0x5e0 [ 540.302065][T19253] jbd2_journal_get_create_access+0x58/0x3ac [ 540.302072][T19253] __ext4_journal_get_create_access+0xf8/0x37c [ 540.302079][T19253] ext4_getblk+0x3d8/0x6c4 [ 540.302085][T19253] ext4_bread+0x3c/0x1b0 [ 540.302090][T19253] ext4_append+0x238/0x474 [ 540.302095][T19253] ext4_init_new_dir+0x100/0x1a8 [ 540.302100][T19253] ext4_mkdir+0x3bc/0xa28 [ 540.302106][T19253] vfs_mkdir+0x284/0x424 [ 540.302113][T19253] do_mkdirat+0x1f8/0x4c8 [ 540.302120][T19253] __arm64_sys_mkdirat+0x8c/0xa4 [ 540.302127][T19253] invoke_syscall+0x98/0x2b8 [ 540.302133][T19253] el0_svc_common+0x130/0x23c [ 540.302138][T19253] do_el0_svc+0x48/0x58 [ 540.302143][T19253] el0_svc+0x58/0x180 [ 540.302150][T19253] el0t_64_sync_handler+0x84/0x12c [ 540.302156][T19253] el0t_64_sync+0x198/0x19c [ 540.324551][T19253] ENOMEM in journal_alloc_journal_head, retrying. [ 540.395290][T19256] loop0: detected capacity change from 0 to 32768 [ 540.398259][T19256] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19256) [ 540.398368][T19256] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 540.398831][T19256] FAULT_INJECTION: forcing a failure. [ 540.398831][T19256] name failslab, interval 1, probability 0, space 0, times 0 [ 540.398850][T19256] CPU: 1 UID: 0 PID: 19256 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 540.398862][T19256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 540.398869][T19256] Call trace: [ 540.398874][T19256] show_stack+0x2c/0x3c (C) [ 540.398890][T19256] __dump_stack+0x30/0x40 [ 540.398898][T19256] dump_stack_lvl+0xd8/0x12c [ 540.398903][T19256] dump_stack+0x1c/0x28 [ 540.398908][T19256] should_fail_ex+0x41c/0x594 [ 540.398916][T19256] should_failslab+0xc0/0x128 [ 540.398923][T19256] kmem_cache_alloc_noprof+0x80/0x3e8 [ 540.398930][T19256] jbd2_journal_add_journal_head+0x98/0x5e0 [ 540.398937][T19256] jbd2_journal_get_create_access+0x58/0x3ac [ 540.398944][T19256] __ext4_journal_get_create_access+0xf8/0x37c [ 540.398951][T19256] ext4_getblk+0x3d8/0x6c4 [ 540.398956][T19256] ext4_bread+0x3c/0x1b0 [ 540.398961][T19256] ext4_append+0x238/0x474 [ 540.398967][T19256] ext4_init_new_dir+0x100/0x1a8 [ 540.398972][T19256] ext4_mkdir+0x3bc/0xa28 [ 540.398977][T19256] vfs_mkdir+0x284/0x424 [ 540.398984][T19256] do_mkdirat+0x1f8/0x4c8 [ 540.398991][T19256] __arm64_sys_mkdirat+0x8c/0xa4 [ 540.398998][T19256] invoke_syscall+0x98/0x2b8 [ 540.399004][T19256] el0_svc_common+0x130/0x23c [ 540.399009][T19256] do_el0_svc+0x48/0x58 [ 540.399014][T19256] el0_svc+0x58/0x180 [ 540.399021][T19256] el0t_64_sync_handler+0x84/0x12c [ 540.399026][T19256] el0t_64_sync+0x198/0x19c [ 540.399038][T19256] ENOMEM in journal_alloc_journal_head, retrying. [ 540.490310][T19257] loop0: detected capacity change from 0 to 32768 [ 540.491049][T19257] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19257) [ 540.491142][T19257] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 540.511256][T19257] FAULT_INJECTION: forcing a failure. [ 540.511256][T19257] name failslab, interval 1, probability 0, space 0, times 0 [ 540.511289][T19257] CPU: 0 UID: 0 PID: 19257 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 540.511301][T19257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 540.511308][T19257] Call trace: [ 540.511311][T19257] show_stack+0x2c/0x3c (C) [ 540.511327][T19257] __dump_stack+0x30/0x40 [ 540.511335][T19257] dump_stack_lvl+0xd8/0x12c [ 540.511341][T19257] dump_stack+0x1c/0x28 [ 540.511346][T19257] should_fail_ex+0x41c/0x594 [ 540.511354][T19257] should_failslab+0xc0/0x128 [ 540.511366][T19257] kmem_cache_alloc_noprof+0x80/0x3e8 [ 540.511375][T19257] jbd2_journal_add_journal_head+0x98/0x5e0 [ 540.511383][T19257] jbd2_journal_get_create_access+0x58/0x3ac [ 540.511392][T19257] __ext4_journal_get_create_access+0xf8/0x37c [ 540.511399][T19257] ext4_getblk+0x3d8/0x6c4 [ 540.511405][T19257] ext4_bread+0x3c/0x1b0 [ 540.511410][T19257] ext4_append+0x238/0x474 [ 540.511416][T19257] ext4_init_new_dir+0x100/0x1a8 [ 540.511422][T19257] ext4_mkdir+0x3bc/0xa28 [ 540.511427][T19257] vfs_mkdir+0x284/0x424 [ 540.511435][T19257] do_mkdirat+0x1f8/0x4c8 [ 540.511442][T19257] __arm64_sys_mkdirat+0x8c/0xa4 [ 540.511449][T19257] invoke_syscall+0x98/0x2b8 [ 540.511455][T19257] el0_svc_common+0x130/0x23c [ 540.511460][T19257] do_el0_svc+0x48/0x58 [ 540.511465][T19257] el0_svc+0x58/0x180 [ 540.511472][T19257] el0t_64_sync_handler+0x84/0x12c [ 540.511478][T19257] el0t_64_sync+0x198/0x19c [ 540.511495][T19257] ENOMEM in journal_alloc_journal_head, retrying. [ 540.585452][T19259] loop0: detected capacity change from 0 to 32768 [ 540.587405][T19259] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 540.588530][T19259] FAULT_INJECTION: forcing a failure. [ 540.588530][T19259] name failslab, interval 1, probability 0, space 0, times 0 [ 540.588544][T19259] CPU: 0 UID: 0 PID: 19259 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 540.588552][T19259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 540.588557][T19259] Call trace: [ 540.588560][T19259] show_stack+0x2c/0x3c (C) [ 540.588573][T19259] __dump_stack+0x30/0x40 [ 540.588580][T19259] dump_stack_lvl+0xd8/0x12c [ 540.588585][T19259] dump_stack+0x1c/0x28 [ 540.588590][T19259] should_fail_ex+0x41c/0x594 [ 540.588598][T19259] should_failslab+0xc0/0x128 [ 540.588605][T19259] kmem_cache_alloc_noprof+0x80/0x3e8 [ 540.588613][T19259] jbd2_journal_add_journal_head+0x98/0x5e0 [ 540.588620][T19259] jbd2_journal_get_create_access+0x58/0x3ac [ 540.588627][T19259] __ext4_journal_get_create_access+0xf8/0x37c [ 540.588634][T19259] ext4_getblk+0x3d8/0x6c4 [ 540.588640][T19259] ext4_bread+0x3c/0x1b0 [ 540.588645][T19259] ext4_append+0x238/0x474 [ 540.588651][T19259] ext4_init_new_dir+0x100/0x1a8 [ 540.588656][T19259] ext4_mkdir+0x3bc/0xa28 [ 540.588662][T19259] vfs_mkdir+0x284/0x424 [ 540.588669][T19259] do_mkdirat+0x1f8/0x4c8 [ 540.588676][T19259] __arm64_sys_mkdirat+0x8c/0xa4 [ 540.588683][T19259] invoke_syscall+0x98/0x2b8 [ 540.588689][T19259] el0_svc_common+0x130/0x23c [ 540.588694][T19259] do_el0_svc+0x48/0x58 [ 540.588699][T19259] el0_svc+0x58/0x180 [ 540.588706][T19259] el0t_64_sync_handler+0x84/0x12c [ 540.588713][T19259] el0t_64_sync+0x198/0x19c [ 540.588721][T19259] ENOMEM in journal_alloc_journal_head, retrying. [ 540.680786][T19260] loop0: detected capacity change from 0 to 32768 [ 540.682784][T19260] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19260) [ 540.685311][T19260] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 540.687474][T19260] FAULT_INJECTION: forcing a failure. [ 540.687474][T19260] name failslab, interval 1, probability 0, space 0, times 0 [ 540.689611][T19260] CPU: 1 UID: 0 PID: 19260 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 540.689631][T19260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 540.689641][T19260] Call trace: [ 540.689646][T19260] show_stack+0x2c/0x3c (C) [ 540.689664][T19260] __dump_stack+0x30/0x40 [ 540.689671][T19260] dump_stack_lvl+0xd8/0x12c [ 540.689677][T19260] dump_stack+0x1c/0x28 [ 540.689682][T19260] should_fail_ex+0x41c/0x594 [ 540.689690][T19260] should_failslab+0xc0/0x128 [ 540.689697][T19260] kmem_cache_alloc_noprof+0x80/0x3e8 [ 540.689705][T19260] jbd2_journal_add_journal_head+0x98/0x5e0 [ 540.689711][T19260] jbd2_journal_get_create_access+0x58/0x3ac [ 540.689719][T19260] __ext4_journal_get_create_access+0xf8/0x37c [ 540.689726][T19260] ext4_getblk+0x3d8/0x6c4 [ 540.689731][T19260] ext4_bread+0x3c/0x1b0 [ 540.689736][T19260] ext4_append+0x238/0x474 [ 540.689742][T19260] ext4_init_new_dir+0x100/0x1a8 [ 540.689747][T19260] ext4_mkdir+0x3bc/0xa28 [ 540.689752][T19260] vfs_mkdir+0x284/0x424 [ 540.689759][T19260] do_mkdirat+0x1f8/0x4c8 [ 540.689766][T19260] __arm64_sys_mkdirat+0x8c/0xa4 [ 540.689773][T19260] invoke_syscall+0x98/0x2b8 [ 540.689778][T19260] el0_svc_common+0x130/0x23c [ 540.689783][T19260] do_el0_svc+0x48/0x58 [ 540.689788][T19260] el0_svc+0x58/0x180 [ 540.689795][T19260] el0t_64_sync_handler+0x84/0x12c [ 540.689801][T19260] el0t_64_sync+0x198/0x19c [ 540.709844][T19260] ENOMEM in journal_alloc_journal_head, retrying. [ 540.787707][T19263] loop0: detected capacity change from 0 to 32768 [ 540.789944][T19263] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19263) [ 540.792454][T19263] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 540.794467][T19263] FAULT_INJECTION: forcing a failure. [ 540.794467][T19263] name failslab, interval 1, probability 0, space 0, times 0 [ 540.796630][T19263] CPU: 1 UID: 0 PID: 19263 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 540.796652][T19263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 540.796658][T19263] Call trace: [ 540.796662][T19263] show_stack+0x2c/0x3c (C) [ 540.796677][T19263] __dump_stack+0x30/0x40 [ 540.796688][T19263] dump_stack_lvl+0xd8/0x12c [ 540.796695][T19263] dump_stack+0x1c/0x28 [ 540.796701][T19263] should_fail_ex+0x41c/0x594 [ 540.796709][T19263] should_failslab+0xc0/0x128 [ 540.796716][T19263] kmem_cache_alloc_noprof+0x80/0x3e8 [ 540.796723][T19263] jbd2_journal_add_journal_head+0x98/0x5e0 [ 540.796730][T19263] jbd2_journal_get_create_access+0x58/0x3ac [ 540.796737][T19263] __ext4_journal_get_create_access+0xf8/0x37c [ 540.796744][T19263] ext4_getblk+0x3d8/0x6c4 [ 540.796749][T19263] ext4_bread+0x3c/0x1b0 [ 540.796754][T19263] ext4_append+0x238/0x474 [ 540.796760][T19263] ext4_init_new_dir+0x100/0x1a8 [ 540.796765][T19263] ext4_mkdir+0x3bc/0xa28 [ 540.796770][T19263] vfs_mkdir+0x284/0x424 [ 540.796777][T19263] do_mkdirat+0x1f8/0x4c8 [ 540.796784][T19263] __arm64_sys_mkdirat+0x8c/0xa4 [ 540.796791][T19263] invoke_syscall+0x98/0x2b8 [ 540.796796][T19263] el0_svc_common+0x130/0x23c [ 540.796801][T19263] do_el0_svc+0x48/0x58 [ 540.796806][T19263] el0_svc+0x58/0x180 [ 540.796813][T19263] el0t_64_sync_handler+0x84/0x12c [ 540.796818][T19263] el0t_64_sync+0x198/0x19c [ 540.818268][T19263] ENOMEM in journal_alloc_journal_head, retrying. [ 540.892447][T19265] loop0: detected capacity change from 0 to 32768 [ 540.894557][T19265] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19265) [ 540.896943][T19265] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 540.899016][T19265] FAULT_INJECTION: forcing a failure. [ 540.899016][T19265] name failslab, interval 1, probability 0, space 0, times 0 [ 540.901312][T19265] CPU: 1 UID: 0 PID: 19265 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 540.901333][T19265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 540.901339][T19265] Call trace: [ 540.901342][T19265] show_stack+0x2c/0x3c (C) [ 540.901358][T19265] __dump_stack+0x30/0x40 [ 540.901368][T19265] dump_stack_lvl+0xd8/0x12c [ 540.901382][T19265] dump_stack+0x1c/0x28 [ 540.901391][T19265] should_fail_ex+0x41c/0x594 [ 540.901402][T19265] should_failslab+0xc0/0x128 [ 540.901411][T19265] kmem_cache_alloc_noprof+0x80/0x3e8 [ 540.901419][T19265] jbd2_journal_add_journal_head+0x98/0x5e0 [ 540.901426][T19265] jbd2_journal_get_create_access+0x58/0x3ac [ 540.901433][T19265] __ext4_journal_get_create_access+0xf8/0x37c [ 540.901440][T19265] ext4_getblk+0x3d8/0x6c4 [ 540.901445][T19265] ext4_bread+0x3c/0x1b0 [ 540.901451][T19265] ext4_append+0x238/0x474 [ 540.901456][T19265] ext4_init_new_dir+0x100/0x1a8 [ 540.901461][T19265] ext4_mkdir+0x3bc/0xa28 [ 540.901467][T19265] vfs_mkdir+0x284/0x424 [ 540.901474][T19265] do_mkdirat+0x1f8/0x4c8 [ 540.901480][T19265] __arm64_sys_mkdirat+0x8c/0xa4 [ 540.901487][T19265] invoke_syscall+0x98/0x2b8 [ 540.901493][T19265] el0_svc_common+0x130/0x23c [ 540.901498][T19265] do_el0_svc+0x48/0x58 [ 540.901503][T19265] el0_svc+0x58/0x180 [ 540.901510][T19265] el0t_64_sync_handler+0x84/0x12c [ 540.901516][T19265] el0t_64_sync+0x198/0x19c [ 540.919328][T19265] ENOMEM in journal_alloc_journal_head, retrying. [ 540.994429][T19267] loop0: detected capacity change from 0 to 32768 [ 540.996627][T19267] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19267) [ 540.996745][T19267] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 540.997207][T19267] FAULT_INJECTION: forcing a failure. [ 540.997207][T19267] name failslab, interval 1, probability 0, space 0, times 0 [ 540.997219][T19267] CPU: 0 UID: 0 PID: 19267 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 540.997227][T19267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 540.997231][T19267] Call trace: [ 540.997234][T19267] show_stack+0x2c/0x3c (C) [ 540.997247][T19267] __dump_stack+0x30/0x40 [ 540.997254][T19267] dump_stack_lvl+0xd8/0x12c [ 540.997259][T19267] dump_stack+0x1c/0x28 [ 540.997264][T19267] should_fail_ex+0x41c/0x594 [ 540.997272][T19267] should_failslab+0xc0/0x128 [ 540.997279][T19267] kmem_cache_alloc_noprof+0x80/0x3e8 [ 540.997287][T19267] jbd2_journal_add_journal_head+0x98/0x5e0 [ 540.997294][T19267] jbd2_journal_get_create_access+0x58/0x3ac [ 540.997301][T19267] __ext4_journal_get_create_access+0xf8/0x37c [ 540.997308][T19267] ext4_getblk+0x3d8/0x6c4 [ 540.997313][T19267] ext4_bread+0x3c/0x1b0 [ 540.997319][T19267] ext4_append+0x238/0x474 [ 540.997324][T19267] ext4_init_new_dir+0x100/0x1a8 [ 540.997329][T19267] ext4_mkdir+0x3bc/0xa28 [ 540.997335][T19267] vfs_mkdir+0x284/0x424 [ 540.997342][T19267] do_mkdirat+0x1f8/0x4c8 [ 540.997349][T19267] __arm64_sys_mkdirat+0x8c/0xa4 [ 540.997363][T19267] invoke_syscall+0x98/0x2b8 [ 540.997370][T19267] el0_svc_common+0x130/0x23c [ 540.997376][T19267] do_el0_svc+0x48/0x58 [ 540.997383][T19267] el0_svc+0x58/0x180 [ 540.997391][T19267] el0t_64_sync_handler+0x84/0x12c [ 540.997398][T19267] el0t_64_sync+0x198/0x19c [ 540.997407][T19267] ENOMEM in journal_alloc_journal_head, retrying. [ 541.086533][T19268] loop0: detected capacity change from 0 to 32768 [ 541.087553][T19268] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19268) [ 541.087633][T19268] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 541.110826][T19268] FAULT_INJECTION: forcing a failure. [ 541.110826][T19268] name failslab, interval 1, probability 0, space 0, times 0 [ 541.110861][T19268] CPU: 0 UID: 0 PID: 19268 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 541.110871][T19268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 541.110878][T19268] Call trace: [ 541.110881][T19268] show_stack+0x2c/0x3c (C) [ 541.110901][T19268] __dump_stack+0x30/0x40 [ 541.110908][T19268] dump_stack_lvl+0xd8/0x12c [ 541.110914][T19268] dump_stack+0x1c/0x28 [ 541.110919][T19268] should_fail_ex+0x41c/0x594 [ 541.110928][T19268] should_failslab+0xc0/0x128 [ 541.110935][T19268] kmem_cache_alloc_noprof+0x80/0x3e8 [ 541.110942][T19268] jbd2_journal_add_journal_head+0x98/0x5e0 [ 541.110950][T19268] jbd2_journal_get_create_access+0x58/0x3ac [ 541.110957][T19268] __ext4_journal_get_create_access+0xf8/0x37c [ 541.110964][T19268] ext4_getblk+0x3d8/0x6c4 [ 541.110969][T19268] ext4_bread+0x3c/0x1b0 [ 541.110974][T19268] ext4_append+0x238/0x474 [ 541.110980][T19268] ext4_init_new_dir+0x100/0x1a8 [ 541.110985][T19268] ext4_mkdir+0x3bc/0xa28 [ 541.110991][T19268] vfs_mkdir+0x284/0x424 [ 541.110998][T19268] do_mkdirat+0x1f8/0x4c8 [ 541.111005][T19268] __arm64_sys_mkdirat+0x8c/0xa4 [ 541.111012][T19268] invoke_syscall+0x98/0x2b8 [ 541.111018][T19268] el0_svc_common+0x130/0x23c [ 541.111023][T19268] do_el0_svc+0x48/0x58 [ 541.111028][T19268] el0_svc+0x58/0x180 [ 541.111036][T19268] el0t_64_sync_handler+0x84/0x12c [ 541.111042][T19268] el0t_64_sync+0x198/0x19c [ 541.185947][T19270] loop0: detected capacity change from 0 to 32768 [ 541.187526][T19270] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 