={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x182}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x34, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x11c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x114, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xa9f}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1f}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x80}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xd}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xd628}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x84}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4aea}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xff}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x6543003aeae9862f}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x25c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x54, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x6}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x7}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1b0}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x9a3}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x282}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x18}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x3ff}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x1f8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x108, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x11}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x59}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6e}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xfd}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2b1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x90, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xffff}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5ff6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x40}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xc3}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5f0}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}]}]}, 0x42b4}, 0x1, 0x0, 0x0, 0x4000090}, 0x4) 04:59:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000008}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:22 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xf6ffffff00000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 286.353843][T23034] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 286.458033][T23052] loop5: detected capacity change from 0 to 264192 [ 286.471345][T23053] loop1: detected capacity change from 0 to 264192 04:59:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000014}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 286.526950][T23053] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:23 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xf9fdffff00000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 286.590357][T23066] loop5: detected capacity change from 0 to 264192 04:59:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x10000005c}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:23 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xfdfdffff00000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 286.654796][T23074] loop1: detected capacity change from 0 to 264192 [ 286.692668][T23074] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 286.741273][T23084] loop5: detected capacity change from 0 to 264192 [ 286.763992][T23086] loop1: detected capacity change from 0 to 264192 [ 286.786149][T23086] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:23 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) open(&(0x7f0000000000)='./bus\x00', 0x40400, 0x80) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x8001, @empty, 0x3c06}, 0x1c) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) 04:59:23 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xfdffffff00000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4c00, &(0x7f00000004c0), 0x0, 0x0) [ 286.828590][T23084] loop5: detected capacity change from 0 to 264192 [ 286.870873][T23105] loop1: detected capacity change from 0 to 264192 [ 286.896804][T23105] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000300}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:23 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2040000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 287.273235][T23130] loop5: detected capacity change from 0 to 264192 04:59:23 executing program 3: r0 = open(0x0, 0x0, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="747275733465642e5b11"], &(0x7f0000000240)=""/172, 0xac) futex(&(0x7f0000000000)=0x1, 0x86, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x2, 0xfffffffd, 0x0, &(0x7f0000000000)=0x1, 0x0) futex(&(0x7f0000000500)=0x2, 0x8b, 0x2, &(0x7f0000000540)={0x0, 0x989680}, &(0x7f0000000580)=0x1, 0x0) futex(&(0x7f0000000100), 0x8c, 0x6, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)=0x1, 0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000480)='ns/user\x00') sendfile(r0, r1, &(0x7f00000004c0)=0x6, 0x5d6) futex(&(0x7f0000000040)=0x1, 0x8b, 0x2, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x1) pselect6(0x40, &(0x7f0000000300)={0x0, 0x6, 0xfffffffffffffffd, 0x0, 0x100000000, 0xfffffffffffffffa, 0x1, 0x5}, &(0x7f0000000340)={0x800, 0x5, 0xafb0, 0x0, 0x4, 0x45f, 0x4, 0x7fffffff}, &(0x7f0000000380)={0xfefe, 0x3, 0x0, 0x4, 0x100000000, 0x9, 0x1}, &(0x7f00000003c0), &(0x7f0000000440)={&(0x7f0000000400)={[0x8]}, 0x8}) 04:59:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x60ff, &(0x7f00000004c0), 0x0, 0x0) 04:59:23 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xfeffffff00000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100002000}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 287.485051][T23148] loop1: detected capacity change from 0 to 264192 [ 287.513697][T23152] loop5: detected capacity change from 0 to 264192 [ 287.522525][T23148] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:24 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xfeffffffffffffff, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100002a00}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 287.641241][T23161] loop1: detected capacity change from 0 to 264192 [ 