541.189030][T19270] FAULT_INJECTION: forcing a failure. [ 541.189030][T19270] name failslab, interval 1, probability 0, space 0, times 0 [ 541.189061][T19270] CPU: 0 UID: 0 PID: 19270 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 541.189074][T19270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 541.189080][T19270] Call trace: [ 541.189085][T19270] show_stack+0x2c/0x3c (C) [ 541.189098][T19270] __dump_stack+0x30/0x40 [ 541.189105][T19270] dump_stack_lvl+0xd8/0x12c [ 541.189110][T19270] dump_stack+0x1c/0x28 [ 541.189115][T19270] should_fail_ex+0x41c/0x594 [ 541.189127][T19270] should_failslab+0xc0/0x128 [ 541.189136][T19270] kmem_cache_alloc_noprof+0x80/0x3e8 [ 541.189146][T19270] jbd2_journal_add_journal_head+0x98/0x5e0 [ 541.189153][T19270] jbd2_journal_get_create_access+0x58/0x3ac [ 541.189161][T19270] __ext4_journal_get_create_access+0xf8/0x37c [ 541.189168][T19270] ext4_getblk+0x3d8/0x6c4 [ 541.189174][T19270] ext4_bread+0x3c/0x1b0 [ 541.189179][T19270] ext4_append+0x238/0x474 [ 541.189185][T19270] ext4_init_new_dir+0x100/0x1a8 [ 541.189190][T19270] ext4_mkdir+0x3bc/0xa28 [ 541.189195][T19270] vfs_mkdir+0x284/0x424 [ 541.189203][T19270] do_mkdirat+0x1f8/0x4c8 [ 541.189210][T19270] __arm64_sys_mkdirat+0x8c/0xa4 [ 541.189217][T19270] invoke_syscall+0x98/0x2b8 [ 541.189222][T19270] el0_svc_common+0x130/0x23c [ 541.189228][T19270] do_el0_svc+0x48/0x58 [ 541.189233][T19270] el0_svc+0x58/0x180 [ 541.189240][T19270] el0t_64_sync_handler+0x84/0x12c [ 541.189246][T19270] el0t_64_sync+0x198/0x19c [ 541.284675][T19271] loop0: detected capacity change from 0 to 32768 [ 541.285901][T19271] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19271) [ 541.286014][T19271] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 541.287651][T19271] FAULT_INJECTION: forcing a failure. [ 541.287651][T19271] name failslab, interval 1, probability 0, space 0, times 0 [ 541.287664][T19271] CPU: 0 UID: 0 PID: 19271 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 541.287673][T19271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 541.287677][T19271] Call trace: [ 541.287680][T19271] show_stack+0x2c/0x3c (C) [ 541.287693][T19271] __dump_stack+0x30/0x40 [ 541.287700][T19271] dump_stack_lvl+0xd8/0x12c [ 541.287705][T19271] dump_stack+0x1c/0x28 [ 541.287710][T19271] should_fail_ex+0x41c/0x594 [ 541.287718][T19271] should_failslab+0xc0/0x128 [ 541.287725][T19271] kmem_cache_alloc_noprof+0x80/0x3e8 [ 541.287733][T19271] jbd2_journal_add_journal_head+0x98/0x5e0 [ 541.287740][T19271] jbd2_journal_get_create_access+0x58/0x3ac [ 541.287748][T19271] __ext4_journal_get_create_access+0xf8/0x37c [ 541.287755][T19271] ext4_getblk+0x3d8/0x6c4 [ 541.287761][T19271] ext4_bread+0x3c/0x1b0 [ 541.287766][T19271] ext4_append+0x238/0x474 [ 541.287772][T19271] ext4_init_new_dir+0x100/0x1a8 [ 541.287777][T19271] ext4_mkdir+0x3bc/0xa28 [ 541.287783][T19271] vfs_mkdir+0x284/0x424 [ 541.287790][T19271] do_mkdirat+0x1f8/0x4c8 [ 541.287797][T19271] __arm64_sys_mkdirat+0x8c/0xa4 [ 541.287804][T19271] invoke_syscall+0x98/0x2b8 [ 541.287810][T19271] el0_svc_common+0x130/0x23c [ 541.287815][T19271] do_el0_svc+0x48/0x58 [ 541.287820][T19271] el0_svc+0x58/0x180 [ 541.287827][T19271] el0t_64_sync_handler+0x84/0x12c [ 541.287833][T19271] el0t_64_sync+0x198/0x19c [ 541.377630][T19273] loop0: detected capacity change from 0 to 32768 [ 541.379676][T19273] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19273) [ 541.381820][T19273] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 541.383916][T19273] FAULT_INJECTION: forcing a failure. [ 541.383916][T19273] name failslab, interval 1, probability 0, space 0, times 0 [ 541.386120][T19273] CPU: 1 UID: 0 PID: 19273 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 541.386139][T19273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 541.386145][T19273] Call trace: [ 541.386149][T19273] show_stack+0x2c/0x3c (C) [ 541.386165][T19273] __dump_stack+0x30/0x40 [ 541.386176][T19273] dump_stack_lvl+0xd8/0x12c [ 541.386184][T19273] dump_stack+0x1c/0x28 [ 541.386189][T19273] should_fail_ex+0x41c/0x594 [ 541.386198][T19273] should_failslab+0xc0/0x128 [ 541.386205][T19273] kmem_cache_alloc_noprof+0x80/0x3e8 [ 541.386213][T19273] jbd2_journal_add_journal_head+0x98/0x5e0 [ 541.386220][T19273] jbd2_journal_get_create_access+0x58/0x3ac [ 541.386227][T19273] __ext4_journal_get_create_access+0xf8/0x37c [ 541.386234][T19273] ext4_getblk+0x3d8/0x6c4 [ 541.386240][T19273] ext4_bread+0x3c/0x1b0 [ 541.386245][T19273] ext4_append+0x238/0x474 [ 541.386250][T19273] ext4_init_new_dir+0x100/0x1a8 [ 541.386256][T19273] ext4_mkdir+0x3bc/0xa28 [ 541.386261][T19273] vfs_mkdir+0x284/0x424 [ 541.386269][T19273] do_mkdirat+0x1f8/0x4c8 [ 541.386276][T19273] __arm64_sys_mkdirat+0x8c/0xa4 [ 541.386283][T19273] invoke_syscall+0x98/0x2b8 [ 541.386288][T19273] el0_svc_common+0x130/0x23c [ 541.386293][T19273] do_el0_svc+0x48/0x58 [ 541.386298][T19273] el0_svc+0x58/0x180 [ 541.386305][T19273] el0t_64_sync_handler+0x84/0x12c [ 541.386311][T19273] el0t_64_sync+0x198/0x19c [ 541.474445][T19276] loop0: detected capacity change from 0 to 32768 [ 541.476596][T19276] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19276) [ 541.479268][T19276] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 541.481233][T19276] FAULT_INJECTION: forcing a failure. [ 541.481233][T19276] name failslab, interval 1, probability 0, space 0, times 0 [ 541.483580][T19276] CPU: 1 UID: 0 PID: 19276 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 541.483601][T19276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 541.483607][T19276] Call trace: [ 541.483611][T19276] show_stack+0x2c/0x3c (C) [ 541.483627][T19276] __dump_stack+0x30/0x40 [ 541.483637][T19276] dump_stack_lvl+0xd8/0x12c [ 541.483645][T19276] dump_stack+0x1c/0x28 [ 541.483651][T19276] should_fail_ex+0x41c/0x594 [ 541.483660][T19276] should_failslab+0xc0/0x128 [ 541.483667][T19276] kmem_cache_alloc_noprof+0x80/0x3e8 [ 541.483675][T19276] jbd2_journal_add_journal_head+0x98/0x5e0 [ 541.483682][T19276] jbd2_journal_get_create_access+0x58/0x3ac [ 541.483689][T19276] __ext4_journal_get_create_access+0xf8/0x37c [ 541.483696][T19276] ext4_getblk+0x3d8/0x6c4 [ 541.483701][T19276] ext4_bread+0x3c/0x1b0 [ 541.483706][T19276] ext4_append+0x238/0x474 [ 541.483712][T19276] ext4_init_new_dir+0x100/0x1a8 [ 541.483717][T19276] ext4_mkdir+0x3bc/0xa28 [ 541.483722][T19276] vfs_mkdir+0x284/0x424 [ 541.483730][T19276] do_mkdirat+0x1f8/0x4c8 [ 541.483736][T19276] __arm64_sys_mkdirat+0x8c/0xa4 [ 541.483743][T19276] invoke_syscall+0x98/0x2b8 [ 541.483749][T19276] el0_svc_common+0x130/0x23c [ 541.483754][T19276] do_el0_svc+0x48/0x58 [ 541.483759][T19276] el0_svc+0x58/0x180 [ 541.483766][T19276] el0t_64_sync_handler+0x84/0x12c [ 541.483772][T19276] el0t_64_sync+0x198/0x19c [ 541.572818][T19278] loop0: detected capacity change from 0 to 32768 [ 541.575883][T19278] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19278) [ 541.578420][T19278] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 541.580752][T19278] FAULT_INJECTION: forcing a failure. [ 541.580752][T19278] name failslab, interval 1, probability 0, space 0, times 0 [ 541.582894][T19278] CPU: 1 UID: 0 PID: 19278 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 541.582917][T19278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 541.582924][T19278] Call trace: [ 541.582929][T19278] show_stack+0x2c/0x3c (C) [ 541.582945][T19278] __dump_stack+0x30/0x40 [ 541.582954][T19278] dump_stack_lvl+0xd8/0x12c [ 541.582960][T19278] dump_stack+0x1c/0x28 [ 541.582966][T19278] should_fail_ex+0x41c/0x594 [ 541.582975][T19278] should_failslab+0xc0/0x128 [ 541.582983][T19278] kmem_cache_alloc_noprof+0x80/0x3e8 [ 541.582991][T19278] jbd2_journal_add_journal_head+0x98/0x5e0 [ 541.582999][T19278] jbd2_journal_get_create_access+0x58/0x3ac [ 541.583006][T19278] __ext4_journal_get_create_access+0xf8/0x37c [ 541.583013][T19278] ext4_getblk+0x3d8/0x6c4 [ 541.583019][T19278] ext4_bread+0x3c/0x1b0 [ 541.583024][T19278] ext4_append+0x238/0x474 [ 541.583029][T19278] ext4_init_new_dir+0x100/0x1a8 [ 541.583034][T19278] ext4_mkdir+0x3bc/0xa28 [ 541.583040][T19278] vfs_mkdir+0x284/0x424 [ 541.583047][T19278] do_mkdirat+0x1f8/0x4c8 [ 541.583054][T19278] __arm64_sys_mkdirat+0x8c/0xa4 [ 541.583061][T19278] invoke_syscall+0x98/0x2b8 [ 541.583066][T19278] el0_svc_common+0x130/0x23c [ 541.583072][T19278] do_el0_svc+0x48/0x58 [ 541.583077][T19278] el0_svc+0x58/0x180 [ 541.583083][T19278] el0t_64_sync_handler+0x84/0x12c [ 541.583089][T19278] el0t_64_sync+0x198/0x19c [ 541.671683][T19280] loop0: detected capacity change from 0 to 32768 [ 541.674110][T19280] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19280) [ 541.674496][T19280] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 541.674952][T19280] FAULT_INJECTION: forcing a failure. [ 541.674952][T19280] name failslab, interval 1, probability 0, space 0, times 0 [ 541.674965][T19280] CPU: 0 UID: 0 PID: 19280 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 541.674973][T19280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 541.674978][T19280] Call trace: [ 541.674981][T19280] show_stack+0x2c/0x3c (C) [ 541.674995][T19280] __dump_stack+0x30/0x40 [ 541.675003][T19280] dump_stack_lvl+0xd8/0x12c [ 541.675008][T19280] dump_stack+0x1c/0x28 [ 541.675013][T19280] should_fail_ex+0x41c/0x594 [ 541.675021][T19280] should_failslab+0xc0/0x128 [ 541.675028][T19280] kmem_cache_alloc_noprof+0x80/0x3e8 [ 541.675036][T19280] jbd2_journal_add_journal_head+0x98/0x5e0 [ 541.675043][T19280] jbd2_journal_get_create_access+0x58/0x3ac [ 541.675050][T19280] __ext4_journal_get_create_access+0xf8/0x37c [ 541.675057][T19280] ext4_getblk+0x3d8/0x6c4 [ 541.675063][T19280] ext4_bread+0x3c/0x1b0 [ 541.675068][T19280] ext4_append+0x238/0x474 [ 541.675074][T19280] ext4_init_new_dir+0x100/0x1a8 [ 541.675079][T19280] ext4_mkdir+0x3bc/0xa28 [ 541.675084][T19280] vfs_mkdir+0x284/0x424 [ 541.675092][T19280] do_mkdirat+0x1f8/0x4c8 [ 541.675103][T19280] __arm64_sys_mkdirat+0x8c/0xa4 [ 541.675111][T19280] invoke_syscall+0x98/0x2b8 [ 541.675117][T19280] el0_svc_common+0x130/0x23c [ 541.675123][T19280] do_el0_svc+0x48/0x58 [ 541.675128][T19280] el0_svc+0x58/0x180 [ 541.675136][T19280] el0t_64_sync_handler+0x84/0x12c [ 541.675142][T19280] el0t_64_sync+0x198/0x19c [ 541.767045][T19281] loop0: detected capacity change from 0 to 32768 [ 541.770776][T19281] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19281) [ 541.771880][T19281] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 541.772383][T19281] FAULT_INJECTION: forcing a failure. [ 541.772383][T19281] name failslab, interval 1, probability 0, space 0, times 0 [ 541.772400][T19281] CPU: 0 UID: 0 PID: 19281 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 541.772412][T19281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 541.772417][T19281] Call trace: [ 541.772421][T19281] show_stack+0x2c/0x3c (C) [ 541.772435][T19281] __dump_stack+0x30/0x40 [ 541.772443][T19281] dump_stack_lvl+0xd8/0x12c [ 541.772449][T19281] dump_stack+0x1c/0x28 [ 541.772454][T19281] should_fail_ex+0x41c/0x594 [ 541.772462][T19281] should_failslab+0xc0/0x128 [ 541.772470][T19281] kmem_cache_alloc_noprof+0x80/0x3e8 [ 541.772479][T19281] jbd2_journal_add_journal_head+0x98/0x5e0 [ 541.772486][T19281] jbd2_journal_get_create_access+0x58/0x3ac [ 541.772494][T19281] __ext4_journal_get_create_access+0xf8/0x37c [ 541.772502][T19281] ext4_getblk+0x3d8/0x6c4 [ 541.772508][T19281] ext4_bread+0x3c/0x1b0 [ 541.772513][T19281] ext4_append+0x238/0x474 [ 541.772518][T19281] ext4_init_new_dir+0x100/0x1a8 [ 541.772524][T19281] ext4_mkdir+0x3bc/0xa28 [ 541.772529][T19281] vfs_mkdir+0x284/0x424 [ 541.772537][T19281] do_mkdirat+0x1f8/0x4c8 [ 541.772545][T19281] __arm64_sys_mkdirat+0x8c/0xa4 [ 541.772552][T19281] invoke_syscall+0x98/0x2b8 [ 541.772558][T19281] el0_svc_common+0x130/0x23c [ 541.772564][T19281] do_el0_svc+0x48/0x58 [ 541.772569][T19281] el0_svc+0x58/0x180 [ 541.772577][T19281] el0t_64_sync_handler+0x84/0x12c [ 541.772583][T19281] el0t_64_sync+0x198/0x19c [ 541.864693][T19283] loop0: detected capacity change from 0 to 32768 [ 541.865954][T19283] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19283) [ 541.866078][T19283] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 541.866750][T19283] FAULT_INJECTION: forcing a failure. [ 541.866750][T19283] name failslab, interval 1, probability 0, space 0, times 0 [ 541.866763][T19283] CPU: 0 UID: 0 PID: 19283 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 541.866772][T19283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 541.866777][T19283] Call trace: [ 541.866780][T19283] show_stack+0x2c/0x3c (C) [ 541.866793][T19283] __dump_stack+0x30/0x40 [ 541.866801][T19283] dump_stack_lvl+0xd8/0x12c [ 541.866806][T19283] dump_stack+0x1c/0x28 [ 541.866811][T19283] should_fail_ex+0x41c/0x594 [ 541.866819][T19283] should_failslab+0xc0/0x128 [ 541.866827][T19283] kmem_cache_alloc_noprof+0x80/0x3e8 [ 541.866834][T19283] jbd2_journal_add_journal_head+0x98/0x5e0 [ 541.866842][T19283] jbd2_journal_get_create_access+0x58/0x3ac [ 541.866849][T19283] __ext4_journal_get_create_access+0xf8/0x37c [ 541.866856][T19283] ext4_getblk+0x3d8/0x6c4 [ 541.866862][T19283] ext4_bread+0x3c/0x1b0 [ 541.866867][T19283] ext4_append+0x238/0x474 [ 541.866873][T19283] ext4_init_new_dir+0x100/0x1a8 [ 541.866878][T19283] ext4_mkdir+0x3bc/0xa28 [ 541.866884][T19283] vfs_mkdir+0x284/0x424 [ 541.866891][T19283] do_mkdirat+0x1f8/0x4c8 [ 541.866898][T19283] __arm64_sys_mkdirat+0x8c/0xa4 [ 541.866906][T19283] invoke_syscall+0x98/0x2b8 [ 541.866912][T19283] el0_svc_common+0x130/0x23c [ 541.866917][T19283] do_el0_svc+0x48/0x58 [ 541.866922][T19283] el0_svc+0x58/0x180 [ 541.866929][T19283] el0t_64_sync_handler+0x84/0x12c [ 541.866935][T19283] el0t_64_sync+0x198/0x19c [ 541.951014][T19285] loop0: detected capacity change from 0 to 32768 [ 541.952894][T19285] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19285) [ 541.955292][T19285] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 541.973871][T19285] FAULT_INJECTION: forcing a failure. [ 541.973871][T19285] name failslab, interval 1, probability 0, space 0, times 0 [ 541.976069][T19285] CPU: 1 UID: 0 PID: 19285 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 541.976089][T19285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 541.976095][T19285] Call trace: [ 541.976099][T19285] show_stack+0x2c/0x3c (C) [ 541.976114][T19285] __dump_stack+0x30/0x40 [ 541.976121][T19285] dump_stack_lvl+0xd8/0x12c [ 541.976127][T19285] dump_stack+0x1c/0x28 [ 541.976132][T19285] should_fail_ex+0x41c/0x594 [ 541.976140][T19285] should_failslab+0xc0/0x128 [ 541.976147][T19285] kmem_cache_alloc_noprof+0x80/0x3e8 [ 541.976154][T19285] jbd2_journal_add_journal_head+0x98/0x5e0 [ 541.976161][T19285] jbd2_journal_get_create_access+0x58/0x3ac [ 541.976168][T19285] __ext4_journal_get_create_access+0xf8/0x37c [ 541.976175][T19285] ext4_getblk+0x3d8/0x6c4 [ 541.976181][T19285] ext4_bread+0x3c/0x1b0 [ 541.976186][T19285] ext4_append+0x238/0x474 [ 541.976191][T19285] ext4_init_new_dir+0x100/0x1a8 [ 541.976196][T19285] ext4_mkdir+0x3bc/0xa28 [ 541.976201][T19285] vfs_mkdir+0x284/0x424 [ 541.976208][T19285] do_mkdirat+0x1f8/0x4c8 [ 541.976215][T19285] __arm64_sys_mkdirat+0x8c/0xa4 [ 541.976222][T19285] invoke_syscall+0x98/0x2b8 [ 541.976227][T19285] el0_svc_common+0x130/0x23c [ 541.976232][T19285] do_el0_svc+0x48/0x58 [ 541.976237][T19285] el0_svc+0x58/0x180 [ 541.976244][T19285] el0t_64_sync_handler+0x84/0x12c [ 541.976250][T19285] el0t_64_sync+0x198/0x19c [ 542.059993][T19287] loop0: detected capacity change from 0 to 32768 [ 542.064801][T19287] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 542.065369][T19287] FAULT_INJECTION: forcing a failure. [ 542.065369][T19287] name failslab, interval 1, probability 0, space 0, times 0 [ 542.065386][T19287] CPU: 0 UID: 0 PID: 19287 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 542.065397][T19287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 542.065402][T19287] Call trace: [ 542.065405][T19287] show_stack+0x2c/0x3c (C) [ 542.065418][T19287] __dump_stack+0x30/0x40 [ 542.065424][T19287] dump_stack_lvl+0xd8/0x12c [ 542.065429][T19287] dump_stack+0x1c/0x28 [ 542.065434][T19287] should_fail_ex+0x41c/0x594 [ 542.065442][T19287] should_failslab+0xc0/0x128 [ 542.065449][T19287] kmem_cache_alloc_noprof+0x80/0x3e8 [ 542.065456][T19287] jbd2_journal_add_journal_head+0x98/0x5e0 [ 542.065463][T19287] jbd2_journal_get_create_access+0x58/0x3ac [ 542.065470][T19287] __ext4_journal_get_create_access+0xf8/0x37c [ 542.065477][T19287] ext4_getblk+0x3d8/0x6c4 [ 542.065482][T19287] ext4_bread+0x3c/0x1b0 [ 542.065487][T19287] ext4_append+0x238/0x474 [ 542.065492][T19287] ext4_init_new_dir+0x100/0x1a8 [ 542.065497][T19287] ext4_mkdir+0x3bc/0xa28 [ 542.065502][T19287] vfs_mkdir+0x284/0x424 [ 542.065509][T19287] do_mkdirat+0x1f8/0x4c8 [ 542.065516][T19287] __arm64_sys_mkdirat+0x8c/0xa4 [ 542.065523][T19287] invoke_syscall+0x98/0x2b8 [ 542.065528][T19287] el0_svc_common+0x130/0x23c [ 542.065533][T19287] do_el0_svc+0x48/0x58 [ 542.065538][T19287] el0_svc+0x58/0x180 [ 542.065544][T19287] el0t_64_sync_handler+0x84/0x12c [ 542.065550][T19287] el0t_64_sync+0x198/0x19c [ 542.152547][T19288] loop0: detected capacity change from 0 to 32768 [ 542.155089][T19288] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19288) [ 542.157552][T19288] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 542.159483][T19288] FAULT_INJECTION: forcing a failure. [ 542.159483][T19288] name failslab, interval 1, probability 0, space 0, times 0 [ 542.161491][T19288] CPU: 1 UID: 0 PID: 19288 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 542.161509][T19288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 542.161515][T19288] Call trace: [ 542.161519][T19288] show_stack+0x2c/0x3c (C) [ 542.161534][T19288] __dump_stack+0x30/0x40 [ 542.161542][T19288] dump_stack_lvl+0xd8/0x12c [ 542.161548][T19288] dump_stack+0x1c/0x28 [ 542.161553][T19288] should_fail_ex+0x41c/0x594 [ 542.161561][T19288] should_failslab+0xc0/0x128 [ 542.161568][T19288] kmem_cache_alloc_noprof+0x80/0x3e8 [ 542.161576][T19288] jbd2_journal_add_journal_head+0x98/0x5e0 [ 542.161583][T19288] jbd2_journal_get_create_access+0x58/0x3ac [ 542.161590][T19288] __ext4_journal_get_create_access+0xf8/0x37c [ 542.161597][T19288] ext4_getblk+0x3d8/0x6c4 [ 542.161602][T19288] ext4_bread+0x3c/0x1b0 [ 542.161608][T19288] ext4_append+0x238/0x474 [ 542.161613][T19288] ext4_init_new_dir+0x100/0x1a8 [ 542.161618][T19288] ext4_mkdir+0x3bc/0xa28 [ 542.161623][T19288] vfs_mkdir+0x284/0x424 [ 542.161631][T19288] do_mkdirat+0x1f8/0x4c8 [ 542.161637][T19288] __arm64_sys_mkdirat+0x8c/0xa4 [ 542.161644][T19288] invoke_syscall+0x98/0x2b8 [ 542.161650][T19288] el0_svc_common+0x130/0x23c [ 542.161655][T19288] do_el0_svc+0x48/0x58 [ 542.161660][T19288] el0_svc+0x58/0x180 [ 542.161667][T19288] el0t_64_sync_handler+0x84/0x12c [ 542.161673][T19288] el0t_64_sync+0x198/0x19c [ 542.249817][T19291] loop0: detected capacity change from 0 to 32768 [ 542.253212][T19291] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19291) [ 542.253890][T19291] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 542.254374][T19291] FAULT_INJECTION: forcing a failure. [ 542.254374][T19291] name failslab, interval 1, probability 0, space 0, times 0 [ 542.254388][T19291] CPU: 0 UID: 0 PID: 19291 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 542.254396][T19291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 542.254401][T19291] Call trace: [ 542.254404][T19291] show_stack+0x2c/0x3c (C) [ 542.254417][T19291] __dump_stack+0x30/0x40 [ 542.254423][T19291] dump_stack_lvl+0xd8/0x12c [ 542.254429][T19291] dump_stack+0x1c/0x28 [ 542.254434][T19291] should_fail_ex+0x41c/0x594 [ 542.254442][T19291] should_failslab+0xc0/0x128 [ 542.254449][T19291] kmem_cache_alloc_noprof+0x80/0x3e8 [ 542.254456][T19291] jbd2_journal_add_journal_head+0x98/0x5e0 [ 542.254464][T19291] jbd2_journal_get_create_access+0x58/0x3ac [ 542.254471][T19291] __ext4_journal_get_create_access+0xf8/0x37c [ 542.254477][T19291] ext4_getblk+0x3d8/0x6c4 [ 542.254483][T19291] ext4_bread+0x3c/0x1b0 [ 542.254488][T19291] ext4_append+0x238/0x474 [ 542.254494][T19291] ext4_init_new_dir+0x100/0x1a8 [ 542.254499][T19291] ext4_mkdir+0x3bc/0xa28 [ 542.254504][T19291] vfs_mkdir+0x284/0x424 [ 542.254512][T19291] do_mkdirat+0x1f8/0x4c8 [ 542.254519][T19291] __arm64_sys_mkdirat+0x8c/0xa4 [ 542.254526][T19291] invoke_syscall+0x98/0x2b8 [ 542.254532][T19291] el0_svc_common+0x130/0x23c [ 542.254537][T19291] do_el0_svc+0x48/0x58 [ 542.254542][T19291] el0_svc+0x58/0x180 [ 542.254549][T19291] el0t_64_sync_handler+0x84/0x12c [ 542.254555][T19291] el0t_64_sync+0x198/0x19c [ 542.348605][T19292] loop0: detected capacity change from 0 to 32768 [ 542.359205][T19292] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19292) [ 542.361435][T19292] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 542.363313][T19292] FAULT_INJECTION: forcing a failure. [ 542.363313][T19292] name failslab, interval 1, probability 0, space 0, times 0 [ 542.365348][T19292] CPU: 1 UID: 0 PID: 19292 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 542.365363][T19292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 542.365371][T19292] Call trace: [ 542.365374][T19292] show_stack+0x2c/0x3c (C) [ 542.365390][T19292] __dump_stack+0x30/0x40 [ 542.365400][T19292] dump_stack_lvl+0xd8/0x12c [ 542.365409][T19292] dump_stack+0x1c/0x28 [ 542.365415][T19292] should_fail_ex+0x41c/0x594 [ 542.365423][T19292] should_failslab+0xc0/0x128 [ 542.365430][T19292] kmem_cache_alloc_noprof+0x80/0x3e8 [ 542.365438][T19292] jbd2_journal_add_journal_head+0x98/0x5e0 [ 542.365445][T19292] jbd2_journal_get_create_access+0x58/0x3ac [ 542.365452][T19292] __ext4_journal_get_create_access+0xf8/0x37c [ 542.365459][T19292] ext4_getblk+0x3d8/0x6c4 [ 542.365464][T19292] ext4_bread+0x3c/0x1b0 [ 542.365469][T19292] ext4_append+0x238/0x474 [ 542.365475][T19292] ext4_init_new_dir+0x100/0x1a8 [ 542.365480][T19292] ext4_mkdir+0x3bc/0xa28 [ 542.365485][T19292] vfs_mkdir+0x284/0x424 [ 542.365492][T19292] do_mkdirat+0x1f8/0x4c8 [ 542.365499][T19292] __arm64_sys_mkdirat+0x8c/0xa4 [ 542.365506][T19292] invoke_syscall+0x98/0x2b8 [ 542.365511][T19292] el0_svc_common+0x130/0x23c [ 542.365516][T19292] do_el0_svc+0x48/0x58 [ 542.365521][T19292] el0_svc+0x58/0x180 [ 542.365528][T19292] el0t_64_sync_handler+0x84/0x12c [ 542.365534][T19292] el0t_64_sync+0x198/0x19c [ 542.458174][T19295] loop0: detected capacity change from 0 to 32768 [ 542.459852][T19295] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19295) [ 542.459970][T19295] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 542.460434][T19295] FAULT_INJECTION: forcing a failure. [ 542.460434][T19295] name failslab, interval 1, probability 0, space 0, times 0 [ 542.460447][T19295] CPU: 0 UID: 0 PID: 19295 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 542.460454][T19295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 542.460459][T19295] Call trace: [ 542.460462][T19295] show_stack+0x2c/0x3c (C) [ 542.460475][T19295] __dump_stack+0x30/0x40 [ 542.460482][T19295] dump_stack_lvl+0xd8/0x12c [ 542.460487][T19295] dump_stack+0x1c/0x28 [ 542.460492][T19295] should_fail_ex+0x41c/0x594 [ 542.460500][T19295] should_failslab+0xc0/0x128 [ 542.460508][T19295] kmem_cache_alloc_noprof+0x80/0x3e8 [ 542.460515][T19295] jbd2_journal_add_journal_head+0x98/0x5e0 [ 542.460522][T19295] jbd2_journal_get_create_access+0x58/0x3ac [ 542.460530][T19295] __ext4_journal_get_create_access+0xf8/0x37c [ 542.460537][T19295] ext4_getblk+0x3d8/0x6c4 [ 542.460542][T19295] ext4_bread+0x3c/0x1b0 [ 542.460548][T19295] ext4_append+0x238/0x474 [ 542.460553][T19295] ext4_init_new_dir+0x100/0x1a8 [ 542.460559][T19295] ext4_mkdir+0x3bc/0xa28 [ 542.460564][T19295] vfs_mkdir+0x284/0x424 [ 542.460571][T19295] do_mkdirat+0x1f8/0x4c8 [ 542.460578][T19295] __arm64_sys_mkdirat+0x8c/0xa4 [ 542.460585][T19295] invoke_syscall+0x98/0x2b8 [ 542.460591][T19295] el0_svc_common+0x130/0x23c [ 542.460596][T19295] do_el0_svc+0x48/0x58 [ 542.460602][T19295] el0_svc+0x58/0x180 [ 542.460609][T19295] el0t_64_sync_handler+0x84/0x12c [ 542.460615][T19295] el0t_64_sync+0x198/0x19c [ 542.541788][T19296] loop0: detected capacity change from 0 to 32768 [ 542.543945][T19296] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19296) [ 542.546218][T19296] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 542.571551][T19296] FAULT_INJECTION: forcing a failure. [ 542.571551][T19296] name failslab, interval 1, probability 0, space 0, times 0 [ 542.573731][T19296] CPU: 1 UID: 0 PID: 19296 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 542.573748][T19296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 542.573754][T19296] Call trace: [ 542.573758][T19296] show_stack+0x2c/0x3c (C) [ 542.573775][T19296] __dump_stack+0x30/0x40 [ 542.573784][T19296] dump_stack_lvl+0xd8/0x12c [ 542.573790][T19296] dump_stack+0x1c/0x28 [ 542.573795][T19296] should_fail_ex+0x41c/0x594 [ 542.573803][T19296] should_failslab+0xc0/0x128 [ 542.573811][T19296] kmem_cache_alloc_noprof+0x80/0x3e8 [ 542.573818][T19296] jbd2_journal_add_journal_head+0x98/0x5e0 [ 542.573825][T19296] jbd2_journal_get_create_access+0x58/0x3ac [ 542.573832][T19296] __ext4_journal_get_create_access+0xf8/0x37c [ 542.573839][T19296] ext4_getblk+0x3d8/0x6c4 [ 542.573845][T19296] ext4_bread+0x3c/0x1b0 [ 542.573850][T19296] ext4_append+0x238/0x474 [ 542.573856][T19296] ext4_init_new_dir+0x100/0x1a8 [ 542.573861][T19296] ext4_mkdir+0x3bc/0xa28 [ 542.573866][T19296] vfs_mkdir+0x284/0x424 [ 542.573873][T19296] do_mkdirat+0x1f8/0x4c8 [ 542.573880][T19296] __arm64_sys_mkdirat+0x8c/0xa4 [ 542.573887][T19296] invoke_syscall+0x98/0x2b8 [ 542.573893][T19296] el0_svc_common+0x130/0x23c [ 542.573898][T19296] do_el0_svc+0x48/0x58 [ 542.573903][T19296] el0_svc+0x58/0x180 [ 542.573910][T19296] el0t_64_sync_handler+0x84/0x12c [ 542.573915][T19296] el0t_64_sync+0x198/0x19c [ 542.658090][T19298] loop0: detected capacity change from 0 to 32768 [ 542.660260][T19298] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 542.660736][T19298] FAULT_INJECTION: forcing a failure. [ 542.660736][T19298] name failslab, interval 1, probability 0, space 0, times 0 [ 542.660750][T19298] CPU: 0 UID: 0 PID: 19298 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 542.660758][T19298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 542.660762][T19298] Call trace: [ 542.660765][T19298] show_stack+0x2c/0x3c (C) [ 542.660778][T19298] __dump_stack+0x30/0x40 [ 542.660785][T19298] dump_stack_lvl+0xd8/0x12c [ 542.660790][T19298] dump_stack+0x1c/0x28 [ 542.660795][T19298] should_fail_ex+0x41c/0x594 [ 542.660803][T19298] should_failslab+0xc0/0x128 [ 542.660811][T19298] kmem_cache_alloc_noprof+0x80/0x3e8 [ 542.660818][T19298] jbd2_journal_add_journal_head+0x98/0x5e0 [ 542.660826][T19298] jbd2_journal_get_create_access+0x58/0x3ac [ 542.660833][T19298] __ext4_journal_get_create_access+0xf8/0x37c [ 542.660840][T19298] ext4_getblk+0x3d8/0x6c4 [ 542.660846][T19298] ext4_bread+0x3c/0x1b0 [ 542.660851][T19298] ext4_append+0x238/0x474 [ 542.660857][T19298] ext4_init_new_dir+0x100/0x1a8 [ 542.660862][T19298] ext4_mkdir+0x3bc/0xa28 [ 542.660868][T19298] vfs_mkdir+0x284/0x424 [ 542.660875][T19298] do_mkdirat+0x1f8/0x4c8 [ 542.660882][T19298] __arm64_sys_mkdirat+0x8c/0xa4 [ 542.660889][T19298] invoke_syscall+0x98/0x2b8 [ 542.660895][T19298] el0_svc_common+0x130/0x23c [ 542.660900][T19298] do_el0_svc+0x48/0x58 [ 542.660905][T19298] el0_svc+0x58/0x180 [ 542.660912][T19298] el0t_64_sync_handler+0x84/0x12c [ 542.660918][T19298] el0t_64_sync+0x198/0x19c [ 542.752882][T19299] loop0: detected capacity change from 0 to 32768 [ 542.754121][T19299] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19299) [ 542.754580][T19299] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 542.777644][T19299] FAULT_INJECTION: forcing a failure. [ 542.777644][T19299] name failslab, interval 1, probability 0, space 0, times 0 [ 542.777675][T19299] CPU: 0 UID: 0 PID: 19299 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 542.777684][T19299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 542.777689][T19299] Call trace: [ 542.777692][T19299] show_stack+0x2c/0x3c (C) [ 542.777705][T19299] __dump_stack+0x30/0x40 [ 542.777712][T19299] dump_stack_lvl+0xd8/0x12c [ 542.777717][T19299] dump_stack+0x1c/0x28 [ 542.777722][T19299] should_fail_ex+0x41c/0x594 [ 542.777730][T19299] should_failslab+0xc0/0x128 [ 542.777738][T19299] kmem_cache_alloc_noprof+0x80/0x3e8 [ 542.777745][T19299] jbd2_journal_add_journal_head+0x98/0x5e0 [ 542.777752][T19299] jbd2_journal_get_create_access+0x58/0x3ac [ 542.777760][T19299] __ext4_journal_get_create_access+0xf8/0x37c [ 542.777767][T19299] ext4_getblk+0x3d8/0x6c4 [ 542.777772][T19299] ext4_bread+0x3c/0x1b0 [ 542.777777][T19299] ext4_append+0x238/0x474 [ 542.777783][T19299] ext4_init_new_dir+0x100/0x1a8 [ 542.777788][T19299] ext4_mkdir+0x3bc/0xa28 [ 542.777794][T19299] vfs_mkdir+0x284/0x424 [ 542.777801][T19299] do_mkdirat+0x1f8/0x4c8 [ 542.777808][T19299] __arm64_sys_mkdirat+0x8c/0xa4 [ 542.777815][T19299] invoke_syscall+0x98/0x2b8 [ 542.777821][T19299] el0_svc_common+0x130/0x23c [ 542.777826][T19299] do_el0_svc+0x48/0x58 [ 542.777831][T19299] el0_svc+0x58/0x180 [ 542.777838][T19299] el0t_64_sync_handler+0x84/0x12c [ 542.777844][T19299] el0t_64_sync+0x198/0x19c [ 542.853366][T19301] loop0: detected capacity change from 0 to 32768 [ 542.854743][T19301] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 542.855805][T19301] FAULT_INJECTION: forcing a failure. [ 542.855805][T19301] name failslab, interval 1, probability 0, space 0, times 0 [ 542.855819][T19301] CPU: 0 UID: 0 PID: 19301 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 542.855826][T19301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 542.855831][T19301] Call trace: [ 542.855834][T19301] show_stack+0x2c/0x3c (C) [ 542.855846][T19301] __dump_stack+0x30/0x40 [ 542.855853][T19301] dump_stack_lvl+0xd8/0x12c [ 542.855858][T19301] dump_stack+0x1c/0x28 [ 542.855863][T19301] should_fail_ex+0x41c/0x594 [ 542.855871][T19301] should_failslab+0xc0/0x128 [ 542.855878][T19301] kmem_cache_alloc_noprof+0x80/0x3e8 [ 542.855886][T19301] jbd2_journal_add_journal_head+0x98/0x5e0 [ 542.855893][T19301] jbd2_journal_get_create_access+0x58/0x3ac [ 542.855900][T19301] __ext4_journal_get_create_access+0xf8/0x37c [ 542.855907][T19301] ext4_getblk+0x3d8/0x6c4 [ 542.855913][T19301] ext4_bread+0x3c/0x1b0 [ 542.855918][T19301] ext4_append+0x238/0x474 [ 542.855923][T19301] ext4_init_new_dir+0x100/0x1a8 [ 542.855929][T19301] ext4_mkdir+0x3bc/0xa28 [ 542.855934][T19301] vfs_mkdir+0x284/0x424 [ 542.855942][T19301] do_mkdirat+0x1f8/0x4c8 [ 542.855948][T19301] __arm64_sys_mkdirat+0x8c/0xa4 [ 