287.655198][T23167] loop5: detected capacity change from 0 to 264192 04:59:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x10002dfa4}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 287.701706][T23161] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:24 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xff0f000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100040800}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:24 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)=0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f00000004c0)=0x580) io_submit(r6, 0x2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r5, &(0x7f0000000000), 0x16000}]) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r8, &(0x7f0000000300)=""/28, 0x1c) getdents(r8, &(0x7f0000000040)=""/97, 0x61) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r8, 0x8040942d, &(0x7f0000000480)) r9 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x5210c0, 0x0) io_submit(r6, 0x2, &(0x7f0000000440)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x4f21, r7, &(0x7f0000000200)="5ccea6e6804479a38bd39531d91911a318e402ceb0b651dc62346ad1d52a952ca3d53355b45f5dea2a31741b5c03b8e28591adf2e9d8cf585f51137eab45ba8d2365d821033ba5ebb1e35a97629f330f0bab040951465fc34fe7984c8cd4ae15fdc8185e1c614bdfe1725c924220090605b4b7db1d4a7f17c24e6b9d6747f8bd954bc12bc53b86af070c87be926245482d92881bf9b1c1def6a4cf", 0x9b, 0x7fffffff, 0x0, 0x2, r9}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x9e, r2, &(0x7f0000000300)="a5f0ffaf3135601af352c464aa8b257fa264e4a33fad52f987d58dc1a1f3895c478eb8f972b47c7dc9ecf42a2eb769eb201a763e9b3afc23800abe7b8197a1b9d094f9d177902a6106aacadea2b4e2b6bb20b221c5641cadd81a6a46bd3614cbdce39b7099019963af711f390af1b6eaa0e991281369543722e96b0abf4d41e78d96ccf2cbda4e4c89a4cd27ddc21a34c51df652486ed6758fac3acdb2abac271ecd77a990b2313a0b82328587aba7e4ae505633b64f8986d3dace7056efa741084b851b76a722e8bed1612ca98edfde1027", 0xd2, 0x40, 0x0, 0x3, r1}]) [ 287.785481][T23181] loop5: detected capacity change from 0 to 264192 04:59:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x6800, &(0x7f00000004c0), 0x0, 0x0) [ 287.870239][T23193] loop1: detected capacity change from 0 to 264192 [ 287.885421][T23192] loop5: detected capacity change from 0 to 264192 [ 287.885513][T23193] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 287.969977][T23192] loop5: detected capacity change from 0 to 264192 04:59:24 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:24 executing program 3: open(0x0, 0x2, 0x0) futex(&(0x7f0000000000)=0x1, 0x86, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x4, 0x2, 0x0, &(0x7f0000000040)=0x4, 0x2000003) 04:59:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7608aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:24 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xfffbffff00000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:24 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) io_destroy(r3) r4 = open(&(0x7f0000000840)='./bus\x00', 0x30000, 0xae) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r5, &(0x7f0000000300)=""/28, 0x1c) getdents(r5, &(0x7f0000000040)=""/97, 0x61) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000800)='/sys/class/scsi_generic', 0x90044, 0x0) getdents64(r6, &(0x7f0000000300)=""/28, 0x1c) getdents(r6, &(0x7f0000000040)=""/97, 0x61) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r7, &(0x7f0000000300)=""/28, 0x1c) getdents(r7, &(0x7f0000000040)=""/97, 0x61) io_submit(0x0, 0x5, &(0x7f00000007c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x7, r0, &(0x7f0000000300)="05cc6c641ae3607e25cac7637eeb016b95b181e4b089f0293892d93e9b29ad5e7a9e2545deaed6d2debdf024d2a3ce0ec262b3be1eb6b9aeee9c071ed6fea96ce1af72bbb3532fe76701587110ce3f0c4809d7d2e826006453b55c225f096fd85f787210f9a49e6a028e6f419d6c6c40da04926708cab5af1cb51c473e68025bbec771c7498ad12612f92ce53ecca7efa30125ff7ae30565a010dbe97f330fbbdcee3bf2852ef0e5e649b63433e23c84ae4c3377fc78129106beb7ce808b83b561f4ffdef243c79aab7e1416eeb02f9906408f61b192f9e643cd9cadcd64cab8f197a34158195872d0d3602f1917fc9af1", 0xf1, 0x10001, 0x0, 0x2}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x6, 0x2, r4, &(0x7f0000000440)="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", 0xfc, 0x2f, 0x0, 0x3, r1}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7, 0x48, r5, &(0x7f0000000200)="0d11deef34bd58ed182cede8b44216adec00056d15becbe2a85c033914d8455e525fb50895161c966c47a97f3a00895aa8ac3ad76382530b78b070bd8ac1a66ca67c558b384db600c1c062c59b471b933b56c093a6243dcad4382215378e47d1b1f4d2202f76db51e38184f81b017d375db7be591b7743cd552de588b2f7ad0b5502dd1ef5a89c9036bd9a65a7c5907a39a4", 0x92, 0x2, 0x0, 0x0, r2}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0x7fff, r4, &(0x7f0000000580)="464e1c14af408d78807946019a5d16c772fa2d022514026341e7e5be49f88a6f8cde1f220e23791db91b9d6504531b87bddb535fa278d16faa83130dc6e6bf8f07e2d2c88ef0f4650d144185e6cc2805513d438d0acc74f344e7b7e4fb9a295092736f051911a869c3b70e0d027732ea8e8bbe90e815749239a1c3ab6f894280a4ff730a6bcf2ede7d", 0x89, 0x8, 0x0, 0x1, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x7, 0xffff, r1, &(0x7f0000000640)="433aef21ba0fa7ad330a7ce3925381a088da7f00984fcee2335e6c0c7641ac477aaa449a30360649803a7b869211acb2be6cae915431f63eb7d1e1e8ccd82b0d1299fe92d5d5b0c74c531fc0a9a4a16ff7a5a306d20c99db01b1cd6836ed573f8f1dbaecda9881f1edd7fd6a669d3f8b2dd671a7134511a2e28872b264416d8456716a5f199d9b92b144d42c28bbf8deb3fe510def3a0593f3449bd71c0f41578dedba8d2c41c609332ecfd3472bc5a03305e635ddaa392559ec9d18189e9160ee08ec266419897e93c26f", 0xcb, 0x2, 0x0, 0x3, r7}]) 04:59:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x6c00, &(0x7f00000004c0), 0x0, 0x0) 04:59:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d2e2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 288.439500][T23239] loop5: detected capacity change from 0 to 264192 [ 288.441517][T23242] loop1: detected capacity change from 0 to 264192 [ 288.475642][T23242] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:25 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xffffff7f00000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:25 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r5, &(0x7f0000000300)=""/28, 0x1c) getdents(r5, &(0x7f0000000040)=""/97, 0x61) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r6, &(0x7f0000000300)=""/28, 0x1c) getdents(r6, &(0x7f0000000040)=""/97, 0x61) sendfile(r5, r6, 0x0, 0xb) [ 288.577902][T23261] loop1: detected capacity change from 0 to 264192 [ 288.598424][T23262] loop5: detected capacity change from 0 to 264192 [ 288.634388][T23261] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:25 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xffffffff00000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:25 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x6dc182, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0xfffffffe, &(0x7f0000000040)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) [ 288.685523][T23262] loop5: detected capacity change from 0 to 264192 04:59:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d2f2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 288.745182][T23284] loop1: detected capacity change from 0 to 264192 [ 288.769611][T23284] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 288.836977][T23293] loop5: detected capacity change from 0 to 264192 04:59:25 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:25 executing program 3: open(0x0, 0x803, 0x8) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10000, 0xa1) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000080)={0x8, 'vcan0\x00', {'vxcan1\x00'}, 0x3}) futex(&(0x7f0000000000)=0x1, 0x86, 0x0, 0x0, 0x0, 0x0) 04:59:25 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r4, &(0x7f0000000300)=""/28, 0x1c) getdents(r4, &(0x7f0000000040)=""/97, 0x61) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000009, 0x20010, r4, 0x5fc3a000) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x2) 04:59:25 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xffffffffffff0700, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7400, &(0x7f00000004c0), 0x0, 0x0) 04:59:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d7b2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 289.354891][T23322] loop5: detected capacity change from 0 to 264192 [ 289.355155][T23323] loop1: detected capacity change from 0 to 264192 04:59:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2a7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:26 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xffffffffffffff7f, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 289.402676][T23323] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 289.489561][T23335] loop5: detected capacity change from 0 to 264192 04:59:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2c7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 289.536568][T23342] loop1: detected capacity change from 0 to 264192 [ 289.573533][T23342] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:26 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 289.658366][T23349] loop5: detected capacity change from 0 to 264192 04:59:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7a00, &(0x7f00000004c0), 0x0, 0x0) 04:59:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7922785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 289.736955][T23360] loop1: detected capacity change from 0 to 264192 [ 289.768645][T23360] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 289.820186][T23367] loop5: detected capacity change from 0 to 264192 04:59:26 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:26 executing program 3: open(0x0, 0x20143, 0x0) futex(&(0x7f0000000000)=0x1, 0x86, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x1000000000000085, 0x0, 0x0, &(0x7f0000000000), 0x0) 04:59:26 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x29, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7f00, &(0x7f00000004c0), 0x0, 0x0) 04:59:26 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/97, 0x61) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop6', 0x0, 0x0) getdents64(r4, &(0x7f0000000300)=""/28, 0x1c) getdents(r4, &(0x7f0000000040)=""/97, 0x61) io_submit(0x0, 0x2, &(0x7f00000004c0)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x9, 0xffffffffffffffff, &(0x7f0000000280)="6f9b9b1a5723ae74d1cfbad0b94f9b3ff30ef385bb5e13d7b8d35cd9168b3b44d06042ca56957bfc5e8fff31253d2ce9c86a5e4750657fe399878e2c51", 0x3d, 0x7, 0x0, 0x2, r0}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000440)="d14da84e6789188915759faaa9885fdfc0e9fdd40d05fa5ee0745a426fd6f57771b5dda19508b3c119e38285105738ae5d7734eac201f7f2e15c86ec554889af548a7d778203bad38be35e25bf72c1de271114f13044cdbdab7cf456deee79fbec3e7cc9", 0x64, 0x7fffffff, 0x0, 0x2}]) r5 = eventfd2(0xed1d, 0x80001) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r6, &(0x7f0000000300)=""/28, 0x1c) getdents(r6, &(0x7f0000000040)=""/97, 0x61) io_submit(0x0, 0x7, &(0x7f0000002240)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0xffff, 0xffffffffffffffff, &(0x7f00000008c0)="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", 0x1000, 0x5, 0x0, 0x1, r2}, &(0x7f0000001ec0)={0x0, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, &(0x7f0000001e40)="51f2ff137312cbd4dd3d09f42a6b5509e268c1a32a447654dff8fdf8c8887ad115461ee7c33151eaa13b95c6cecc8a91502f71b053e633a4a6a5d0e3caaaee9f9a4db364555035cd932780f35a2be8ca8a878a71e7fcca1756969dd965794ae55aa170bfb9860d9669", 0x69, 0x8, 0x0, 0x1, r0}, &(0x7f0000001f40)={0x0, 0x0, 0x0, 0x5, 0x1, r2, &(0x7f0000001f00)="b288ca15b9cc98b764550a8ea1e2ec9f4f75bfce573dd7a999b9f8a5d5ea9696ac8a7ba26935", 0x26, 0x70b89faa, 0x0, 0x1, r1}, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x5, 0x3, 0xffffffffffffffff, &(0x7f0000001f80)="7134bbe56f12188f6d51062c5987b2f1e2a7765005f0ff31a8f3550d232e5012fe9eff3486070ef7d1d97b606696afc2c76939f3f9f0d8442cf009dff52bc893644b0c6e63db7bfa8ac12a9f62358d47d70c1466f5a78ff98f7a67ed1c979bac083aee98e65d3e67d111233f03bfb6137c576afe3475aa", 0x77, 0xbc, 0x0, 0x2, r0}, &(0x7f0000002080)={0x0, 0x0, 0x0, 0x5, 0xfff9, r4, &(0x7f0000002040)="3685c9a5423c48276dd236ba91e591fa27646ce6", 0x14, 0x7fffffff}, &(0x7f0000002140)={0x0, 0x0, 0x0, 0x7, 0x20, r5, &(0x7f00000020c0)="cdd49e5e0aa3fb55b442b4873ba8c6f43854329c1ebd4f34b74a90d710c32b23d1db0660ab45190319ee91cb59cfd962b0dc55cbef1676a70239243599dfdcaf41930ffbb0651d23f16d1e59e6c7bba2d3493247903f2222e0b0faf296b969abebc8d410b46481c74e703ee24fa488f20c14c213609524a373001d8563", 