542.855955][T19301] invoke_syscall+0x98/0x2b8 [ 542.855961][T19301] el0_svc_common+0x130/0x23c [ 542.855967][T19301] do_el0_svc+0x48/0x58 [ 542.855972][T19301] el0_svc+0x58/0x180 [ 542.855979][T19301] el0t_64_sync_handler+0x84/0x12c [ 542.855984][T19301] el0t_64_sync+0x198/0x19c [ 542.939353][T19302] loop0: detected capacity change from 0 to 32768 [ 542.941433][T19302] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19302) [ 542.941901][T19302] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 542.962450][T19302] FAULT_INJECTION: forcing a failure. [ 542.962450][T19302] name failslab, interval 1, probability 0, space 0, times 0 [ 542.962478][T19302] CPU: 1 UID: 0 PID: 19302 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 542.962489][T19302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 542.962496][T19302] Call trace: [ 542.962499][T19302] show_stack+0x2c/0x3c (C) [ 542.962513][T19302] __dump_stack+0x30/0x40 [ 542.962519][T19302] dump_stack_lvl+0xd8/0x12c [ 542.962525][T19302] dump_stack+0x1c/0x28 [ 542.962530][T19302] should_fail_ex+0x41c/0x594 [ 542.962537][T19302] should_failslab+0xc0/0x128 [ 542.962545][T19302] kmem_cache_alloc_noprof+0x80/0x3e8 [ 542.962552][T19302] jbd2_journal_add_journal_head+0x98/0x5e0 [ 542.962560][T19302] jbd2_journal_get_create_access+0x58/0x3ac [ 542.962567][T19302] __ext4_journal_get_create_access+0xf8/0x37c [ 542.962574][T19302] ext4_getblk+0x3d8/0x6c4 [ 542.962579][T19302] ext4_bread+0x3c/0x1b0 [ 542.962584][T19302] ext4_append+0x238/0x474 [ 542.962590][T19302] ext4_init_new_dir+0x100/0x1a8 [ 542.962595][T19302] ext4_mkdir+0x3bc/0xa28 [ 542.962601][T19302] vfs_mkdir+0x284/0x424 [ 542.962608][T19302] do_mkdirat+0x1f8/0x4c8 [ 542.962615][T19302] __arm64_sys_mkdirat+0x8c/0xa4 [ 542.962622][T19302] invoke_syscall+0x98/0x2b8 [ 542.962627][T19302] el0_svc_common+0x130/0x23c [ 542.962632][T19302] do_el0_svc+0x48/0x58 [ 542.962637][T19302] el0_svc+0x58/0x180 [ 542.962644][T19302] el0t_64_sync_handler+0x84/0x12c [ 542.962649][T19302] el0t_64_sync+0x198/0x19c [ 543.051180][T19304] loop0: detected capacity change from 0 to 32768 [ 543.052725][T19304] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 543.054708][T19304] FAULT_INJECTION: forcing a failure. [ 543.054708][T19304] name failslab, interval 1, probability 0, space 0, times 0 [ 543.054745][T19304] CPU: 0 UID: 0 PID: 19304 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 543.054757][T19304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 543.054765][T19304] Call trace: [ 543.054768][T19304] show_stack+0x2c/0x3c (C) [ 543.054782][T19304] __dump_stack+0x30/0x40 [ 543.054789][T19304] dump_stack_lvl+0xd8/0x12c [ 543.054794][T19304] dump_stack+0x1c/0x28 [ 543.054799][T19304] should_fail_ex+0x41c/0x594 [ 543.054807][T19304] should_failslab+0xc0/0x128 [ 543.054814][T19304] kmem_cache_alloc_noprof+0x80/0x3e8 [ 543.054822][T19304] __es_insert_extent+0x52c/0x1234 [ 543.054829][T19304] ext4_es_insert_extent+0x54c/0x2910 [ 543.054836][T19304] ext4_map_blocks+0x970/0x14a8 [ 543.054841][T19304] ext4_getblk+0x170/0x6c4 [ 543.054846][T19304] ext4_bread+0x3c/0x1b0 [ 543.054852][T19304] ext4_append+0x238/0x474 [ 543.054860][T19304] ext4_init_new_dir+0x100/0x1a8 [ 543.054867][T19304] ext4_mkdir+0x3bc/0xa28 [ 543.054874][T19304] vfs_mkdir+0x284/0x424 [ 543.054882][T19304] do_mkdirat+0x1f8/0x4c8 [ 543.054889][T19304] __arm64_sys_mkdirat+0x8c/0xa4 [ 543.054896][T19304] invoke_syscall+0x98/0x2b8 [ 543.054902][T19304] el0_svc_common+0x130/0x23c [ 543.054907][T19304] do_el0_svc+0x48/0x58 [ 543.054912][T19304] el0_svc+0x58/0x180 [ 543.054919][T19304] el0t_64_sync_handler+0x84/0x12c [ 543.054925][T19304] el0t_64_sync+0x198/0x19c [ 543.134444][T19305] loop0: detected capacity change from 0 to 32768 [ 543.135583][T19305] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19305) [ 543.135935][T19305] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 543.159015][T19305] FAULT_INJECTION: forcing a failure. [ 543.159015][T19305] name failslab, interval 1, probability 0, space 0, times 0 [ 543.159049][T19305] CPU: 0 UID: 0 PID: 19305 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 543.159061][T19305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 543.159068][T19305] Call trace: [ 543.159072][T19305] show_stack+0x2c/0x3c (C) [ 543.159086][T19305] __dump_stack+0x30/0x40 [ 543.159094][T19305] dump_stack_lvl+0xd8/0x12c [ 543.159100][T19305] dump_stack+0x1c/0x28 [ 543.159105][T19305] should_fail_ex+0x41c/0x594 [ 543.159113][T19305] should_failslab+0xc0/0x128 [ 543.159123][T19305] kmem_cache_alloc_noprof+0x80/0x3e8 [ 543.159130][T19305] jbd2_journal_add_journal_head+0x98/0x5e0 [ 543.159137][T19305] jbd2_journal_get_create_access+0x58/0x3ac [ 543.159145][T19305] __ext4_journal_get_create_access+0xf8/0x37c [ 543.159152][T19305] ext4_getblk+0x3d8/0x6c4 [ 543.159158][T19305] ext4_bread+0x3c/0x1b0 [ 543.159163][T19305] ext4_append+0x238/0x474 [ 543.159168][T19305] ext4_init_new_dir+0x100/0x1a8 [ 543.159174][T19305] ext4_mkdir+0x3bc/0xa28 [ 543.159179][T19305] vfs_mkdir+0x284/0x424 [ 543.159187][T19305] do_mkdirat+0x1f8/0x4c8 [ 543.159194][T19305] __arm64_sys_mkdirat+0x8c/0xa4 [ 543.159201][T19305] invoke_syscall+0x98/0x2b8 [ 543.159207][T19305] el0_svc_common+0x130/0x23c [ 543.159212][T19305] do_el0_svc+0x48/0x58 [ 543.159217][T19305] el0_svc+0x58/0x180 [ 543.159224][T19305] el0t_64_sync_handler+0x84/0x12c [ 543.159229][T19305] el0t_64_sync+0x198/0x19c [ 543.236004][T19307] loop0: detected capacity change from 0 to 32768 [ 543.237447][T19307] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 543.239214][T19307] FAULT_INJECTION: forcing a failure. [ 543.239214][T19307] name failslab, interval 1, probability 0, space 0, times 0 [ 543.239233][T19307] CPU: 0 UID: 0 PID: 19307 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 543.239242][T19307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 543.239247][T19307] Call trace: [ 543.239250][T19307] show_stack+0x2c/0x3c (C) [ 543.239263][T19307] __dump_stack+0x30/0x40 [ 543.239270][T19307] dump_stack_lvl+0xd8/0x12c [ 543.239276][T19307] dump_stack+0x1c/0x28 [ 543.239281][T19307] should_fail_ex+0x41c/0x594 [ 543.239289][T19307] should_failslab+0xc0/0x128 [ 543.239296][T19307] kmem_cache_alloc_noprof+0x80/0x3e8 [ 543.239304][T19307] jbd2_journal_add_journal_head+0x98/0x5e0 [ 543.239311][T19307] jbd2_journal_get_create_access+0x58/0x3ac [ 543.239318][T19307] __ext4_journal_get_create_access+0xf8/0x37c [ 543.239325][T19307] ext4_getblk+0x3d8/0x6c4 [ 543.239331][T19307] ext4_bread+0x3c/0x1b0 [ 543.239336][T19307] ext4_append+0x238/0x474 [ 543.239342][T19307] ext4_init_new_dir+0x100/0x1a8 [ 543.239348][T19307] ext4_mkdir+0x3bc/0xa28 [ 543.239353][T19307] vfs_mkdir+0x284/0x424 [ 543.239367][T19307] do_mkdirat+0x1f8/0x4c8 [ 543.239376][T19307] __arm64_sys_mkdirat+0x8c/0xa4 [ 543.239386][T19307] invoke_syscall+0x98/0x2b8 [ 543.239392][T19307] el0_svc_common+0x130/0x23c [ 543.239397][T19307] do_el0_svc+0x48/0x58 [ 543.239403][T19307] el0_svc+0x58/0x180 [ 543.239409][T19307] el0t_64_sync_handler+0x84/0x12c [ 543.239416][T19307] el0t_64_sync+0x198/0x19c [ 543.317918][T19308] loop0: detected capacity change from 0 to 32768 [ 543.320576][T19308] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19308) [ 543.320667][T19308] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 543.345617][T19308] FAULT_INJECTION: forcing a failure. [ 543.345617][T19308] name failslab, interval 1, probability 0, space 0, times 0 [ 543.347578][T19308] CPU: 1 UID: 0 PID: 19308 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 543.347600][T19308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 543.347606][T19308] Call trace: [ 543.347610][T19308] show_stack+0x2c/0x3c (C) [ 543.347626][T19308] __dump_stack+0x30/0x40 [ 543.347634][T19308] dump_stack_lvl+0xd8/0x12c [ 543.347640][T19308] dump_stack+0x1c/0x28 [ 543.347645][T19308] should_fail_ex+0x41c/0x594 [ 543.347653][T19308] should_failslab+0xc0/0x128 [ 543.347661][T19308] kmem_cache_alloc_noprof+0x80/0x3e8 [ 543.347668][T19308] jbd2_journal_add_journal_head+0x98/0x5e0 [ 543.347675][T19308] jbd2_journal_get_create_access+0x58/0x3ac [ 543.347682][T19308] __ext4_journal_get_create_access+0xf8/0x37c [ 543.347689][T19308] ext4_getblk+0x3d8/0x6c4 [ 543.347694][T19308] ext4_bread+0x3c/0x1b0 [ 543.347699][T19308] ext4_append+0x238/0x474 [ 543.347705][T19308] ext4_init_new_dir+0x100/0x1a8 [ 543.347710][T19308] ext4_mkdir+0x3bc/0xa28 [ 543.347716][T19308] vfs_mkdir+0x284/0x424 [ 543.347723][T19308] do_mkdirat+0x1f8/0x4c8 [ 543.347730][T19308] __arm64_sys_mkdirat+0x8c/0xa4 [ 543.347737][T19308] invoke_syscall+0x98/0x2b8 [ 543.347742][T19308] el0_svc_common+0x130/0x23c [ 543.347747][T19308] do_el0_svc+0x48/0x58 [ 543.347753][T19308] el0_svc+0x58/0x180 [ 543.347759][T19308] el0t_64_sync_handler+0x84/0x12c [ 543.347765][T19308] el0t_64_sync+0x198/0x19c [ 543.423711][T19310] loop0: detected capacity change from 0 to 32768 [ 543.427179][T19310] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 543.427697][T19310] FAULT_INJECTION: forcing a failure. [ 543.427697][T19310] name failslab, interval 1, probability 0, space 0, times 0 [ 543.427710][T19310] CPU: 1 UID: 0 PID: 19310 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 543.427718][T19310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 543.427722][T19310] Call trace: [ 543.427725][T19310] show_stack+0x2c/0x3c (C) [ 543.427737][T19310] __dump_stack+0x30/0x40 [ 543.427744][T19310] dump_stack_lvl+0xd8/0x12c [ 543.427749][T19310] dump_stack+0x1c/0x28 [ 543.427754][T19310] should_fail_ex+0x41c/0x594 [ 543.427761][T19310] should_failslab+0xc0/0x128 [ 543.427769][T19310] kmem_cache_alloc_noprof+0x80/0x3e8 [ 543.427776][T19310] jbd2_journal_add_journal_head+0x98/0x5e0 [ 543.427783][T19310] jbd2_journal_get_create_access+0x58/0x3ac [ 543.427790][T19310] __ext4_journal_get_create_access+0xf8/0x37c [ 543.427797][T19310] ext4_getblk+0x3d8/0x6c4 [ 543.427802][T19310] ext4_bread+0x3c/0x1b0 [ 543.427807][T19310] ext4_append+0x238/0x474 [ 543.427813][T19310] ext4_init_new_dir+0x100/0x1a8 [ 543.427818][T19310] ext4_mkdir+0x3bc/0xa28 [ 543.427823][T19310] vfs_mkdir+0x284/0x424 [ 543.427830][T19310] do_mkdirat+0x1f8/0x4c8 [ 543.427837][T19310] __arm64_sys_mkdirat+0x8c/0xa4 [ 543.427844][T19310] invoke_syscall+0x98/0x2b8 [ 543.427850][T19310] el0_svc_common+0x130/0x23c [ 543.427855][T19310] do_el0_svc+0x48/0x58 [ 543.427860][T19310] el0_svc+0x58/0x180 [ 543.427867][T19310] el0t_64_sync_handler+0x84/0x12c [ 543.427872][T19310] el0t_64_sync+0x198/0x19c [ 543.514685][T19311] loop0: detected capacity change from 0 to 32768 [ 543.517117][T19311] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19311) [ 543.517425][T19311] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 543.517923][T19311] FAULT_INJECTION: forcing a failure. [ 543.517923][T19311] name failslab, interval 1, probability 0, space 0, times 0 [ 543.517935][T19311] CPU: 1 UID: 0 PID: 19311 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 543.517943][T19311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 543.517947][T19311] Call trace: [ 543.517950][T19311] show_stack+0x2c/0x3c (C) [ 543.517962][T19311] __dump_stack+0x30/0x40 [ 543.517968][T19311] dump_stack_lvl+0xd8/0x12c [ 543.517973][T19311] dump_stack+0x1c/0x28 [ 543.517978][T19311] should_fail_ex+0x41c/0x594 [ 543.517986][T19311] should_failslab+0xc0/0x128 [ 543.517993][T19311] kmem_cache_alloc_noprof+0x80/0x3e8 [ 543.518001][T19311] jbd2_journal_add_journal_head+0x98/0x5e0 [ 543.518008][T19311] jbd2_journal_get_create_access+0x58/0x3ac [ 543.518015][T19311] __ext4_journal_get_create_access+0xf8/0x37c [ 543.518022][T19311] ext4_getblk+0x3d8/0x6c4 [ 543.518027][T19311] ext4_bread+0x3c/0x1b0 [ 543.518032][T19311] ext4_append+0x238/0x474 [ 543.518038][T19311] ext4_init_new_dir+0x100/0x1a8 [ 543.518043][T19311] ext4_mkdir+0x3bc/0xa28 [ 543.518048][T19311] vfs_mkdir+0x284/0x424 [ 543.518055][T19311] do_mkdirat+0x1f8/0x4c8 [ 543.518062][T19311] __arm64_sys_mkdirat+0x8c/0xa4 [ 543.518069][T19311] invoke_syscall+0x98/0x2b8 [ 543.518075][T19311] el0_svc_common+0x130/0x23c [ 543.518080][T19311] do_el0_svc+0x48/0x58 [ 543.518085][T19311] el0_svc+0x58/0x180 [ 543.518092][T19311] el0t_64_sync_handler+0x84/0x12c [ 543.518097][T19311] el0t_64_sync+0x198/0x19c [ 543.600307][T19313] loop0: detected capacity change from 0 to 32768 [ 543.602496][T19313] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19313) [ 543.603793][T19313] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 543.623124][T19313] FAULT_INJECTION: forcing a failure. [ 543.623124][T19313] name failslab, interval 1, probability 0, space 0, times 0 [ 543.623158][T19313] CPU: 1 UID: 0 PID: 19313 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 543.623169][T19313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 543.623176][T19313] Call trace: [ 543.623180][T19313] show_stack+0x2c/0x3c (C) [ 543.623195][T19313] __dump_stack+0x30/0x40 [ 543.623203][T19313] dump_stack_lvl+0xd8/0x12c [ 543.623208][T19313] dump_stack+0x1c/0x28 [ 543.623214][T19313] should_fail_ex+0x41c/0x594 [ 543.623221][T19313] should_failslab+0xc0/0x128 [ 543.623228][T19313] kmem_cache_alloc_noprof+0x80/0x3e8 [ 543.623236][T19313] jbd2_journal_add_journal_head+0x98/0x5e0 [ 543.623243][T19313] jbd2_journal_get_create_access+0x58/0x3ac [ 543.623250][T19313] __ext4_journal_get_create_access+0xf8/0x37c [ 543.623257][T19313] ext4_getblk+0x3d8/0x6c4 [ 543.623263][T19313] ext4_bread+0x3c/0x1b0 [ 543.623268][T19313] ext4_append+0x238/0x474 [ 543.623273][T19313] ext4_init_new_dir+0x100/0x1a8 [ 543.623279][T19313] ext4_mkdir+0x3bc/0xa28 [ 543.623284][T19313] vfs_mkdir+0x284/0x424 [ 543.623291][T19313] do_mkdirat+0x1f8/0x4c8 [ 543.623298][T19313] __arm64_sys_mkdirat+0x8c/0xa4 [ 543.623305][T19313] invoke_syscall+0x98/0x2b8 [ 543.623311][T19313] el0_svc_common+0x130/0x23c [ 543.623316][T19313] do_el0_svc+0x48/0x58 [ 543.623321][T19313] el0_svc+0x58/0x180 [ 543.623328][T19313] el0t_64_sync_handler+0x84/0x12c [ 543.623334][T19313] el0t_64_sync+0x198/0x19c [ 543.716999][T19315] loop0: detected capacity change from 0 to 32768 [ 543.718248][T19315] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 543.743897][T19315] FAULT_INJECTION: forcing a failure. [ 543.743897][T19315] name failslab, interval 1, probability 0, space 0, times 0 [ 543.743929][T19315] CPU: 0 UID: 0 PID: 19315 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 543.743940][T19315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 543.743947][T19315] Call trace: [ 543.743950][T19315] show_stack+0x2c/0x3c (C) [ 543.743962][T19315] __dump_stack+0x30/0x40 [ 543.743969][T19315] dump_stack_lvl+0xd8/0x12c [ 543.743974][T19315] dump_stack+0x1c/0x28 [ 543.743979][T19315] should_fail_ex+0x41c/0x594 [ 543.743987][T19315] should_failslab+0xc0/0x128 [ 543.743994][T19315] kmem_cache_alloc_noprof+0x80/0x3e8 [ 543.744002][T19315] jbd2_journal_add_journal_head+0x98/0x5e0 [ 543.744009][T19315] jbd2_journal_get_create_access+0x58/0x3ac [ 543.744016][T19315] __ext4_journal_get_create_access+0xf8/0x37c [ 543.744023][T19315] ext4_getblk+0x3d8/0x6c4 [ 543.744028][T19315] ext4_bread+0x3c/0x1b0 [ 543.744034][T19315] ext4_append+0x238/0x474 [ 543.744039][T19315] ext4_init_new_dir+0x100/0x1a8 [ 543.744045][T19315] ext4_mkdir+0x3bc/0xa28 [ 543.744050][T19315] vfs_mkdir+0x284/0x424 [ 543.744057][T19315] do_mkdirat+0x1f8/0x4c8 [ 543.744064][T19315] __arm64_sys_mkdirat+0x8c/0xa4 [ 