0x7d, 0x1, 0x0, 0x2, r0}, &(0x7f0000002200)={0x0, 0x0, 0x0, 0x6, 0x8000, r0, &(0x7f0000002180)="c416e7fde73c5e921978d3cb1a9dcf1dbb55daabe9557a9019469db57dd4f08fd407af35300e550cda4487a4bfba73f57239aac13cb8850e6c87c82f0082d39d90505736947cf027a79dfe188052b8e89d588bba5e1b467d4a39265d3c7add052368", 0x62, 0xb, 0x0, 0x2, r6}]) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) open(&(0x7f0000000100)='./bus\x00', 0x300, 0x1a3) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r7, 0xc0505405, &(0x7f0000000040)={{0x0, 0x0, 0x10000, 0x2, 0x8000}, 0x401, 0x494, 0xf55}) sendfile(r0, r0, 0x0, 0x8080ffffff80) [ 290.308163][T23407] loop5: detected capacity change from 0 to 264192 [ 290.319456][T23408] loop1: detected capacity change from 0 to 264192 04:59:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x2}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 290.366920][T23408] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:26 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r2, &(0x7f0000000300)=""/28, 0x1c) getdents(r2, &(0x7f0000000040)=""/97, 0x61) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x13, r2, 0x95136000) r3 = creat(&(0x7f0000000740)='./bus\x00', 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x40) mount$bind(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x40000, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000007880)={&(0x7f0000001400)=ANY=[@ANYBLOB="c41e000002c903"], 0x1ec4}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000020c0), r4) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), r4) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="c3f30070850000e0000000000000000003000101"], 0x1c}}, 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r7 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r7, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) 04:59:26 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 290.455211][T23427] loop5: detected capacity change from 0 to 264192 04:59:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x3}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 290.506835][T23431] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:27 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 290.572019][T23440] loop5: detected capacity change from 0 to 264192 04:59:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x4}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 290.644926][T23450] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 290.722859][T23459] loop5: detected capacity change from 0 to 264192 04:59:27 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:27 executing program 3: open(0x0, 0xb4f252ee1fb7beb1, 0x0) futex(&(0x7f0000000000)=0x1, 0x86, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) nanosleep(&(0x7f0000000080)={r0, r1+60000000}, &(0x7f00000000c0)) futex(0x0, 0x1000000000000085, 0x0, 0x0, &(0x7f0000000000), 0x0) 04:59:27 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x5}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x8004, &(0x7f00000004c0), 0x0, 0x0) 04:59:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x6}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 291.093914][T23483] loop5: detected capacity change from 0 to 264192 [ 291.127710][T23482] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:27 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 291.209645][T23494] loop5: detected capacity change from 0 to 264192 [ 291.290607][T23506] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:27 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r5, &(0x7f0000000080)=0x3f, 0x2) 04:59:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x7}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:27 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 291.444340][T23524] loop5: detected capacity change from 0 to 264192 [ 291.459166][T23525] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x8}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x20000, &(0x7f00000004c0), 0x0, 0x0) [ 291.570858][T23542] loop5: detected capacity change from 0 to 264192 04:59:28 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6040000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 291.635846][T23542] loop5: detected capacity change from 0 to 264192 04:59:28 executing program 3: r0 = open(0x0, 0x0, 0x20) futex(&(0x7f0000000000)=0x1, 0x86, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000200)=@OVL_FILEID_V0={0xd1, 0xfb, {0x0, 0xfb, 0xd1, 0x7, 0x40, "489412000af9c0b2ac102e7d6da0436c", "390eddb56e2ddfeac8710f9d3ec17003594de5f846709b14a84725e59e6012dd26737f8c243eb711638ce4b7d5befe4faa5e1d309fbe9dbb99f46dce49459f383cc0a6427dc25426d03bcc68cfad2358b5ef161c19c45f9279d92df86c628a0ff888efb2de333c0505a8e6f4e2a13facc86fdb71fda7d7e0c0c4d123b16412e95e6db3e1029e657d886a5a4ce0d04872ae28212b7b357a84ec7eb5720fa589f44c36ecfe511954b23afc3314267050ccc8a52ef6cf5d2e11a4fa0c24"}}, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) rt_sigtimedwait(&(0x7f00000000c0)={[0x1]}, &(0x7f0000000100), &(0x7f00000001c0)={r1, r2+10000000}, 0x8) futex(0x0, 0x1000000000000085, 0x0, 0x0, &(0x7f0000000000), 0x0) clock_nanosleep(0x0, 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080)) 04:59:28 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x14}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x5c}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 292.027257][T23568] loop5: detected capacity change from 0 to 264192 [ 292.038438][T23569] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:28 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x8, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x300}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 292.139453][T23581] loop5: detected capacity change from 0 to 264192 [ 292.166447][T23590] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 292.256231][T23600] loop5: detected capacity change from 0 to 264192 04:59:28 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x9, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x2000}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x200000, &(0x7f00000004c0), 0x0, 0x0) 04:59:29 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 292.465244][T23614] loop5: detected capacity change from 0 to 264192 [ 292.474425][T23613] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x2a00}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:29 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 292.589696][T23629] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 292.606271][T23638] loop5: detected capacity change from 0 to 264192 04:59:29 executing program 3: ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000040)={0x17, 0x3b, 0x0, 0xc, 0x9, 0x1, 0x2, 0x83, 0x1}) open(0x0, 0x0, 0x0) futex(&(0x7f00000000c0)=0x10000001, 0x80, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x1000000000000085, 0x0, 0x0, &(0x7f0000000000), 0x0) 04:59:29 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x21636395bd644e4b}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x20, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x100, 0x80}}}}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r2, &(0x7f0000000300)=""/28, 0x1c) getdents(r2, &(0x7f0000000040)=""/97, 0x61) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_START_AP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x74, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, {@wo_ht={{}, {}, @broadcast, @device_a, @from_mac}, 0x0, @default, 0x1, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_AUTH_TYPE={0x8}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x74}}, 0x0) sendmsg$NL80211_CMD_START_NAN(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x3, 0x48}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x800) lseek(r1, 0x41fe, 0x0) creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r6, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r7, 0x8004f50e, &(0x7f0000000040)) 04:59:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x2dfa4}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:29 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:29 executing program 3: open(0x0, 0x0, 0x0) futex(&(0x7f0000000000)=0x1, 0x86, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x1000000000000085, 0x0, 0x0, &(0x7f0000000000), 0x1) [ 293.032430][T23663] loop5: detected capacity change from 0 to 264192 [ 293.035975][T23661] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x40800}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:29 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xc, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:29 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r2) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000580)={0x170, r4, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x3a}}, {@pci, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}]}, 0x17b}, 0x1, 0x0, 0x0, 0x4000000}, 0x14) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) [ 293.165826][T23686] loop5: detected capacity change from 0 to 264192 [ 293.241799][T23697] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x7ffffffffffff}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xf0ff1f, &(0x7f00000004c0), 0x0, 0x0) 04:59:29 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xd, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 293.396802][T23713] loop5: detected capacity change from 0 to 264192 [ 293.411612][T23716] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:30 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x8000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0xffffffffffffffff}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:30 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xe, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 293.558809][T23736] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 293.560866][T23740] loop5: detected capacity change from 0 to 264192 04:59:30 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:30 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = signalfd4(r0, &(0x7f00000002c0)={[0x8]}, 0x8, 0x80000) pipe2(&(0x7f0000000340)={0xffffffffffffffff}, 0x59b2164ab96a8be2) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x2000008, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',uname=,loose,appraise_type=imasig,obj_user=/proc/sys/net/ipv4/tcp_rmem\x00,dont_measure,fowner=', @ANYRESDEC, @ANYBLOB=',fowner<', @ANYRES64=r2, @ANYBLOB="2c736d61636b6673726f6f743d76657273696f6e3d03000000000000002c00"]) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x9000) io_uring_enter(r4, 0x6016, 0x7108, 0x1, &(0x7f0000000500)={[0x7]}, 0x8) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000001340)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1c00000007ffff0f002b61ab6950d52f5e", @ANYRES32=r0], 0x52) clone(0x90a000, &(0x7f0000000540)="903b13f2693154b6399bbfd44cc2c285fefa110d869b76a7351168cb55327c8d6fbe9137db705774ab81c09cab06575cb6f86569c1cae2acf9a06e2d4d4d7d8338af4bbe857b92cc37e3b23504239bed41c7b2e046594534e9a497b6818e9457a5e29559d89e0a54e87fdb995a4b7c143112dd1fc25cf4e00fa090ad556c280604ee5f88818678589dc3356db24416268fd0b935a75eca049a26fd7ff49503d7fb9d16173ae7478d75aa8fdaa942f98291234ca1375fb6524ff097ab08737b5de56eb7d16315982e7378d2f0314b8f625e26af6e18bf977e95655e293ba9", &(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)="542b4bd39da6fd41887c9c5149845d4e67dd4eddfba1f7590098f2dbb9318e2a642b92c0") r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r5, &(0x7f0000000300)=""/28, 0x1c) getdents(r5, &(0x7f0000000040)=""/97, 0x61) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u}]}}) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 293.697861][T23749] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 293.726298][T23756] 9pnet: Insufficient options for proto=fd [ 293.746197][T23756] 9pnet: p9_errstr2errno: server reported unknown error +a«iPÕ/^ [ 293.793588][T23756] loop5: detected capacity change from 0 to 264192 [ 293.826618][T23766] 9pnet: Insufficient options for proto=fd [ 293.895354][T23766] loop5: detected capacity change from 0 to 264192 04:59:30 executing program 3: r0 = open(0x0, 0x0, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) dup2(r0, r1) futex(&(0x7f0000000000)=0x1, 0x86, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000080)={0xa952, 0x7, 0x0, 0x27e0044c, 0x5, [{0x3, 0x1, 0x2, '\x00', 0x1a08}, {0xff, 0xffffffff, 0xbe35, '\x00', 0x8}, {0x493d, 0x52f845c4, 0x7}, {0x801, 