543.744071][T19315] invoke_syscall+0x98/0x2b8 [ 543.744077][T19315] el0_svc_common+0x130/0x23c [ 543.744082][T19315] do_el0_svc+0x48/0x58 [ 543.744087][T19315] el0_svc+0x58/0x180 [ 543.744094][T19315] el0t_64_sync_handler+0x84/0x12c [ 543.744100][T19315] el0t_64_sync+0x198/0x19c [ 543.818444][T19316] loop0: detected capacity change from 0 to 32768 [ 543.820111][T19316] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 543.837422][T19316] FAULT_INJECTION: forcing a failure. [ 543.837422][T19316] name failslab, interval 1, probability 0, space 0, times 0 [ 543.837455][T19316] CPU: 1 UID: 0 PID: 19316 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 543.837466][T19316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 543.837473][T19316] Call trace: [ 543.837476][T19316] show_stack+0x2c/0x3c (C) [ 543.837488][T19316] __dump_stack+0x30/0x40 [ 543.837495][T19316] dump_stack_lvl+0xd8/0x12c [ 543.837500][T19316] dump_stack+0x1c/0x28 [ 543.837505][T19316] should_fail_ex+0x41c/0x594 [ 543.837513][T19316] should_failslab+0xc0/0x128 [ 543.837521][T19316] kmem_cache_alloc_noprof+0x80/0x3e8 [ 543.837528][T19316] jbd2_journal_add_journal_head+0x98/0x5e0 [ 543.837535][T19316] jbd2_journal_get_create_access+0x58/0x3ac [ 543.837542][T19316] __ext4_journal_get_create_access+0xf8/0x37c [ 543.837549][T19316] ext4_getblk+0x3d8/0x6c4 [ 543.837555][T19316] ext4_bread+0x3c/0x1b0 [ 543.837560][T19316] ext4_append+0x238/0x474 [ 543.837565][T19316] ext4_init_new_dir+0x100/0x1a8 [ 543.837570][T19316] ext4_mkdir+0x3bc/0xa28 [ 543.837575][T19316] vfs_mkdir+0x284/0x424 [ 543.837583][T19316] do_mkdirat+0x1f8/0x4c8 [ 543.837590][T19316] __arm64_sys_mkdirat+0x8c/0xa4 [ 543.837597][T19316] invoke_syscall+0x98/0x2b8 [ 543.837602][T19316] el0_svc_common+0x130/0x23c [ 543.837607][T19316] do_el0_svc+0x48/0x58 [ 543.837612][T19316] el0_svc+0x58/0x180 [ 543.837619][T19316] el0t_64_sync_handler+0x84/0x12c [ 543.837625][T19316] el0t_64_sync+0x198/0x19c [ 543.918640][T19317] loop0: detected capacity change from 0 to 32768 [ 543.920747][T19317] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 543.922813][T19317] FAULT_INJECTION: forcing a failure. [ 543.922813][T19317] name failslab, interval 1, probability 0, space 0, times 0 [ 543.924911][T19317] CPU: 0 UID: 0 PID: 19317 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 543.924937][T19317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 543.924943][T19317] Call trace: [ 543.924947][T19317] show_stack+0x2c/0x3c (C) [ 543.924964][T19317] __dump_stack+0x30/0x40 [ 543.924974][T19317] dump_stack_lvl+0xd8/0x12c [ 543.924981][T19317] dump_stack+0x1c/0x28 [ 543.924987][T19317] should_fail_ex+0x41c/0x594 [ 543.924996][T19317] should_failslab+0xc0/0x128 [ 543.925003][T19317] kmem_cache_alloc_noprof+0x80/0x3e8 [ 543.925011][T19317] jbd2_journal_add_journal_head+0x98/0x5e0 [ 543.925018][T19317] jbd2_journal_get_create_access+0x58/0x3ac [ 543.925026][T19317] __ext4_journal_get_create_access+0xf8/0x37c [ 543.925034][T19317] ext4_getblk+0x3d8/0x6c4 [ 543.925040][T19317] ext4_bread+0x3c/0x1b0 [ 543.925046][T19317] ext4_append+0x238/0x474 [ 543.925051][T19317] ext4_init_new_dir+0x100/0x1a8 [ 543.925057][T19317] ext4_mkdir+0x3bc/0xa28 [ 543.925062][T19317] vfs_mkdir+0x284/0x424 [ 543.925069][T19317] do_mkdirat+0x1f8/0x4c8 [ 543.925077][T19317] __arm64_sys_mkdirat+0x8c/0xa4 [ 543.925084][T19317] invoke_syscall+0x98/0x2b8 [ 543.925090][T19317] el0_svc_common+0x130/0x23c [ 543.925095][T19317] do_el0_svc+0x48/0x58 [ 543.925100][T19317] el0_svc+0x58/0x180 [ 543.925107][T19317] el0t_64_sync_handler+0x84/0x12c [ 543.925113][T19317] el0t_64_sync+0x198/0x19c [ 544.007698][T19318] loop0: detected capacity change from 0 to 32768 [ 544.009751][T19318] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19318) [ 544.011974][T19318] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 544.013872][T19318] FAULT_INJECTION: forcing a failure. [ 544.013872][T19318] name failslab, interval 1, probability 0, space 0, times 0 [ 544.015971][T19318] CPU: 1 UID: 0 PID: 19318 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 544.015994][T19318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 544.015999][T19318] Call trace: [ 544.016003][T19318] show_stack+0x2c/0x3c (C) [ 544.016019][T19318] __dump_stack+0x30/0x40 [ 544.016029][T19318] dump_stack_lvl+0xd8/0x12c [ 544.016037][T19318] dump_stack+0x1c/0x28 [ 544.016043][T19318] should_fail_ex+0x41c/0x594 [ 544.016052][T19318] should_failslab+0xc0/0x128 [ 544.016059][T19318] kmem_cache_alloc_noprof+0x80/0x3e8 [ 544.016067][T19318] jbd2_journal_add_journal_head+0x98/0x5e0 [ 544.016074][T19318] jbd2_journal_get_create_access+0x58/0x3ac [ 544.016081][T19318] __ext4_journal_get_create_access+0xf8/0x37c [ 544.016088][T19318] ext4_getblk+0x3d8/0x6c4 [ 544.016094][T19318] ext4_bread+0x3c/0x1b0 [ 544.016099][T19318] ext4_append+0x238/0x474 [ 544.016105][T19318] ext4_init_new_dir+0x100/0x1a8 [ 544.016110][T19318] ext4_mkdir+0x3bc/0xa28 [ 544.016115][T19318] vfs_mkdir+0x284/0x424 [ 544.016122][T19318] do_mkdirat+0x1f8/0x4c8 [ 544.016129][T19318] __arm64_sys_mkdirat+0x8c/0xa4 [ 544.016136][T19318] invoke_syscall+0x98/0x2b8 [ 544.016141][T19318] el0_svc_common+0x130/0x23c [ 544.016146][T19318] do_el0_svc+0x48/0x58 [ 544.016151][T19318] el0_svc+0x58/0x180 [ 544.016158][T19318] el0t_64_sync_handler+0x84/0x12c [ 544.016163][T19318] el0t_64_sync+0x198/0x19c [ 544.104348][T19321] loop0: detected capacity change from 0 to 32768 [ 544.106234][T19321] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19321) [ 544.106340][T19321] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 544.106781][T19321] FAULT_INJECTION: forcing a failure. [ 544.106781][T19321] name failslab, interval 1, probability 0, space 0, times 0 [ 544.106799][T19321] CPU: 1 UID: 0 PID: 19321 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 544.106809][T19321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 544.106815][T19321] Call trace: [ 544.106819][T19321] show_stack+0x2c/0x3c (C) [ 544.106833][T19321] __dump_stack+0x30/0x40 [ 544.106842][T19321] dump_stack_lvl+0xd8/0x12c [ 544.106847][T19321] dump_stack+0x1c/0x28 [ 544.106852][T19321] should_fail_ex+0x41c/0x594 [ 544.106860][T19321] should_failslab+0xc0/0x128 [ 544.106867][T19321] kmem_cache_alloc_noprof+0x80/0x3e8 [ 544.106874][T19321] jbd2_journal_add_journal_head+0x98/0x5e0 [ 544.106881][T19321] jbd2_journal_get_create_access+0x58/0x3ac [ 544.106888][T19321] __ext4_journal_get_create_access+0xf8/0x37c [ 544.106895][T19321] ext4_getblk+0x3d8/0x6c4 [ 544.106900][T19321] ext4_bread+0x3c/0x1b0 [ 544.106905][T19321] ext4_append+0x238/0x474 [ 544.106910][T19321] ext4_init_new_dir+0x100/0x1a8 [ 544.106916][T19321] ext4_mkdir+0x3bc/0xa28 [ 544.106921][T19321] vfs_mkdir+0x284/0x424 [ 544.106928][T19321] do_mkdirat+0x1f8/0x4c8 [ 544.106934][T19321] __arm64_sys_mkdirat+0x8c/0xa4 [ 544.106941][T19321] invoke_syscall+0x98/0x2b8 [ 544.106947][T19321] el0_svc_common+0x130/0x23c [ 544.106952][T19321] do_el0_svc+0x48/0x58 [ 544.106957][T19321] el0_svc+0x58/0x180 [ 544.106963][T19321] el0t_64_sync_handler+0x84/0x12c [ 544.106969][T19321] el0t_64_sync+0x198/0x19c [ 544.200762][T19323] loop0: detected capacity change from 0 to 32768 [ 544.203023][T19323] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19323) [ 544.213827][T19323] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 544.215839][T19323] FAULT_INJECTION: forcing a failure. [ 544.215839][T19323] name failslab, interval 1, probability 0, space 0, times 0 [ 544.218092][T19323] CPU: 1 UID: 0 PID: 19323 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 544.218111][T19323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 544.218117][T19323] Call trace: [ 544.218121][T19323] show_stack+0x2c/0x3c (C) [ 544.218137][T19323] __dump_stack+0x30/0x40 [ 544.218147][T19323] dump_stack_lvl+0xd8/0x12c [ 544.218155][T19323] dump_stack+0x1c/0x28 [ 544.218162][T19323] should_fail_ex+0x41c/0x594 [ 544.218170][T19323] should_failslab+0xc0/0x128 [ 544.218177][T19323] kmem_cache_alloc_noprof+0x80/0x3e8 [ 544.218185][T19323] jbd2_journal_add_journal_head+0x98/0x5e0 [ 544.218193][T19323] jbd2_journal_get_create_access+0x58/0x3ac [ 544.218200][T19323] __ext4_journal_get_create_access+0xf8/0x37c [ 544.218207][T19323] ext4_getblk+0x3d8/0x6c4 [ 544.218213][T19323] ext4_bread+0x3c/0x1b0 [ 544.218218][T19323] ext4_append+0x238/0x474 [ 544.218224][T19323] ext4_init_new_dir+0x100/0x1a8 [ 544.218229][T19323] ext4_mkdir+0x3bc/0xa28 [ 544.218234][T19323] vfs_mkdir+0x284/0x424 [ 544.218242][T19323] do_mkdirat+0x1f8/0x4c8 [ 544.218248][T19323] __arm64_sys_mkdirat+0x8c/0xa4 [ 544.218255][T19323] invoke_syscall+0x98/0x2b8 [ 544.218261][T19323] el0_svc_common+0x130/0x23c [ 544.218266][T19323] do_el0_svc+0x48/0x58 [ 544.218271][T19323] el0_svc+0x58/0x180 [ 544.218278][T19323] el0t_64_sync_handler+0x84/0x12c [ 544.218284][T19323] el0t_64_sync+0x198/0x19c [ 544.308816][T19325] loop0: detected capacity change from 0 to 32768 [ 544.310393][T19325] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19325) [ 544.310509][T19325] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 544.331793][T19325] FAULT_INJECTION: forcing a failure. [ 544.331793][T19325] name failslab, interval 1, probability 0, space 0, times 0 [ 544.331819][T19325] CPU: 0 UID: 0 PID: 19325 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 544.331828][T19325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 544.331834][T19325] Call trace: [ 544.331838][T19325] show_stack+0x2c/0x3c (C) [ 544.331850][T19325] __dump_stack+0x30/0x40 [ 544.331857][T19325] dump_stack_lvl+0xd8/0x12c [ 544.331862][T19325] dump_stack+0x1c/0x28 [ 544.331867][T19325] should_fail_ex+0x41c/0x594 [ 544.331875][T19325] should_failslab+0xc0/0x128 [ 544.331882][T19325] kmem_cache_alloc_noprof+0x80/0x3e8 [ 544.331889][T19325] jbd2_journal_add_journal_head+0x98/0x5e0 [ 544.331896][T19325] jbd2_journal_get_create_access+0x58/0x3ac [ 544.331903][T19325] __ext4_journal_get_create_access+0xf8/0x37c [ 544.331910][T19325] ext4_getblk+0x3d8/0x6c4 [ 544.331916][T19325] ext4_bread+0x3c/0x1b0 [ 544.331921][T19325] ext4_append+0x238/0x474 [ 544.331926][T19325] ext4_init_new_dir+0x100/0x1a8 [ 544.331931][T19325] ext4_mkdir+0x3bc/0xa28 [ 544.331936][T19325] vfs_mkdir+0x284/0x424 [ 544.331944][T19325] do_mkdirat+0x1f8/0x4c8 [ 544.331950][T19325] __arm64_sys_mkdirat+0x8c/0xa4 [ 544.331957][T19325] invoke_syscall+0x98/0x2b8 [ 544.331963][T19325] el0_svc_common+0x130/0x23c [ 544.331968][T19325] do_el0_svc+0x48/0x58 [ 544.331972][T19325] el0_svc+0x58/0x180 [ 544.331979][T19325] el0t_64_sync_handler+0x84/0x12c [ 544.331985][T19325] el0t_64_sync+0x198/0x19c [ 544.409525][T19326] loop0: detected capacity change from 0 to 32768 [ 544.410973][T19326] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 544.413018][T19326] FAULT_INJECTION: forcing a failure. [ 544.413018][T19326] name failslab, interval 1, probability 0, space 0, times 0 [ 544.413064][T19326] CPU: 1 UID: 0 PID: 19326 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 544.413075][T19326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 544.413082][T19326] Call trace: [ 544.413085][T19326] show_stack+0x2c/0x3c (C) [ 544.413098][T19326] __dump_stack+0x30/0x40 [ 544.413105][T19326] dump_stack_lvl+0xd8/0x12c [ 544.413111][T19326] dump_stack+0x1c/0x28 [ 544.413116][T19326] should_fail_ex+0x41c/0x594 [ 544.413123][T19326] should_failslab+0xc0/0x128 [ 544.413131][T19326] kmem_cache_alloc_noprof+0x80/0x3e8 [ 544.413138][T19326] jbd2_journal_add_journal_head+0x98/0x5e0 [ 544.413145][T19326] jbd2_journal_get_create_access+0x58/0x3ac [ 544.413152][T19326] __ext4_journal_get_create_access+0xf8/0x37c [ 544.413159][T19326] ext4_getblk+0x3d8/0x6c4 [ 544.413165][T19326] ext4_bread+0x3c/0x1b0 [ 544.413170][T19326] ext4_append+0x238/0x474 [ 544.413175][T19326] ext4_init_new_dir+0x100/0x1a8 [ 544.413181][T19326] ext4_mkdir+0x3bc/0xa28 [ 544.413186][T19326] vfs_mkdir+0x284/0x424 [ 544.413193][T19326] do_mkdirat+0x1f8/0x4c8 [ 544.413200][T19326] __arm64_sys_mkdirat+0x8c/0xa4 [ 544.413207][T19326] invoke_syscall+0x98/0x2b8 [ 544.413212][T19326] el0_svc_common+0x130/0x23c [ 544.413217][T19326] do_el0_svc+0x48/0x58 [ 544.413222][T19326] el0_svc+0x58/0x180 [ 544.413229][T19326] el0t_64_sync_handler+0x84/0x12c [ 544.413235][T19326] el0t_64_sync+0x198/0x19c [ 544.504374][T19327] FAULT_INJECTION: forcing a failure. [ 544.504374][T19327] name failslab, interval 1, probability 0, space 0, times 0 [ 544.504418][T19327] CPU: 1 UID: 0 PID: 19327 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 544.504432][T19327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 544.504437][T19327] Call trace: [ 544.504440][T19327] show_stack+0x2c/0x3c (C) [ 544.504452][T19327] __dump_stack+0x30/0x40 [ 544.504459][T19327] dump_stack_lvl+0xd8/0x12c [ 544.504464][T19327] dump_stack+0x1c/0x28 [ 544.504469][T19327] should_fail_ex+0x41c/0x594 [ 544.504477][T19327] should_failslab+0xc0/0x128 [ 544.504484][T19327] kmem_cache_alloc_noprof+0x80/0x3e8 [ 544.504491][T19327] jbd2_journal_add_journal_head+0x98/0x5e0 [ 544.504498][T19327] jbd2_journal_get_create_access+0x58/0x3ac [ 544.504505][T19327] __ext4_journal_get_create_access+0xf8/0x37c [ 544.504512][T19327] ext4_getblk+0x3d8/0x6c4 [ 544.504518][T19327] ext4_bread+0x3c/0x1b0 [ 544.504523][T19327] ext4_append+0x238/0x474 [ 544.504528][T19327] ext4_init_new_dir+0x100/0x1a8 [ 544.504534][T19327] ext4_mkdir+0x3bc/0xa28 [ 544.504539][T19327] vfs_mkdir+0x284/0x424 [ 544.504546][T19327] do_mkdirat+0x1f8/0x4c8 [ 544.504553][T19327] __arm64_sys_mkdirat+0x8c/0xa4 [ 544.504560][T19327] invoke_syscall+0x98/0x2b8 [ 544.504565][T19327] el0_svc_common+0x130/0x23c [ 544.504570][T19327] do_el0_svc+0x48/0x58 [ 544.504575][T19327] el0_svc+0x58/0x180 [ 544.504582][T19327] el0t_64_sync_handler+0x84/0x12c [ 544.504588][T19327] el0t_64_sync+0x198/0x19c [ 544.586163][T19329] loop0: detected capacity change from 0 to 32768 [ 544.588855][T19329] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19329) [ 544.589448][T19329] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 544.589969][T19329] FAULT_INJECTION: forcing a failure. [ 544.589969][T19329] name failslab, interval 1, probability 0, space 0, times 0 [ 544.589983][T19329] CPU: 1 UID: 0 PID: 19329 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 544.589990][T19329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 544.589994][T19329] Call trace: [ 544.589997][T19329] show_stack+0x2c/0x3c (C) [ 544.590009][T19329] __dump_stack+0x30/0x40 [ 544.590015][T19329] dump_stack_lvl+0xd8/0x12c [ 544.590020][T19329] dump_stack+0x1c/0x28 [ 544.590025][T19329] should_fail_ex+0x41c/0x594 [ 544.590033][T19329] should_failslab+0xc0/0x128 [ 544.590040][T19329] kmem_cache_alloc_noprof+0x80/0x3e8 [ 544.590047][T19329] jbd2_journal_add_journal_head+0x98/0x5e0 [ 544.590054][T19329] jbd2_journal_get_create_access+0x58/0x3ac [ 544.590061][T19329] __ext4_journal_get_create_access+0xf8/0x37c [ 544.590068][T19329] ext4_getblk+0x3d8/0x6c4 [ 544.590073][T19329] ext4_bread+0x3c/0x1b0 [ 544.590079][T19329] ext4_append+0x238/0x474 [ 544.590084][T19329] ext4_init_new_dir+0x100/0x1a8 [ 544.590089][T19329] ext4_mkdir+0x3bc/0xa28 [ 544.590094][T19329] vfs_mkdir+0x284/0x424 [ 544.590102][T19329] do_mkdirat+0x1f8/0x4c8 [ 544.590108][T19329] __arm64_sys_mkdirat+0x8c/0xa4 [ 544.590115][T19329] invoke_syscall+0x98/0x2b8 [ 544.590121][T19329] el0_svc_common+0x130/0x23c [ 