0x1, 0x800, '\x00', 0x80}, {0x0, 0x1ff, 0x0, '\x00', 0x3000}]}) futex(0x0, 0x1000000000000085, 0x0, 0x0, &(0x7f0000000000), 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2) 04:59:30 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x10, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:30 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/kernel', 0x0, 0x0) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/153) msgctl$IPC_RMID(0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r1, &(0x7f0000000300)=""/28, 0x1c) epoll_create1(0x80000) getdents(r1, &(0x7f0000000040)=""/97, 0x61) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0x100000001}, {&(0x7f0000000140)="7607aae6eae97efaa9348a0422bb06b64909d798fa528ebc8200000000000000000000000028f75a25ec7ea930343d7e1457e98b9f2a68e2a88532eada73aa109fa3f34300a45bae9684b56e512599872592f3694283ab2f4f8c738a413a53b4c6ab97623d3eca9a0bbf4a3b83b2c5841906a6795930d7c3d09029a4e1bc7b009082db558651c32c95ad92570b32fa43141403069daf9e25b9d5b333627e9195003a0aba66dba8", 0xa7, 0x2}], 0x309f014, &(0x7f0000001380)=ANY=[@ANYRES64=r1, @ANYBLOB="1e5980a867510960236b7e7b8a30c5e35d8445a1c0cacb994947e9946dad0bac02b5b4e67e8cf3476ccfb1001e02f3add33864746de7e974be91c6caf0bdc9d4d84dcbd6a69d0112eddea9a857b79e8a7c6732a65ad6a5e9b4544a793e331445bc5b5d8dfeab0dc10bdca73a6e65e454ff367d32e28f3d56737b9e4c03ed6d84df8340524935da5ff0c926d28dd443dd11f663b97f5569bb6a8f4e437e671e2e05d1cb3da4455c3524ccd63a712e63ea51d730d87f50d0c2a5bca83b3ab21998682c7166f482aaa3ddeec9078ee9386ce56bbee72b3fd3a8879ce8bffbca45dad5fad187e156f08d73acae3bbb9ab4e8a23c8830055a152dfa6540b7338f92d83c57fe47939c5e039424dc8395ec0ddb65c01954e7d3ebc91e4d6b8dc9d330007db7c28324e42d27c0c05fc7bae28d386a8ca2c905720c5e419a052a9e35b09519368b4edda6a57653cdade66478af387afc41f4cf159d069289b865bcf6d9283ebfb27292020d4abdb74b8d23421237855f82498ebd9ae9cf9f5c7d4376c6db27d2e4c4633a8cec484e734dd5e329211b038c3cc2f507eed72eb01fea164e8187f59ad99e1edb946d75b9e15ab7a6d347c898c704ad6f9e2e9c758ad1b8dbccea99e6d3fc6650fb601e7c324aa715ec9fd99a5bad2798e45fecbfdf9205efb782a918012c4f021ad44a1d892007e169a70630c409de8560746172e87abe6a7417169639247d1d17603c1eeafe7658b3bfbc04c35b4e8cfe9cf600d44438a62532e3d25d3aad8c8076f45c22e5b8def8dd42ec9b99bf8efc60988edfd0ee3daa6d701597145bf85c7f77669365b3fb9e32cfcc2596df0d64e9b411b3c64945ce92fba5a945d876c1711105429682da36ad8460733d5d9c5692a64cb93b2fee14ed394501d6820506b881a07a8036249a138b4652ab4daf4a7d0f18630b9fb7016fe7d932d9c308f4cd80d607d689a1cae9ba9cf5b0430790e8b7eef7156efd622ea4569773126e7b7bd6d7e4efb60cdb0368ccc9633abcc477ff6b7f20b72bf570e02be390878789ad85be4cb3d6e200ade6629857950a6da9238e9cf03e36e73b7343d40a6614aa2c4a9ce316dea9bc4b48ee1589f43fc3d30877589d170ec0df3022f84505f16aec66fd8ebd7ca48c90f0cafe9c0d55131d5eb458ec2a93b4f2afcacdf18a4c02a90fd34a7985d6dfe6f6a01af12988f3c2bf2e9a23f88c38f5311760c1f5e2a289c538a69fd425ab8eab508d7c31a1940edc9ece15c78258ee6f0784576a855c16f16e069bc96759a090034b73e2e146a1beac3eb030cb3dd09ed924f951c302182bf57ddcbad731feb0dba84877ca9a7e85e693feb0b1e0899c2c2ef7bd8ec4483445113a27a582c1b0eee4540dfb3e1bd8541a5ab69134ade72c2f04f0260513eb4c416249d947f8fc1cedd998755eb75da4a96301586af648bf01b6332a77e26304e85496127eb0d33b48817a054347a2d56d9cf2ab9455321beb7cdaf0a0e14f3bc1ffb204ae9a798cd020deea5056ab459094ac332736a9f2f74d9f282a5e3be8d45fce943bba2274d4ac77eac0641bf74e08e4faedf57d30c5980f41e930e0aa2c107bab4bf4faf473ae4ef37f9889997cdf46f9578e60088a3a08b118896bff8387f4bf609bda0aa043e667e6f4a5d03ff5d873d5cab62717a66c3f60bd075111f2abcefe0d9dc4700306b6acb729dfbcc721886a2ca3592180be393cab83c87d15d8e65e64ea0f698c9313206b94ed8040293c93bc07b1c5675913b4bfbb52d4517f50a4bff43ad87cb33aa4142c4e57e01a4a482ed22ff6b1e18d43de8d657b3204cc4124923d7045bdc3122fd05a1a5652f94023066baf5af0f5811a1e86c424a9cdaefc22fc7f26399f689f4dcf5c792ba8748fc55c1c57a76797d615f8f96776ade10e9941498d580cd24eecd7d91395b5cfaffef77e3bc122170b00ff0d2cb1a14635e492bab9d7d314f1a83847441f3c8a7c17f23a799fb9dfe5961857f884d38a48595ea598901bcf773dc3ebae1aa8b21065a7fc2a90e910f5c8ef4ac4cbb859cc6bd119412e5f0120eca274097ee3c43025fd8565e6a83f72efd07e91eccc17157c30d552225248194a51de449830d4ce6c6e67d412f02a11da9b8949a882dd23bf5225a748a0b4736cf902041dbd21439918332a40b653d00aa92b12b84c49f80a7a776e7b7c0bc8c520632be3e456de51c1352dd3820c4774e29541fcd4bbf111ebbfbc562e10596e39e17ab5dd7b962951016f4c3eb2f57bbe5bfabfe1a329cd9af77cb7d0ef3552d52c6f251365a3eb4678f9410469b9e06e9b00d746f77851d00f94aa78b5642d6937f948ced60308e7131863f0108b2b27ac042bac09333a50ac44c0bb790a5f1223b9425662d5843a547415514d2cec17f82fbfb9aed6fc30692982178fe1ca18b3efb4c9d8be2599abd4596641c90c6bb0c58a435b781e076bde043bdbb418ced9d204f9ccaed90db14d3bf8e5cfe2199061bd7e4d934bd7f992e6a95ebcc47debadd21ccbbe070a1c39e1ed6d7dafc7704c9b2279ec522bfb35a7b8278e9142363c12424940edba4dc941f4eea034f522bf7d8f91c3a3d75219d00beeccac428a60cb599c70d001ceb4a9f053dfa2436e4cf09aa173a0a265174210e4ac5af7f15fc6010536673edfb540caffbf906d2c7e6966366c0e9aa168eec21e883fa59244cd86421975d0f648341217023489e363a2bc5d9c60253fba80fac72584248e23b20dbaa37484dd0451930966e23825b96f120560cc037615962c5d4d2bfa43aad005ef9369b7ea41fc97093719115dd32b3f45efb15f124b8d394bd7e164633498158cb4d7c4a0fbf9d3b21978037cf37ab7093256d63742364beeadbf2dde5c19174ab864641827f1e7c94a5f39866a91974cf0bc8d6f03e2205f5c4d2e585d19b238f51c287d1e88f0d171e06f86ce6de710b5ae548f5fb96b06c83cbd3fcb415ab25116c87e9bb9857e5ac6ae46a71ded9c3689032b0f6bfdc05d88cd5527993993abee1710e1934ed9aacdbe23d4441ddf56f79c6bb3374c1174a125ae285325574857ce56f897ff1c8cc1201f4721491c6b6b76404386e7650390662f35d6442d094f96da0dc09ef043e4e01e4d045536883d6c0094d440c85c3c0ea84bcdd5b6f0a745fdb71900e53ebcc7fa1bf0c77e4164794b94b9b1fb37a1510ba5a102424dd7c478753c9dc576fe8e688fe0a248c604830961b773dd122b9bbdbf4adc8c8e6caa4a4d938478dbc5b75c9d15c8ed47e8ce8d9b3f81c9936312283b33695571896761c96a24ea6cc7fdf3e2a0752b57fd8806815963a4e940b9428bc73995e9c260a2ca589e3be9e1cc1ffc498feefe280f5a6544184243d7b15c19c3e8aba440a63d0cfcd87a7025f91af1491226e6d7ea4db899bbdc6bec03fa35178d5dcd114565ada726ed4569c4e52cb8e4e8fa20aae7270386cbc8cf4b81eba1beb9ec6d392bea34dac60747feb320d077b7ceabb5ae1d1ea54a4b3ad540e54f0a8c9dc61c21415fd40059c9688c12b10441c58b48aeeb7a388825e34e0cc8a132e0f4125bc180a6d1b32fc185b4ad62ff9ea372167ef87004c3499b8cb21b9c9b45bd4be2885af4c0dabf4b51542dd2503d5892e2bfe179f0d2a4d609612ca3045b57fed20f8a3249b9e2a4c0e5547a785907d19cb3ef02b6fcccd02a328cf82d29021b9d8300550c7d1cedbcadbc42d16becbffaa2d916474cfa16c02839139447526340374c4d0d63a17c5e1beeb10fd96731b0a9202d5b34c79e7d5634a48207420e5508d5a86a2dbdda72d1681c28420c21a1a51e19aeee2903a98f26876b35ffc39f45a1ad82e0917716f39ed83ef443ef984996e7f5384ed49d264c596423a6e5bc96426bf74f17095eaa84022e61843a32cf598e7048a27f7891df37094c9993e14045eb97c54a4603962e12bd9d4b6b529e48670bd54396f0bb8bf19009ee3a4d233f976047a82ab9dab771d32383294b775d9bbd1d16cdf49c21028840e59e8f9ad9e15e2e8e6bd12451f32146bfd14a66c93b2d815b34b0668756bdc531cb4912f08dc82dfb5a39ba132f40f42e8625fe3b74321fa8b7ab7cf899ce5fd8970a47365d8e2211b2725d3e0101db2f20f1db76ce16a0c6b3a59a4f58078163cf9379144418c7fcc59160f7a9cfd905ca15d762394c546d771cfd99a1b212056cc46bfebd5597d0f622a5d9b675695e0e1d048ab9efc5b843d430b68684e235e92da5456f61655d47ee8e705e7f4afa9033742ffd48623b1b0494c21160fb73c99fdf777f7bb6b16764a449c320046c447b0944cbb75f9495c7ee37edccaa0a85963cd2222d131c4249108b02a95eb5a3e86a41e5e2ab827d6a9f29c1fd71e99f4b8dd6319b16e67f59074e25444dcb2e4c7b15126a8412dd7899c684d315581a92ca0d9aef5d42e1e95dc987f56038474a4282f45012c8880d5456ae74fe3f100f7ff2fc4ef26bf90cd94e48d727f1bb56ebc0262f32f91a139e00435c59da02307b0ec088f9458799fa15c7b10e52ff83837cca41e49827f81e5824d2d2f5a24e152c6eb668422a25d9406a0c9fd2000f9d82450a4fae901f5bb96dfdc8cc9f456a52971c9042175fc2e1c660eb14e5934dd3a0a42903da9d2333f266c2594f98081c9a2b053daeec6cb1ea546c1d146fbef9266da5b95bf78b2cb5f91fc70b891cb6c6ac49d7ab8966c775e10f9aa3ce2d23c75b7ce8ba68956af026504471392ad53935f9b5e128eea2582381ab1c6fa41b46793e965f10393e5872dde1ad6f9167acd7b4ca1573a6ac84221f80aab9db32197032f3329c744f5990e49b856b8ad9e33cf83c8262c4c529d1f7288b876c1bb01965c05f962edbd689bcc5815530cd1f55be9eca3f659222891c2a2569f9b73c41e42df5ee2051d28de2d99c11731045f73c3fd1e10b4d991801591aa18a895f8e5f20eea61d720ec9e536dc4745fa10681b0220ee5d5dbb492de9bd7bbc386938e344e8b1ae1ae948c3bba75ea792eb68a0ef953b94cc02cc6b8d6e26fb4169ef987d5aac860e64fc5ad8e2806d7b4ebd3e9cdc01d041a21e572ee51014d6a58c648dabdb3fed4b5816f8c749139d852db8c4d749d8f3ea3b20e077e568281d9c7114b975eb000254964b4afce72397fd2ba5fa045afc5f5cdf215cb7b35d1e0b6c4a9204ab93782e2da417e68bfd602c8d753c432876f9b8458783efad6fbb8fbf76a6218c86c29abb9773185d9db7c700e41a66e553202454ea11fc6a4237a3679b166306e96638e137bdf07694a69983c51653b7a74633c62a24de94686157bfc44c2538b9c2975711689a9486d751f9592dc7f5654a36bba08dc8086c2a43613616bfefa1ba14232f1a39897dc1637e6adde2c676ccf79ac23e2bdb71d3d001c7e7b393b99ed5c10edc835369f8d231c3a234ecf01a03ce5ae87f02b3859e6ccfbc38ba3d3e6aebf6734f63abf236cf7bed6dbd064d376cfc8b151db441ae309362fa7ccb59ad9470798002035322da20012626d5556e71abba08f50d903db7869c86300ff67f23ebab796e7a0968e317d3f8cb207587c9d173450a5358dc1547ded2ad189d49fdb6c1aec4e6a5b545a09f95c3e4a94445d8071733a417f55d5ff553a53ec6fe050259a3641619ec6e7d0fbd108a0b85b88cf098229004d98db6628ba311372ace4b96aeb878a45a93412610eb618bbabfe298d5b5449f3d1158f05ba3cbee06fb3df5bd9528c1e8e22b767b52122ad73f8fc0ca7c56eec719d3bfef7c0a37cec5327b72a23b8281ce050d801d114ced55267d855c6487b28f643faf43f60fd25c22b068c8441d4535a8fa66648a030b6b59a6d4cf66afcf79902b5f4f33498e9e98b1f9cb9800"/4181]) open(&(0x7f0000000000)='./file0\x00', 0x52200, 0x22) chdir(&(0x7f0000000080)='./file0\x00') [ 294.044684][T23783] loop5: detected capacity change from 0 to 264192 [ 294.059693][T23785] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:30 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = syz_io_uring_complete(0x0) lseek(r2, 0x10001, 0x4) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x11c) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) 04:59:30 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x11, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 294.203082][T23807] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x107) open(&(0x7f00000000c0)='./file0\x00', 0x408000, 0x0) [ 294.300535][T23821] loop5: detected capacity change from 0 to 264192 04:59:30 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x18000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:30 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x12, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:30 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r5, &(0x7f0000000300)=""/28, 0x1c) getdents(r5, &(0x7f0000000040)=""/97, 0x61) lseek(r5, 0x200000004, 0x3) sendfile(r4, r4, 0x0, 0x8400ffffff5b) sendfile(r0, r0, 0x0, 0x8080ffffff80) 04:59:30 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x100) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000080)={'L-', 0x10001}, 0x16, 0x1) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) r0 = open(&(0x7f0000000000)='./file0\x00', 0x90580, 0x66) openat(r0, &(0x7f0000000080)='./file0\x00', 0x80040, 0x100) [ 294.467422][T23837] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 294.475583][T23842] loop5: detected capacity change from 0 to 264192 [ 294.574445][T23854] loop5: detected capacity change from 0 to 264192 04:59:31 executing program 3: r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x2f, 0xff, 0x6, 0x3, 0xc, @private0={0xfc, 0x0, '\x00', 0x1}, @remote, 0x8000, 0x700, 0x8001, 0xa1}}) open(0x0, 0x0, 0xd072893ebc4126d) futex(&(0x7f0000000000)=0x1, 0x86, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x1000000000000085, 0x0, 0x0, &(0x7f0000000000), 0x0) 04:59:31 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x22, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:31 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) open(&(0x7f0000000200)='./bus\x00', 0x24000, 0x30) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) dup(r2) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x1c}}, 0x40) 04:59:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ncpfs\x00', 0x8, &(0x7f0000000140)='vfat\x00') 04:59:31 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x25, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 294.951798][T23876] loop5: detected capacity change from 0 to 264192 [ 294.960821][T23875] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 295.056032][T23890] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:31 executing program 5: getdents64(0xffffffffffffffff, &(0x7f0000000300)=""/28, 