544.590126][T19329] do_el0_svc+0x48/0x58 [ 544.590131][T19329] el0_svc+0x58/0x180 [ 544.590138][T19329] el0t_64_sync_handler+0x84/0x12c [ 544.590143][T19329] el0t_64_sync+0x198/0x19c [ 544.672415][T19330] loop0: detected capacity change from 0 to 32768 [ 544.674273][T19330] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19330) [ 544.674399][T19330] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 544.695439][T19330] FAULT_INJECTION: forcing a failure. [ 544.695439][T19330] name failslab, interval 1, probability 0, space 0, times 0 [ 544.697493][T19330] CPU: 0 UID: 0 PID: 19330 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 544.697514][T19330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 544.697520][T19330] Call trace: [ 544.697524][T19330] show_stack+0x2c/0x3c (C) [ 544.697540][T19330] __dump_stack+0x30/0x40 [ 544.697548][T19330] dump_stack_lvl+0xd8/0x12c [ 544.697554][T19330] dump_stack+0x1c/0x28 [ 544.697560][T19330] should_fail_ex+0x41c/0x594 [ 544.697568][T19330] should_failslab+0xc0/0x128 [ 544.697575][T19330] kmem_cache_alloc_noprof+0x80/0x3e8 [ 544.697583][T19330] jbd2_journal_add_journal_head+0x98/0x5e0 [ 544.697590][T19330] jbd2_journal_get_create_access+0x58/0x3ac [ 544.697598][T19330] __ext4_journal_get_create_access+0xf8/0x37c [ 544.697605][T19330] ext4_getblk+0x3d8/0x6c4 [ 544.697610][T19330] ext4_bread+0x3c/0x1b0 [ 544.697616][T19330] ext4_append+0x238/0x474 [ 544.697621][T19330] ext4_init_new_dir+0x100/0x1a8 [ 544.697627][T19330] ext4_mkdir+0x3bc/0xa28 [ 544.697632][T19330] vfs_mkdir+0x284/0x424 [ 544.697640][T19330] do_mkdirat+0x1f8/0x4c8 [ 544.697646][T19330] __arm64_sys_mkdirat+0x8c/0xa4 [ 544.697654][T19330] invoke_syscall+0x98/0x2b8 [ 544.697659][T19330] el0_svc_common+0x130/0x23c [ 544.697664][T19330] do_el0_svc+0x48/0x58 [ 544.697669][T19330] el0_svc+0x58/0x180 [ 544.697676][T19330] el0t_64_sync_handler+0x84/0x12c [ 544.697682][T19330] el0t_64_sync+0x198/0x19c [ 544.789283][T19332] loop0: detected capacity change from 0 to 32768 [ 544.792257][T19332] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 544.792768][T19332] FAULT_INJECTION: forcing a failure. [ 544.792768][T19332] name failslab, interval 1, probability 0, space 0, times 0 [ 544.792782][T19332] CPU: 1 UID: 0 PID: 19332 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 544.792790][T19332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 544.792794][T19332] Call trace: [ 544.792797][T19332] show_stack+0x2c/0x3c (C) [ 544.792810][T19332] __dump_stack+0x30/0x40 [ 544.792817][T19332] dump_stack_lvl+0xd8/0x12c [ 544.792822][T19332] dump_stack+0x1c/0x28 [ 544.792827][T19332] should_fail_ex+0x41c/0x594 [ 544.792835][T19332] should_failslab+0xc0/0x128 [ 544.792842][T19332] kmem_cache_alloc_noprof+0x80/0x3e8 [ 544.792849][T19332] jbd2_journal_add_journal_head+0x98/0x5e0 [ 544.792856][T19332] jbd2_journal_get_create_access+0x58/0x3ac [ 544.792863][T19332] __ext4_journal_get_create_access+0xf8/0x37c [ 544.792870][T19332] ext4_getblk+0x3d8/0x6c4 [ 544.792875][T19332] ext4_bread+0x3c/0x1b0 [ 544.792880][T19332] ext4_append+0x238/0x474 [ 544.792886][T19332] ext4_init_new_dir+0x100/0x1a8 [ 544.792891][T19332] ext4_mkdir+0x3bc/0xa28 [ 544.792896][T19332] vfs_mkdir+0x284/0x424 [ 544.792904][T19332] do_mkdirat+0x1f8/0x4c8 [ 544.792910][T19332] __arm64_sys_mkdirat+0x8c/0xa4 [ 544.792917][T19332] invoke_syscall+0x98/0x2b8 [ 544.792923][T19332] el0_svc_common+0x130/0x23c [ 544.792928][T19332] do_el0_svc+0x48/0x58 [ 544.792933][T19332] el0_svc+0x58/0x180 [ 544.792940][T19332] el0t_64_sync_handler+0x84/0x12c [ 544.792945][T19332] el0t_64_sync+0x198/0x19c [ 544.879076][T19333] loop0: detected capacity change from 0 to 32768 [ 544.880519][T19333] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19333) [ 544.880615][T19333] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 544.900291][T19333] FAULT_INJECTION: forcing a failure. [ 544.900291][T19333] name failslab, interval 1, probability 0, space 0, times 0 [ 544.900428][T19333] CPU: 0 UID: 0 PID: 19333 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 544.900440][T19333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 544.900447][T19333] Call trace: [ 544.900451][T19333] show_stack+0x2c/0x3c (C) [ 544.900464][T19333] __dump_stack+0x30/0x40 [ 544.900471][T19333] dump_stack_lvl+0xd8/0x12c [ 544.900476][T19333] dump_stack+0x1c/0x28 [ 544.900481][T19333] should_fail_ex+0x41c/0x594 [ 544.900489][T19333] should_failslab+0xc0/0x128 [ 544.900496][T19333] kmem_cache_alloc_noprof+0x80/0x3e8 [ 544.900504][T19333] jbd2_journal_add_journal_head+0x98/0x5e0 [ 544.900511][T19333] jbd2_journal_get_create_access+0x58/0x3ac [ 544.900519][T19333] __ext4_journal_get_create_access+0xf8/0x37c [ 544.900526][T19333] ext4_getblk+0x3d8/0x6c4 [ 544.900531][T19333] ext4_bread+0x3c/0x1b0 [ 544.900536][T19333] ext4_append+0x238/0x474 [ 544.900542][T19333] ext4_init_new_dir+0x100/0x1a8 [ 544.900547][T19333] ext4_mkdir+0x3bc/0xa28 [ 544.900553][T19333] vfs_mkdir+0x284/0x424 [ 544.900561][T19333] do_mkdirat+0x1f8/0x4c8 [ 544.900567][T19333] __arm64_sys_mkdirat+0x8c/0xa4 [ 544.900575][T19333] invoke_syscall+0x98/0x2b8 [ 544.900580][T19333] el0_svc_common+0x130/0x23c [ 544.900586][T19333] do_el0_svc+0x48/0x58 [ 544.900591][T19333] el0_svc+0x58/0x180 [ 544.900598][T19333] el0t_64_sync_handler+0x84/0x12c [ 544.900604][T19333] el0t_64_sync+0x198/0x19c [ 544.977164][T19335] loop0: detected capacity change from 0 to 32768 [ 544.980594][T19335] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 544.981100][T19335] FAULT_INJECTION: forcing a failure. [ 544.981100][T19335] name failslab, interval 1, probability 0, space 0, times 0 [ 544.981114][T19335] CPU: 0 UID: 0 PID: 19335 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 544.981122][T19335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 544.981126][T19335] Call trace: [ 544.981129][T19335] show_stack+0x2c/0x3c (C) [ 544.981142][T19335] __dump_stack+0x30/0x40 [ 544.981149][T19335] dump_stack_lvl+0xd8/0x12c [ 544.981154][T19335] dump_stack+0x1c/0x28 [ 544.981159][T19335] should_fail_ex+0x41c/0x594 [ 544.981167][T19335] should_failslab+0xc0/0x128 [ 544.981175][T19335] kmem_cache_alloc_noprof+0x80/0x3e8 [ 544.981182][T19335] jbd2_journal_add_journal_head+0x98/0x5e0 [ 544.981189][T19335] jbd2_journal_get_create_access+0x58/0x3ac [ 544.981197][T19335] __ext4_journal_get_create_access+0xf8/0x37c [ 544.981204][T19335] ext4_getblk+0x3d8/0x6c4 [ 544.981209][T19335] ext4_bread+0x3c/0x1b0 [ 544.981214][T19335] ext4_append+0x238/0x474 [ 544.981220][T19335] ext4_init_new_dir+0x100/0x1a8 [ 544.981226][T19335] ext4_mkdir+0x3bc/0xa28 [ 544.981231][T19335] vfs_mkdir+0x284/0x424 [ 544.981238][T19335] do_mkdirat+0x1f8/0x4c8 [ 544.981246][T19335] __arm64_sys_mkdirat+0x8c/0xa4 [ 544.981253][T19335] invoke_syscall+0x98/0x2b8 [ 544.981258][T19335] el0_svc_common+0x130/0x23c [ 544.981264][T19335] do_el0_svc+0x48/0x58 [ 544.981269][T19335] el0_svc+0x58/0x180 [ 544.981276][T19335] el0t_64_sync_handler+0x84/0x12c [ 544.981282][T19335] el0t_64_sync+0x198/0x19c [ 545.067033][T19337] loop0: detected capacity change from 0 to 32768 [ 545.068979][T19337] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19337) [ 545.071349][T19337] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 545.073541][T19337] FAULT_INJECTION: forcing a failure. [ 545.073541][T19337] name failslab, interval 1, probability 0, space 0, times 0 [ 545.075762][T19337] CPU: 1 UID: 0 PID: 19337 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 545.075784][T19337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 545.075791][T19337] Call trace: [ 545.075795][T19337] show_stack+0x2c/0x3c (C) [ 545.075812][T19337] __dump_stack+0x30/0x40 [ 545.075822][T19337] dump_stack_lvl+0xd8/0x12c [ 545.075830][T19337] dump_stack+0x1c/0x28 [ 545.075837][T19337] should_fail_ex+0x41c/0x594 [ 545.075847][T19337] should_failslab+0xc0/0x128 [ 545.075855][T19337] kmem_cache_alloc_noprof+0x80/0x3e8 [ 545.075863][T19337] jbd2_journal_add_journal_head+0x98/0x5e0 [ 545.075870][T19337] jbd2_journal_get_create_access+0x58/0x3ac [ 545.075878][T19337] __ext4_journal_get_create_access+0xf8/0x37c [ 545.075885][T19337] ext4_getblk+0x3d8/0x6c4 [ 545.075890][T19337] ext4_bread+0x3c/0x1b0 [ 545.075895][T19337] ext4_append+0x238/0x474 [ 545.075901][T19337] ext4_init_new_dir+0x100/0x1a8 [ 545.075906][T19337] ext4_mkdir+0x3bc/0xa28 [ 545.075912][T19337] vfs_mkdir+0x284/0x424 [ 545.075919][T19337] do_mkdirat+0x1f8/0x4c8 [ 545.075926][T19337] __arm64_sys_mkdirat+0x8c/0xa4 [ 545.075933][T19337] invoke_syscall+0x98/0x2b8 [ 545.075939][T19337] el0_svc_common+0x130/0x23c [ 545.075944][T19337] do_el0_svc+0x48/0x58 [ 545.075949][T19337] el0_svc+0x58/0x180 [ 545.075955][T19337] el0t_64_sync_handler+0x84/0x12c [ 545.075961][T19337] el0t_64_sync+0x198/0x19c [ 545.168850][T19339] loop0: detected capacity change from 0 to 32768 [ 545.170894][T19339] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19339) [ 545.173229][T19339] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 545.175195][T19339] FAULT_INJECTION: forcing a failure. [ 545.175195][T19339] name failslab, interval 1, probability 0, space 0, times 0 [ 545.176650][T19339] CPU: 0 UID: 0 PID: 19339 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 545.176675][T19339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 545.176681][T19339] Call trace: [ 545.176685][T19339] show_stack+0x2c/0x3c (C) [ 545.176702][T19339] __dump_stack+0x30/0x40 [ 545.176711][T19339] dump_stack_lvl+0xd8/0x12c [ 545.176717][T19339] dump_stack+0x1c/0x28 [ 545.176722][T19339] should_fail_ex+0x41c/0x594 [ 545.176731][T19339] should_failslab+0xc0/0x128 [ 545.176738][T19339] kmem_cache_alloc_noprof+0x80/0x3e8 [ 545.176746][T19339] jbd2_journal_add_journal_head+0x98/0x5e0 [ 545.176753][T19339] jbd2_journal_get_create_access+0x58/0x3ac [ 545.176760][T19339] __ext4_journal_get_create_access+0xf8/0x37c [ 545.176768][T19339] ext4_getblk+0x3d8/0x6c4 [ 545.176774][T19339] ext4_bread+0x3c/0x1b0 [ 545.176779][T19339] ext4_append+0x238/0x474 [ 545.176785][T19339] ext4_init_new_dir+0x100/0x1a8 [ 545.176791][T19339] ext4_mkdir+0x3bc/0xa28 [ 545.176796][T19339] vfs_mkdir+0x284/0x424 [ 545.176804][T19339] do_mkdirat+0x1f8/0x4c8 [ 545.176810][T19339] __arm64_sys_mkdirat+0x8c/0xa4 [ 545.176818][T19339] invoke_syscall+0x98/0x2b8 [ 545.176824][T19339] el0_svc_common+0x130/0x23c [ 545.176829][T19339] do_el0_svc+0x48/0x58 [ 545.176834][T19339] el0_svc+0x58/0x180 [ 545.176841][T19339] el0t_64_sync_handler+0x84/0x12c [ 545.176847][T19339] el0t_64_sync+0x198/0x19c [ 545.176856][T19339] journal_alloc_journal_head: 41 callbacks suppressed [ 545.176862][T19339] ENOMEM in journal_alloc_journal_head, retrying. [ 545.271171][T19340] loop0: detected capacity change from 0 to 32768 [ 545.273514][T19340] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19340) [ 545.273665][T19340] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 545.297139][T19340] FAULT_INJECTION: forcing a failure. [ 545.297139][T19340] name failslab, interval 1, probability 0, space 0, times 0 [ 545.298579][T19340] CPU: 0 UID: 0 PID: 19340 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 545.298600][T19340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 545.298607][T19340] Call trace: [ 545.298611][T19340] show_stack+0x2c/0x3c (C) [ 545.298629][T19340] __dump_stack+0x30/0x40 [ 545.298640][T19340] dump_stack_lvl+0xd8/0x12c [ 545.298646][T19340] dump_stack+0x1c/0x28 [ 545.298652][T19340] should_fail_ex+0x41c/0x594 [ 545.298661][T19340] should_failslab+0xc0/0x128 [ 545.298668][T19340] kmem_cache_alloc_noprof+0x80/0x3e8 [ 545.298676][T19340] jbd2_journal_add_journal_head+0x98/0x5e0 [ 545.298684][T19340] jbd2_journal_get_create_access+0x58/0x3ac [ 545.298692][T19340] __ext4_journal_get_create_access+0xf8/0x37c [ 545.298699][T19340] ext4_getblk+0x3d8/0x6c4 [ 545.298705][T19340] ext4_bread+0x3c/0x1b0 [ 545.298710][T19340] ext4_append+0x238/0x474 [ 545.298716][T19340] ext4_init_new_dir+0x100/0x1a8 [ 545.298722][T19340] ext4_mkdir+0x3bc/0xa28 [ 545.298727][T19340] vfs_mkdir+0x284/0x424 [ 545.298735][T19340] do_mkdirat+0x1f8/0x4c8 [ 545.298742][T19340] __arm64_sys_mkdirat+0x8c/0xa4 [ 545.298749][T19340] invoke_syscall+0x98/0x2b8 [ 545.298755][T19340] el0_svc_common+0x130/0x23c [ 545.298760][T19340] do_el0_svc+0x48/0x58 [ 545.298766][T19340] el0_svc+0x58/0x180 [ 545.298772][T19340] el0t_64_sync_handler+0x84/0x12c [ 545.298779][T19340] el0t_64_sync+0x198/0x19c [ 545.298789][T19340] ENOMEM in journal_alloc_journal_head, retrying. [ 545.381974][T19342] loop0: detected capacity change from 0 to 32768 [ 545.383333][T19342] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 545.384610][T19342] FAULT_INJECTION: forcing a failure. [ 545.384610][T19342] name failslab, interval 1, probability 0, space 0, times 0 [ 545.384624][T19342] CPU: 0 UID: 0 PID: 19342 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 545.384632][T19342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 545.384636][T19342] Call trace: [ 545.384639][T19342] show_stack+0x2c/0x3c (C) [ 545.384651][T19342] __dump_stack+0x30/0x40 [ 545.384658][T19342] dump_stack_lvl+0xd8/0x12c [ 545.384663][T19342] dump_stack+0x1c/0x28 [ 545.384668][T19342] should_fail_ex+0x41c/0x594 [ 545.384676][T19342] should_failslab+0xc0/0x128 [ 545.384683][T19342] kmem_cache_alloc_noprof+0x80/0x3e8 [ 545.384690][T19342] jbd2_journal_add_journal_head+0x98/0x5e0 [ 545.384698][T19342] jbd2_journal_get_create_access+0x58/0x3ac [ 545.384705][T19342] __ext4_journal_get_create_access+0xf8/0x37c [ 545.384712][T19342] ext4_getblk+0x3d8/0x6c4 [ 545.384718][T19342] ext4_bread+0x3c/0x1b0 [ 545.384723][T19342] ext4_append+0x238/0x474 [ 545.384729][T19342] ext4_init_new_dir+0x100/0x1a8 [ 545.384734][T19342] ext4_mkdir+0x3bc/0xa28 [ 545.384740][T19342] vfs_mkdir+0x284/0x424 [ 545.384747][T19342] do_mkdirat+0x1f8/0x4c8 [ 545.384754][T19342] __arm64_sys_mkdirat+0x8c/0xa4 [ 545.384761][T19342] invoke_syscall+0x98/0x2b8 [ 545.384767][T19342] el0_svc_common+0x130/0x23c [ 545.384772][T19342] do_el0_svc+0x48/0x58 [ 545.384777][T19342] el0_svc+0x58/0x180 [ 545.384784][T19342] el0t_64_sync_handler+0x84/0x12c [ 545.384790][T19342] el0t_64_sync+0x198/0x19c [ 545.384799][T19342] ENOMEM in journal_alloc_journal_head, retrying. [ 545.463814][T19343] loop0: detected capacity change from 0 to 32768 [ 545.464933][T19343] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19343) [ 545.465045][T19343] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 545.492387][T19343] FAULT_INJECTION: forcing a failure. [ 545.492387][T19343] name failslab, interval 1, probability 0, space 0, times 0 [ 545.492420][T19343] CPU: 0 UID: 0 PID: 19343 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 545.492432][T19343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 545.492438][T19343] Call trace: [ 545.492441][T19343] show_stack+0x2c/0x3c (C) [ 545.492454][T19343] __dump_stack+0x30/0x40 [ 545.492461][T19343] dump_stack_lvl+0xd8/0x12c [ 545.492466][T19343] dump_stack+0x1c/0x28 [ 545.492471][T19343] should_fail_ex+0x41c/0x594 [ 545.492479][T19343] should_failslab+0xc0/0x128 [ 545.492486][T19343] kmem_cache_alloc_noprof+0x80/0x3e8 [ 545.492493][T19343] jbd2_journal_add_journal_head+0x98/0x5e0 [ 545.492501][T19343] jbd2_journal_get_create_access+0x58/0x3ac [ 545.492508][T19343] __ext4_journal_get_create_access+0xf8/0x37c [ 545.492515][T19343] ext4_getblk+0x3d8/0x6c4 [ 545.492521][T19343] ext4_bread+0x3c/0x1b0 [ 545.492526][T19343] ext4_append+0x238/0x474 [ 545.492532][T19343] ext4_init_new_dir+0x100/0x1a8 [ 545.492537][T19343] ext4_mkdir+0x3bc/0xa28 [ 545.492543][T19343] vfs_mkdir+0x284/0x424 [ 545.492550][T19343] do_mkdirat+0x1f8/0x4c8 [ 545.492557][T19343] __arm64_sys_mkdirat+0x8c/0xa4 [ 545.492564][T19343] invoke_syscall+0x98/0x2b8 [ 545.492570][T19343] el0_svc_common+0x130/0x23c [ 545.492575][T19343] do_el0_svc+0x48/0x58 [ 545.492580][T19343] el0_svc+0x58/0x180 [ 545.492587][T19343] el0t_64_sync_handler+0x84/0x12c [ 545.492593][T19343] el0t_64_sync+0x198/0x19c [ 545.492602][T19343] ENOMEM in journal_alloc_journal_head, retrying. [ 545.565364][T19345] loop0: detected capacity change from 0 to 32768 [ 545.567584][T19345] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 545.569734][T19345] FAULT_INJECTION: forcing a failure. [ 545.569734][T19345] name failslab, interval 1, probability 0, space 0, times 0 [ 545.571748][T19345] CPU: 1 UID: 0 PID: 19345 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 545.571770][T19345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 545.571776][T19345] Call trace: [ 545.571780][T19345] show_stack+0x2c/0x3c (C) [ 545.571796][T19345] __dump_stack+0x30/0x40 [ 545.571804][T19345] dump_stack_lvl+0xd8/0x12c [ 545.571810][T19345] dump_stack+0x1c/0x28 [ 545.571815][T19345] should_fail_ex+0x41c/0x594 [ 545.571823][T19345] should_failslab+0xc0/0x128 [ 545.571830][T19345] kmem_cache_alloc_noprof+0x80/0x3e8 [ 545.571838][T19345] jbd2_journal_add_journal_head+0x98/0x5e0 [ 545.571845][T19345] jbd2_journal_get_create_access+0x58/0x3ac [ 545.571852][T19345] __ext4_journal_get_create_access+0xf8/0x37c [ 545.571859][T19345] ext4_getblk+0x3d8/0x6c4 [ 545.571864][T19345] ext4_bread+0x3c/0x1b0 [ 545.571869][T19345] ext4_append+0x238/0x474 [ 545.571875][T19345] ext4_init_new_dir+0x100/0x1a8 [ 545.571880][T19345] ext4_mkdir+0x3bc/0xa28 [ 545.571885][T19345] vfs_mkdir+0x284/0x424 [ 545.571892][T19345] do_mkdirat+0x1f8/0x4c8 [ 545.571899][T19345] __arm64_sys_mkdirat+0x8c/0xa4 [ 545.571906][T19345] invoke_syscall+0x98/0x2b8 [ 545.571911][T19345] el0_svc_common+0x130/0x23c [ 545.571916][T19345] do_el0_svc+0x48/0x58 [ 545.571921][T19345] el0_svc+0x58/0x180 [ 545.571928][T19345] el0t_64_sync_handler+0x84/0x12c [ 545.571933][T19345] el0t_64_sync+0x198/0x19c [ 545.589226][T19345] ENOMEM in journal_alloc_journal_head, retrying. [ 545.668903][T19346] loop0: detected capacity change from 0 to 32768 [ 545.670410][T19346] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19346) [ 545.670524][T19346] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 545.694421][T19346] FAULT_INJECTION: forcing a failure. [ 545.694421][T19346] name failslab, interval 1, probability 0, space 0, times 0 [ 545.694453][T19346] CPU: 0 UID: 0 PID: 19346 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 545.694464][T19346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 545.694470][T19346] Call trace: [ 545.694473][T19346] show_stack+0x2c/0x3c (C) [ 545.694487][T19346] __dump_stack+0x30/0x40 [ 545.694494][T19346] dump_stack_lvl+0xd8/0x12c [ 545.694500][T19346] dump_stack+0x1c/0x28 [ 545.694505][T19346] should_fail_ex+0x41c/0x594 [ 545.694513][T19346] should_failslab+0xc0/0x128 [ 545.694521][T19346] kmem_cache_alloc_noprof+0x80/0x3e8 [ 545.694528][T19346] jbd2_journal_add_journal_head+0x98/0x5e0 [ 545.694536][T19346] jbd2_journal_get_create_access+0x58/0x3ac [ 545.694543][T19346] __ext4_journal_get_create_access+0xf8/0x37c [ 545.694550][T19346] ext4_getblk+0x3d8/0x6c4 [ 545.694556][T19346] ext4_bread+0x3c/0x1b0 [ 545.694561][T19346] ext4_append+0x238/0x474 [ 545.694567][T19346] ext4_init_new_dir+0x100/0x1a8 [ 545.694573][T19346] ext4_mkdir+0x3bc/0xa28 [ 545.694578][T19346] vfs_mkdir+0x284/0x424 [ 545.694585][T19346] do_mkdirat+0x1f8/0x4c8 [ 545.694592][T19346] __arm64_sys_mkdirat+0x8c/0xa4 [ 545.694599][T19346] invoke_syscall+0x98/0x2b8 [ 545.694605][T19346] el0_svc_common+0x130/0x23c [ 545.694611][T19346] do_el0_svc+0x48/0x58 [ 545.694616][T19346] el0_svc+0x58/0x180 [ 545.694623][T19346] el0t_64_sync_handler+0x84/0x12c [ 545.694629][T19346] el0t_64_sync+0x198/0x19c [ 545.694638][T19346] ENOMEM in journal_alloc_journal_head, retrying. [ 545.768725][T19348] loop0: detected capacity change from 0 to 32768 [ 545.770014][T19348] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 545.793558][T19348] FAULT_INJECTION: forcing a failure. [ 545.793558][T19348] name failslab, interval 1, probability 0, space 0, times 0 [ 545.793594][T19348] CPU: 0 UID: 0 PID: 19348 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 545.793602][T19348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 545.793607][T19348] Call trace: [ 545.793609][T19348] show_stack+0x2c/0x3c (C) [ 545.793622][T19348] __dump_stack+0x30/0x40 [ 545.793628][T19348] dump_stack_lvl+0xd8/0x12c [ 545.793634][T19348] dump_stack+0x1c/0x28 [ 545.793639][T19348] should_fail_ex+0x41c/0x594 [ 545.793647][T19348] should_failslab+0xc0/0x128 [ 545.793654][T19348] kmem_cache_alloc_noprof+0x80/0x3e8 [ 545.793661][T19348] jbd2_journal_add_journal_head+0x98/0x5e0 [ 545.793668][T19348] jbd2_journal_get_create_access+0x58/0x3ac [ 545.793676][T19348] __ext4_journal_get_create_access+0xf8/0x37c [ 545.793683][T19348] ext4_getblk+0x3d8/0x6c4 [ 545.793689][T19348] ext4_bread+0x3c/0x1b0 [ 545.793694][T19348] ext4_append+0x238/0x474 [ 545.793699][T19348] ext4_init_new_dir+0x100/0x1a8 [ 545.793705][T19348] ext4_mkdir+0x3bc/0xa28 [ 545.793710][T19348] vfs_mkdir+0x284/0x424 [ 545.793718][T19348] do_mkdirat+0x1f8/0x4c8 [ 545.793724][T19348] __arm64_sys_mkdirat+0x8c/0xa4 [ 545.793732][T19348] invoke_syscall+0x98/0x2b8 [ 545.793737][T19348] el0_svc_common+0x130/0x23c [ 545.793743][T19348] do_el0_svc+0x48/0x58 [ 545.793748][T19348] el0_svc+0x58/0x180 [ 545.793755][T19348] el0t_64_sync_handler+0x84/0x12c [ 545.793761][T19348] el0t_64_sync+0x198/0x19c [ 545.793770][T19348] ENOMEM in journal_alloc_journal_head, retrying. [ 545.866535][T19349] loop0: detected capacity change from 0 to 32768 [ 545.869015][T19349] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 545.869860][T19349] FAULT_INJECTION: forcing a failure. [ 545.869860][T19349] name failslab, interval 1, probability 0, space 0, times 0 [ 545.869880][T19349] CPU: 1 UID: 0 PID: 19349 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 545.869892][T19349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 545.869899][T19349] Call trace: [ 545.869902][T19349] show_stack+0x2c/0x3c (C) [ 545.869919][T19349] __dump_stack+0x30/0x40 [ 545.869926][T19349] dump_stack_lvl+0xd8/0x12c [ 545.869932][T19349] dump_stack+0x1c/0x28 [ 545.869937][T19349] should_fail_ex+0x41c/0x594 [ 545.869945][T19349] should_failslab+0xc0/0x128 [ 545.869952][T19349] kmem_cache_alloc_noprof+0x80/0x3e8 [ 545.869959][T19349] jbd2_journal_add_journal_head+0x98/0x5e0 [ 545.869966][T19349] jbd2_journal_get_create_access+0x58/0x3ac [ 545.869974][T19349] __ext4_journal_get_create_access+0xf8/0x37c [ 545.869980][T19349] ext4_getblk+0x3d8/0x6c4 [ 545.869986][T19349] ext4_bread+0x3c/0x1b0 [ 545.869991][T19349] ext4_append+0x238/0x474 [ 545.869996][T19349] ext4_init_new_dir+0x100/0x1a8 [ 545.870002][T19349] ext4_mkdir+0x3bc/0xa28 [ 545.870007][T19349] vfs_mkdir+0x284/0x424 [ 545.870014][T19349] do_mkdirat+0x1f8/0x4c8 [ 545.870020][T19349] __arm64_sys_mkdirat+0x8c/0xa4 [ 545.870027][T19349] invoke_syscall+0x98/0x2b8 [ 545.870033][T19349] el0_svc_common+0x130/0x23c [ 545.870038][T19349] do_el0_svc+0x48/0x58 [ 545.870043][T19349] el0_svc+0x58/0x180 [ 545.870049][T19349] el0t_64_sync_handler+0x84/0x12c [ 545.870055][T19349] el0t_64_sync+0x198/0x19c [ 545.870066][T19349] ENOMEM in journal_alloc_journal_head, retrying. [ 545.947471][T19350] loop0: detected capacity change from 0 to 32768 [ 545.949661][T19350] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19350) [ 545.949793][T19350] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 545.975907][T19350] FAULT_INJECTION: forcing a failure. [ 545.975907][T19350] name failslab, interval 1, probability 0, space 0, times 0 [ 545.975937][T19350] CPU: 1 UID: 0 PID: 19350 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 545.975949][T19350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 545.975957][T19350] Call trace: [ 545.975960][T19350] show_stack+0x2c/0x3c (C) [ 545.975975][T19350] __dump_stack+0x30/0x40 [ 545.975983][T19350] dump_stack_lvl+0xd8/0x12c [ 545.975988][T19350] dump_stack+0x1c/0x28 [ 545.975994][T19350] should_fail_ex+0x41c/0x594 [ 545.976001][T19350] should_failslab+0xc0/0x128 [ 545.976009][T19350] kmem_cache_alloc_noprof+0x80/0x3e8 [ 545.976016][T19350] jbd2_journal_add_journal_head+0x98/0x5e0 [ 545.976023][T19350] jbd2_journal_get_create_access+0x58/0x3ac [ 545.976030][T19350] __ext4_journal_get_create_access+0xf8/0x37c [ 545.976037][T19350] ext4_getblk+0x3d8/0x6c4 [ 545.976043][T19350] ext4_bread+0x3c/0x1b0 [ 545.976048][T19350] ext4_append+0x238/0x474 [ 545.976054][T19350] ext4_init_new_dir+0x100/0x1a8 [ 545.976059][T19350] ext4_mkdir+0x3bc/0xa28 [ 545.976065][T19350] vfs_mkdir+0x284/0x424 [ 545.976072][T19350] do_mkdirat+0x1f8/0x4c8 [ 545.976079][T19350] __arm64_sys_mkdirat+0x8c/0xa4 [ 545.976086][T19350] invoke_syscall+0x98/0x2b8 [ 545.976091][T19350] el0_svc_common+0x130/0x23c [ 545.976096][T19350] do_el0_svc+0x48/0x58 [ 545.976102][T19350] el0_svc+0x58/0x180 [ 545.976109][T19350] el0t_64_sync_handler+0x84/0x12c [ 545.976114][T19350] el0t_64_sync+0x198/0x19c [ 545.977375][T19350] ENOMEM in journal_alloc_journal_head, retrying. [ 546.065213][T19352] loop0: detected capacity change from 0 to 32768 [ 546.067466][T19352] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 546.067973][T19352] FAULT_INJECTION: forcing a failure. [ 546.067973][T19352] name failslab, interval 1, probability 0, space 0, times 0 [ 546.068004][T19352] CPU: 0 UID: 0 PID: 19352 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 546.068016][T19352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 546.068023][T19352] Call trace: [ 546.068026][T19352] show_stack+0x2c/0x3c (C) [ 546.068041][T19352] __dump_stack+0x30/0x40 [ 546.068048][T19352] dump_stack_lvl+0xd8/0x12c [ 546.068054][T19352] dump_stack+0x1c/0x28 [ 546.068059][T19352] should_fail_ex+0x41c/0x594 [ 546.068067][T19352] should_failslab+0xc0/0x128 [ 546.068075][T19352] kmem_cache_alloc_noprof+0x80/0x3e8 [ 546.068083][T19352] jbd2_journal_add_journal_head+0x98/0x5e0 [ 546.068090][T19352] jbd2_journal_get_create_access+0x58/0x3ac [ 546.068097][T19352] __ext4_journal_get_create_access+0xf8/0x37c [ 546.068104][T19352] ext4_getblk+0x3d8/0x6c4 [ 546.068110][T19352] ext4_bread+0x3c/0x1b0 [ 546.068115][T19352] ext4_append+0x238/0x474 [ 546.068121][T19352] ext4_init_new_dir+0x100/0x1a8 [ 546.068126][T19352] ext4_mkdir+0x3bc/0xa28 [ 546.068132][T19352] vfs_mkdir+0x284/0x424 [ 546.068139][T19352] do_mkdirat+0x1f8/0x4c8 [ 546.068146][T19352] __arm64_sys_mkdirat+0x8c/0xa4 [ 546.068153][T19352] invoke_syscall+0x98/0x2b8 [ 546.068159][T19352] el0_svc_common+0x130/0x23c [ 546.068164][T19352] do_el0_svc+0x48/0x58 [ 546.068169][T19352] el0_svc+0x58/0x180 [ 546.068176][T19352] el0t_64_sync_handler+0x84/0x12c [ 546.068182][T19352] el0t_64_sync+0x198/0x19c [ 546.068194][T19352] ENOMEM in journal_alloc_journal_head, retrying. [ 546.161053][T19354] loop0: detected capacity change from 0 to 32768 [ 546.162991][T19354] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19354) [ 546.165439][T19354] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 546.167450][T19354] FAULT_INJECTION: forcing a failure. [ 546.167450][T19354] name failslab, interval 1, probability 0, space 0, times 0 [ 546.169610][T19354] CPU: 0 UID: 0 PID: 19354 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 546.169635][T19354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 546.169640][T19354] Call trace: [ 546.169643][T19354] show_stack+0x2c/0x3c (C) [ 546.169657][T19354] __dump_stack+0x30/0x40 [ 546.169663][T19354] dump_stack_lvl+0xd8/0x12c [ 546.169668][T19354] dump_stack+0x1c/0x28 [ 546.169673][T19354] should_fail_ex+0x41c/0x594 [ 546.169681][T19354] should_failslab+0xc0/0x128 [ 546.169688][T19354] kmem_cache_alloc_noprof+0x80/0x3e8 [ 546.169695][T19354] jbd2_journal_add_journal_head+0x98/0x5e0 [ 546.169702][T19354] jbd2_journal_get_create_access+0x58/0x3ac [ 546.169709][T19354] __ext4_journal_get_create_access+0xf8/0x37c [ 546.169716][T19354] ext4_getblk+0x3d8/0x6c4 [ 546.169721][T19354] ext4_bread+0x3c/0x1b0 [ 546.169726][T19354] ext4_append+0x238/0x474 [ 546.169731][T19354] ext4_init_new_dir+0x100/0x1a8 [ 546.169737][T19354] ext4_mkdir+0x3bc/0xa28 [ 546.169742][T19354] vfs_mkdir+0x284/0x424 [ 546.169749][T19354] do_mkdirat+0x1f8/0x4c8 [ 546.169755][T19354] __arm64_sys_mkdirat+0x8c/0xa4 [ 546.169762][T19354] invoke_syscall+0x98/0x2b8 [ 546.169768][T19354] el0_svc_common+0x130/0x23c [ 546.169773][T19354] do_el0_svc+0x48/0x58 [ 546.169778][T19354] el0_svc+0x58/0x180 [ 546.169785][T19354] el0t_64_sync_handler+0x84/0x12c [ 546.169790][T19354] el0t_64_sync+0x198/0x19c [ 546.257831][T19356] loop0: detected capacity change from 0 to 32768 [ 546.261175][T19356] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19356) [ 546.264479][T19356] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 546.264981][T19356] FAULT_INJECTION: forcing a failure. [ 546.264981][T19356] name failslab, interval 1, probability 0, space 0, times 0 [ 546.265000][T19356] CPU: 0 UID: 0 PID: 19356 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 546.265012][T19356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 546.265019][T19356] Call trace: [ 546.265023][T19356] show_stack+0x2c/0x3c (C) [ 546.265045][T19356] __dump_stack+0x30/0x40 [ 546.265053][T19356] dump_stack_lvl+0xd8/0x12c [ 546.265060][T19356] dump_stack+0x1c/0x28 [ 546.265065][T19356] should_fail_ex+0x41c/0x594 [ 546.265073][T19356] should_failslab+0xc0/0x128 [ 546.265081][T19356] kmem_cache_alloc_noprof+0x80/0x3e8 [ 546.265088][T19356] jbd2_journal_add_journal_head+0x98/0x5e0 [ 546.265095][T19356] jbd2_journal_get_create_access+0x58/0x3ac [ 546.265103][T19356] __ext4_journal_get_create_access+0xf8/0x37c [ 546.265110][T19356] ext4_getblk+0x3d8/0x6c4 [ 546.265115][T19356] ext4_bread+0x3c/0x1b0 [ 546.265120][T19356] ext4_append+0x238/0x474 [ 546.265126][T19356] ext4_init_new_dir+0x100/0x1a8 [ 546.265132][T19356] ext4_mkdir+0x3bc/0xa28 [ 546.265137][T19356] vfs_mkdir+0x284/0x424 [ 546.265144][T19356] do_mkdirat+0x1f8/0x4c8 [ 546.265151][T19356] __arm64_sys_mkdirat+0x8c/0xa4 [ 546.265158][T19356] invoke_syscall+0x98/0x2b8 [ 546.265164][T19356] el0_svc_common+0x130/0x23c [ 546.265169][T19356] do_el0_svc+0x48/0x58 [ 546.265174][T19356] el0_svc+0x58/0x180 [ 546.265181][T19356] el0t_64_sync_handler+0x84/0x12c [ 546.265187][T19356] el0t_64_sync+0x198/0x19c [ 546.366619][T19358] loop0: detected capacity change from 0 to 32768 [ 546.368851][T19358] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19358) [ 546.368958][T19358] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 546.389637][T19358] FAULT_INJECTION: forcing a failure. [ 546.389637][T19358] name failslab, interval 1, probability 0, space 0, times 0 [ 546.389666][T19358] CPU: 1 UID: 0 PID: 19358 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 546.389678][T19358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 546.389686][T19358] Call trace: [ 546.389690][T19358] show_stack+0x2c/0x3c (C) [ 546.389708][T19358] __dump_stack+0x30/0x40 [ 546.389716][T19358] dump_stack_lvl+0xd8/0x12c [ 546.389722][T19358] dump_stack+0x1c/0x28 [ 546.389727][T19358] should_fail_ex+0x41c/0x594 [ 546.389735][T19358] should_failslab+0xc0/0x128 [ 546.389742][T19358] kmem_cache_alloc_noprof+0x80/0x3e8 [ 546.389750][T19358] jbd2_journal_add_journal_head+0x98/0x5e0 [ 546.389757][T19358] jbd2_journal_get_create_access+0x58/0x3ac [ 546.389764][T19358] __ext4_journal_get_create_access+0xf8/0x37c [ 546.389771][T19358] ext4_getblk+0x3d8/0x6c4 [ 546.389776][T19358] ext4_bread+0x3c/0x1b0 [ 546.389781][T19358] ext4_append+0x238/0x474 [ 546.389787][T19358] ext4_init_new_dir+0x100/0x1a8 [ 546.389793][T19358] ext4_mkdir+0x3bc/0xa28 [ 546.389798][T19358] vfs_mkdir+0x284/0x424 [ 546.389805][T19358] do_mkdirat+0x1f8/0x4c8 [ 546.389812][T19358] __arm64_sys_mkdirat+0x8c/0xa4 [ 546.389819][T19358] invoke_syscall+0x98/0x2b8 [ 546.389825][T19358] el0_svc_common+0x130/0x23c [ 546.389830][T19358] do_el0_svc+0x48/0x58 [ 546.389835][T19358] el0_svc+0x58/0x180 [ 546.389841][T19358] el0t_64_sync_handler+0x84/0x12c [ 546.389847][T19358] el0t_64_sync+0x198/0x19c [ 546.461935][T19359] loop0: detected capacity change from 0 to 32768 [ 546.463916][T19359] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 546.464779][T19359] FAULT_INJECTION: forcing a failure. [ 546.464779][T19359] name failslab, interval 1, probability 0, space 0, times 0 [ 546.464792][T19359] CPU: 1 UID: 0 PID: 19359 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 546.464799][T19359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 546.464804][T19359] Call trace: [ 546.464807][T19359] show_stack+0x2c/0x3c (C) [ 546.464819][T19359] __dump_stack+0x30/0x40 [ 546.464826][T19359] dump_stack_lvl+0xd8/0x12c [ 546.464831][T19359] dump_stack+0x1c/0x28 [ 546.464836][T19359] should_fail_ex+0x41c/0x594 [ 546.464844][T19359] should_failslab+0xc0/0x128 [ 546.464851][T19359] kmem_cache_alloc_noprof+0x80/0x3e8 [ 546.464858][T19359] jbd2_journal_add_journal_head+0x98/0x5e0 [ 546.464865][T19359] jbd2_journal_get_create_access+0x58/0x3ac [ 546.464872][T19359] __ext4_journal_get_create_access+0xf8/0x37c [ 546.464879][T19359] ext4_getblk+0x3d8/0x6c4 [ 546.464885][T19359] ext4_bread+0x3c/0x1b0 [ 546.464890][T19359] ext4_append+0x238/0x474 [ 546.464895][T19359] ext4_init_new_dir+0x100/0x1a8 [ 546.464901][T19359] ext4_mkdir+0x3bc/0xa28 [ 546.464906][T19359] vfs_mkdir+0x284/0x424 [ 546.464913][T19359] do_mkdirat+0x1f8/0x4c8 [ 546.464920][T19359] __arm64_sys_mkdirat+0x8c/0xa4 [ 546.464927][T19359] invoke_syscall+0x98/0x2b8 [ 546.464932][T19359] el0_svc_common+0x130/0x23c [ 546.464937][T19359] do_el0_svc+0x48/0x58 [ 546.464942][T19359] el0_svc+0x58/0x180 [ 546.464949][T19359] el0t_64_sync_handler+0x84/0x12c [ 546.464955][T19359] el0t_64_sync+0x198/0x19c [ 546.563674][T19360] loop0: detected capacity change from 0 to 32768 [ 546.565755][T19360] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19360) [ 546.565858][T19360] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 546.566442][T19360] FAULT_INJECTION: forcing a failure. [ 546.566442][T19360] name failslab, interval 1, probability 0, space 0, times 0 [ 546.566461][T19360] CPU: 0 UID: 0 PID: 19360 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 546.566470][T19360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 546.566475][T19360] Call trace: [ 546.566478][T19360] show_stack+0x2c/0x3c (C) [ 546.566491][T19360] __dump_stack+0x30/0x40 [ 546.566498][T19360] dump_stack_lvl+0xd8/0x12c [ 546.566503][T19360] dump_stack+0x1c/0x28 [ 546.566508][T19360] should_fail_ex+0x41c/0x594 [ 546.566516][T19360] should_failslab+0xc0/0x128 [ 546.566524][T19360] kmem_cache_alloc_noprof+0x80/0x3e8 [ 546.566532][T19360] jbd2_journal_add_journal_head+0x98/0x5e0 [ 546.566539][T19360] jbd2_journal_get_create_access+0x58/0x3ac [ 546.566546][T19360] __ext4_journal_get_create_access+0xf8/0x37c [ 546.566554][T19360] ext4_getblk+0x3d8/0x6c4 [ 546.566560][T19360] ext4_bread+0x3c/0x1b0 [ 546.566565][T19360] ext4_append+0x238/0x474 [ 546.566571][T19360] ext4_init_new_dir+0x100/0x1a8 [ 546.566576][T19360] ext4_mkdir+0x3bc/0xa28 [ 546.566582][T19360] vfs_mkdir+0x284/0x424 [ 546.566589][T19360] do_mkdirat+0x1f8/0x4c8 [ 546.566596][T19360] __arm64_sys_mkdirat+0x8c/0xa4 [ 546.566603][T19360] invoke_syscall+0x98/0x2b8 [ 546.566609][T19360] el0_svc_common+0x130/0x23c [ 546.566614][T19360] do_el0_svc+0x48/0x58 [ 546.566619][T19360] el0_svc+0x58/0x180 [ 546.566627][T19360] el0t_64_sync_handler+0x84/0x12c [ 546.566632][T19360] el0t_64_sync+0x198/0x19c [ 546.675148][T19363] loop0: detected capacity change from 0 to 32768 [ 546.677335][T19363] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19363) [ 546.679875][T19363] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 546.682023][T19363] FAULT_INJECTION: forcing a failure. [ 546.682023][T19363] name failslab, interval 1, probability 0, space 0, times 0 [ 546.684347][T19363] CPU: 0 UID: 0 PID: 19363 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 546.684379][T19363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 546.684386][T19363] Call trace: [ 546.684390][T19363] show_stack+0x2c/0x3c (C) [ 546.684408][T19363] __dump_stack+0x30/0x40 [ 546.684419][T19363] dump_stack_lvl+0xd8/0x12c [ 546.684426][T19363] dump_stack+0x1c/0x28 [ 546.684432][T19363] should_fail_ex+0x41c/0x594 [ 546.684441][T19363] should_failslab+0xc0/0x128 [ 546.684448][T19363] kmem_cache_alloc_noprof+0x80/0x3e8 [ 546.684456][T19363] jbd2_journal_add_journal_head+0x98/0x5e0 [ 546.684464][T19363] jbd2_journal_get_create_access+0x58/0x3ac [ 546.684471][T19363] __ext4_journal_get_create_access+0xf8/0x37c [ 546.684478][T19363] ext4_getblk+0x3d8/0x6c4 [ 546.684484][T19363] ext4_bread+0x3c/0x1b0 [ 546.684489][T19363] ext4_append+0x238/0x474 [ 546.684495][T19363] ext4_init_new_dir+0x100/0x1a8 [ 546.684500][T19363] ext4_mkdir+0x3bc/0xa28 [ 546.684506][T19363] vfs_mkdir+0x284/0x424 [ 546.684513][T19363] do_mkdirat+0x1f8/0x4c8 [ 546.684520][T19363] __arm64_sys_mkdirat+0x8c/0xa4 [ 546.684527][T19363] invoke_syscall+0x98/0x2b8 [ 546.684533][T19363] el0_svc_common+0x130/0x23c [ 546.684539][T19363] do_el0_svc+0x48/0x58 [ 546.684544][T19363] el0_svc+0x58/0x180 [ 546.684551][T19363] el0t_64_sync_handler+0x84/0x12c [ 546.684557][T19363] el0t_64_sync+0x198/0x19c [ 546.779585][T19365] loop0: detected capacity change from 0 to 32768 [ 546.781666][T19365] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19365) [ 546.781763][T19365] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 546.782254][T19365] FAULT_INJECTION: forcing a failure. [ 546.782254][T19365] name failslab, interval 1, probability 0, space 0, times 0 [ 546.782274][T19365] CPU: 0 UID: 0 PID: 19365 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 546.782285][T19365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 546.782292][T19365] Call trace: [ 546.782296][T19365] show_stack+0x2c/0x3c (C) [ 546.782312][T19365] __dump_stack+0x30/0x40 [ 546.782319][T19365] dump_stack_lvl+0xd8/0x12c [ 546.782325][T19365] dump_stack+0x1c/0x28 [ 546.782330][T19365] should_fail_ex+0x41c/0x594 [ 546.782339][T19365] should_failslab+0xc0/0x128 [ 546.782346][T19365] kmem_cache_alloc_noprof+0x80/0x3e8 [ 546.782354][T19365] jbd2_journal_add_journal_head+0x98/0x5e0 [ 546.782367][T19365] jbd2_journal_get_create_access+0x58/0x3ac [ 546.782376][T19365] __ext4_journal_get_create_access+0xf8/0x37c [ 546.782384][T19365] ext4_getblk+0x3d8/0x6c4 [ 546.782391][T19365] ext4_bread+0x3c/0x1b0 [ 546.782397][T19365] ext4_append+0x238/0x474 [ 546.782403][T19365] ext4_init_new_dir+0x100/0x1a8 [ 546.782409][T19365] ext4_mkdir+0x3bc/0xa28 [ 546.782414][T19365] vfs_mkdir+0x284/0x424 [ 546.782422][T19365] do_mkdirat+0x1f8/0x4c8 [ 546.782429][T19365] __arm64_sys_mkdirat+0x8c/0xa4 [ 546.782436][T19365] invoke_syscall+0x98/0x2b8 [ 546.782442][T19365] el0_svc_common+0x130/0x23c [ 546.782447][T19365] do_el0_svc+0x48/0x58 [ 546.782452][T19365] el0_svc+0x58/0x180 [ 546.782459][T19365] el0t_64_sync_handler+0x84/0x12c [ 546.782465][T19365] el0t_64_sync+0x198/0x19c [ 546.882947][T19367] loop0: detected capacity change from 0 to 32768 [ 546.885118][T19367] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19367) [ 546.885226][T19367] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 546.885694][T19367] FAULT_INJECTION: forcing a failure. [ 546.885694][T19367] name failslab, interval 1, probability 0, space 0, times 0 [ 546.885714][T19367] CPU: 0 UID: 0 PID: 19367 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 546.885726][T19367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 546.885734][T19367] Call trace: [ 546.885737][T19367] show_stack+0x2c/0x3c (C) [ 546.885752][T19367] __dump_stack+0x30/0x40 [ 546.885759][T19367] dump_stack_lvl+0xd8/0x12c [ 546.885765][T19367] dump_stack+0x1c/0x28 [ 546.885771][T19367] should_fail_ex+0x41c/0x594 [ 546.885779][T19367] should_failslab+0xc0/0x128 [ 546.885786][T19367] kmem_cache_alloc_noprof+0x80/0x3e8 [ 546.885793][T19367] jbd2_journal_add_journal_head+0x98/0x5e0 [ 546.885801][T19367] jbd2_journal_get_create_access+0x58/0x3ac [ 546.885808][T19367] __ext4_journal_get_create_access+0xf8/0x37c [ 546.885815][T19367] ext4_getblk+0x3d8/0x6c4 [ 546.885821][T19367] ext4_bread+0x3c/0x1b0 [ 546.885826][T19367] ext4_append+0x238/0x474 [ 546.885832][T19367] ext4_init_new_dir+0x100/0x1a8 [ 546.885837][T19367] ext4_mkdir+0x3bc/0xa28 [ 546.885843][T19367] vfs_mkdir+0x284/0x424 [ 546.885850][T19367] do_mkdirat+0x1f8/0x4c8 [ 546.885857][T19367] __arm64_sys_mkdirat+0x8c/0xa4 [ 546.885864][T19367] invoke_syscall+0x98/0x2b8 [ 546.885870][T19367] el0_svc_common+0x130/0x23c [ 546.885875][T19367] do_el0_svc+0x48/0x58 [ 546.885880][T19367] el0_svc+0x58/0x180 [ 546.885887][T19367] el0t_64_sync_handler+0x84/0x12c [ 546.885893][T19367] el0t_64_sync+0x198/0x19c [ 546.976554][T19368] loop0: detected capacity change from 0 to 32768 [ 546.980349][T19368] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19368) [ 546.980471][T19368] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 546.980921][T19368] FAULT_INJECTION: forcing a failure. [ 546.980921][T19368] name failslab, interval 1, probability 0, space 0, times 0 [ 546.980933][T19368] CPU: 1 UID: 0 PID: 19368 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 546.980941][T19368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 546.980946][T19368] Call trace: [ 546.980949][T19368] show_stack+0x2c/0x3c (C) [ 546.980962][T19368] __dump_stack+0x30/0x40 [ 546.980969][T19368] dump_stack_lvl+0xd8/0x12c [ 546.980974][T19368] dump_stack+0x1c/0x28 [ 546.980979][T19368] should_fail_ex+0x41c/0x594 [ 546.980987][T19368] should_failslab+0xc0/0x128 [ 546.980994][T19368] kmem_cache_alloc_noprof+0x80/0x3e8 [ 546.981001][T19368] jbd2_journal_add_journal_head+0x98/0x5e0 [ 546.981008][T19368] jbd2_journal_get_create_access+0x58/0x3ac [ 546.981016][T19368] __ext4_journal_get_create_access+0xf8/0x37c [ 546.981023][T19368] ext4_getblk+0x3d8/0x6c4 [ 546.981028][T19368] ext4_bread+0x3c/0x1b0 [ 546.981033][T19368] ext4_append+0x238/0x474 [ 546.981039][T19368] ext4_init_new_dir+0x100/0x1a8 [ 546.981044][T19368] ext4_mkdir+0x3bc/0xa28 [ 546.981049][T19368] vfs_mkdir+0x284/0x424 [ 546.981057][T19368] do_mkdirat+0x1f8/0x4c8 [ 546.981063][T19368] __arm64_sys_mkdirat+0x8c/0xa4 [ 546.981071][T19368] invoke_syscall+0x98/0x2b8 [ 546.981076][T19368] el0_svc_common+0x130/0x23c [ 546.981081][T19368] do_el0_svc+0x48/0x58 [ 546.981086][T19368] el0_svc+0x58/0x180 [ 546.981093][T19368] el0t_64_sync_handler+0x84/0x12c [ 546.981099][T19368] el0t_64_sync+0x198/0x19c [ 547.074859][T19371] loop0: detected capacity change from 0 to 32768 [ 547.077978][T19371] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19371) [ 547.078106][T19371] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 547.080489][T19371] FAULT_INJECTION: forcing a failure. [ 547.080489][T19371] name failslab, interval 1, probability 0, space 0, times 0 [ 547.080502][T19371] CPU: 1 UID: 0 PID: 19371 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 547.080511][T19371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 547.080515][T19371] Call trace: [ 547.080517][T19371] show_stack+0x2c/0x3c (C) [ 547.080529][T19371] __dump_stack+0x30/0x40 [ 547.080536][T19371] dump_stack_lvl+0xd8/0x12c [ 547.080541][T19371] dump_stack+0x1c/0x28 [ 547.080546][T19371] should_fail_ex+0x41c/0x594 [ 547.080553][T19371] should_failslab+0xc0/0x128 [ 547.080560][T19371] kmem_cache_alloc_noprof+0x80/0x3e8 [ 547.080568][T19371] jbd2_journal_add_journal_head+0x98/0x5e0 [ 547.080575][T19371] jbd2_journal_get_create_access+0x58/0x3ac [ 547.080582][T19371] __ext4_journal_get_create_access+0xf8/0x37c [ 547.080589][T19371] ext4_getblk+0x3d8/0x6c4 [ 547.080594][T19371] ext4_bread+0x3c/0x1b0 [ 547.080599][T19371] ext4_append+0x238/0x474 [ 547.080605][T19371] ext4_init_new_dir+0x100/0x1a8 [ 547.080610][T19371] ext4_mkdir+0x3bc/0xa28 [ 547.080615][T19371] vfs_mkdir+0x284/0x424 [ 547.080623][T19371] do_mkdirat+0x1f8/0x4c8 [ 547.080629][T19371] __arm64_sys_mkdirat+0x8c/0xa4 [ 547.080636][T19371] invoke_syscall+0x98/0x2b8 [ 547.080642][T19371] el0_svc_common+0x130/0x23c [ 547.080647][T19371] do_el0_svc+0x48/0x58 [ 547.080652][T19371] el0_svc+0x58/0x180 [ 547.080658][T19371] el0t_64_sync_handler+0x84/0x12c [ 547.080664][T19371] el0t_64_sync+0x198/0x19c [ 547.165612][T19372] loop0: detected capacity change from 0 to 32768 [ 547.168851][T19372] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19372) [ 547.169326][T19372] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 547.170705][T19372] FAULT_INJECTION: forcing a failure. [ 547.170705][T19372] name failslab, interval 1, probability 0, space 0, times 0 [ 547.170722][T19372] CPU: 1 UID: 0 PID: 19372 Comm: syz-executor255 Not tainted syzkaller #0 PREEMPT [ 547.170730][T19372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 [ 547.170735][T19372] Call trace: [ 547.170737][T19372] show_stack+0x2c/0x3c (C) [ 547.170750][T19372] __dump_stack+0x30/0x40 [ 547.170757][T19372] dump_stack_lvl+0xd8/0x12c [ 547.170762][T19372] dump_stack+0x1c/0x28 [ 547.170767][T19372] should_fail_ex+0x41c/0x594 [ 547.170774][T19372] should_failslab+0xc0/0x128 [ 547.170781][T19372] kmem_cache_alloc_noprof+0x80/0x3e8 [ 547.170788][T19372] jbd2_journal_add_journal_head+0x98/0x5e0 [ 547.170795][T19372] jbd2_journal_get_create_access+0x58/0x3ac [ 547.170802][T19372] __ext4_journal_get_create_access+0xf8/0x37c [ 547.170809][T19372] ext4_getblk+0x3d8/0x6c4 [ 547.170815][T19372] ext4_bread+0x3c/0x1b0 [ 547.170819][T19372] ext4_append+0x238/0x474 [ 547.170825][T19372] ext4_init_new_dir+0x100/0x1a8 [ 547.170830][T19372] ext4_mkdir+0x3bc/0xa28 [ 547.170835][T19372] vfs_mkdir+0x284/0x424 [ 547.170842][T19372] do_mkdirat+0x1f8/0x4c8 [ 547.170849][T19372] __arm64_sys_mkdirat+0x8c/0xa4 [ 547.170856][T19372] invoke_syscall+0x98/0x2b8 [ 547.170861][T19372] el0_svc_common+0x130/0x23c [ 547.170866][T19372] do_el0_svc+0x48/0x58 [ 547.170871][T19372] el0_svc+0x58/0x180 [ 547.170878][T19372] el0t_64_sync_handler+0x84/0x12c [ 547.170884][T19372] el0t_64_sync+0x198/0x19c [ 547.250800][T19374] loop0: detected capacity change from 0 to 32768 [ 547.251921][T19374] BTRFS: device fsid d09153a9-5497-4f31-8e52-d2d02bbdf7fc devid 1 transid 8 /dev/loop0 (7:0) scanned by syz-executor255 (19374) [ 547.252002][T19374] BTRFS error: failed to open device for path /dev/loop0 with flags 0x23: -16 [ 547.283919][T19374] FAULT_INJECTION: forcing a failure.