0x1c) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/97, 0x61) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0/file0\x00', 0xfffffffffffffffc, 0x4, &(0x7f00000014c0)=[{&(0x7f0000000200)="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", 0x1000, 0x8}, {&(0x7f0000001200)="526dda5bdfeb87afe6db379ba114bc17e3348ef3bb77f9b57d61454a1e2426c66e4bde316c14ecde6faf0c082393892c7190b76278029666471c30c3d56f690616d1fc459b9605d48787df1ed2db5605e63565bb1bcc5de4857b272a5f114367d513394fb2ab71e6940a38cce486d59d2349ac85e38d8823e96cd39a652226b4f8deea5a6c53964d093feab243d045a75dcc29cecc49dc4520ca9162", 0x9c, 0x80}, {&(0x7f00000012c0)="7babb980443212056ec68f8ae833c280be66dfeaf5e0d038cfe951fa4b45ca947ca3475f78ce60ebe929d017ab390b6b530d2220977fa14dab2e76f902eecd5959e04019d68c6ed63b7b56e77ea05b0a80b4013ca08e923d8c692c144229d42181c0569e24c77bd00f157755f7af151570349d4ab88e50c8a1ea540b87714f36b1bf917aca9ee78e315b4f6eb2fd16d92c144552455b2ef74ae3d627771aecf487d6060e4985d9d9ee85af3ce19896937320bd611178d085955e9451bef785ffa59a2bfef00ffe6d12cde5c1f78109fc32e88c8ddefac7c3fca80692f1", 0xdd, 0x7}, {&(0x7f00000013c0)="888f35a6f2db850826e9366587b6ef2f1c5d559d9612bb863ebacbcec6c59ab9f0996c04e2c26b14bee21f3c34e5f8c4337365cddbb3129255b27de7f22e496090c8072d4ef85c0c74c88a0b7291af40680e392691c8b9001b320674194051bf3e6f340a3a102dd2125c43cde15873f81a6d56dd74297a306d3254d4e55d4eb308338174a04d8e69beadda3025069eda303f81b2de6bd9934c894cab2bae4a795eb33e1dd501478903c883a017576ad65fd60c283a8688453a39fb08b74ac153c6a4816fddbcfe77082b11f6f0ba9f14f1687a6b388bd81d", 0xd8, 0x6}], 0x301d014, &(0x7f00000015c0)=ANY=[@ANYBLOB="85888bc6442eabe6acb210e87f980ada46b72db98fec490b8c6ec9b4b26e1e3017138ec5ab0f8fd9a2d637720b1249dce5c5be802aecc6f400bf20fd4b07cccf9aab900fcad46820e62d5b2f379a1dfde49b5b76519ab2a8d0636211b695099c48565ac13e0dc25f28a7fd0df01a798a2a555f1bdfb8cf5e402bfd1184f221a3b3f243c875e370315a132ccd62e30ff3236670b141231032e62509114d71ba4100000000b3fcd0fa0621631bfab318991ecf8cb074c351e81139d518ab7c70fc12ca30a08d15b21c9b", @ANYRESHEX, @ANYRESHEX, @ANYRESHEX, @ANYRESHEX, @ANYRES32=0x0, @ANYRESDEC=r0]) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x1de) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x100, 0x2) chdir(&(0x7f0000000000)='./file0/file0\x00') open(&(0x7f0000000100)='./file0/file0\x00', 0x200000, 0x0) [ 295.193809][T23903] loop5: detected capacity change from 0 to 264192 [ 295.247121][T23903] loop5: detected capacity change from 0 to 264192 04:59:31 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x26000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:31 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x48, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:31 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r1, &(0x7f0000000300)=""/28, 0x1c) getdents(r1, &(0x7f0000000040)=""/97, 0x61) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r2, &(0x7f0000000300)=""/28, 0x1c) getdents(r2, &(0x7f0000000040)=""/97, 0x61) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[@ANYRES64=r0, @ANYRESOCT=r0, @ANYRESOCT=r0, @ANYBLOB="c9d52fdf4e772206b30acb8c79d30f9689c4dd3b511a22f2f90e405fedd4a2f9ed63ab546c4a5c36bac72554d3b1235324f7eebe7bfce373c424cd07c0f9db8e726af4568ca83c108352147ea5bf0f053b81d41fad7676d1c663e8e4cc31072b1dc3e3ac233e07c390456f37f91ccdbc93f33319df0a4d61a2be8bf911a32799b38085dd0bd684e183047d29b7c1839b01cf42ea0b08b34de38952dd87ef6069ce1f51f550ee98ed5e1067f61c5ee93debb2bc91fb684aacbdbccc853eee39c6787ad9248c4caa4c9845e7666d248e18ea0e12f89f721da42969a9b172dcae0341fdf829d4c3ad9b7a", @ANYRESDEC=r0, @ANYRES64=r1, @ANYRESDEC=r2, @ANYRES16, @ANYRES32, @ANYRESHEX=0x0]) [ 295.390534][T23924] loop5: detected capacity change from 0 to 264192 [ 295.404429][T23927] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:32 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4c, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) statfs(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)=""/159) [ 295.515417][T23943] loop5: detected capacity change from 0 to 264192 [ 295.524978][T23941] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:32 executing program 3: r0 = open(0x0, 0xb9003, 0x0) futex(&(0x7f0000000000)=0x1, 0x86, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x1, 0x0, 0x0, &(0x7f0000000040), 0x2) r1 = pidfd_getfd(r0, r0, 0x0) sendmsg$IPSET_CMD_TEST(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xcc, 0xb, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0xff}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8000}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x100}, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}}}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x6}]}, @IPSET_ATTR_ADT={0x28, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e24}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e24}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0xfffa}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6}, @IPSET_ATTR_ADT={0x40, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz1\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x10001}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0xac}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40020}, 0x4040810) 04:59:32 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x60, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:32 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000680), 0x4800, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r5, &(0x7f0000000300)=""/28, 0x1c) getdents(r5, &(0x7f0000000040)=""/97, 0x61) io_submit(0x0, 0x4, &(0x7f0000000780)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x400, r2, &(0x7f0000000200)="6f6d38ffeb38145c78dab63b5fc78e217bb2d3e9a74964049ae567782bf7babe76b6cc2e69b56dab9c93732f92ed324f0733373686bf264dd09730059de2b8f2eeb924fc0606e19d912f188c00fb8e74338878b5cc8277073aba45a65a01aea058bf12cfeff1a0c4c99315e1ae22d3f8bcd5235fdcc31c6011b1", 0x7a, 0x7bd, 0x0, 0x2, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x2, 0x9688, 0xffffffffffffffff, &(0x7f0000000440)="13e567d7216c52026bdfd698c197c389888e83f5050496cbb346452d34b53435761ae4f019b44e824beeaffd3cf4aff335a234d9754ee6973f0ea7e931caf4701e305e04a9c6a96798f2d8de88cce7e6098cb0b7fe73682db8ce35034edbceb862627c323094dd1d7b15f25386679050b3adb6ada7f1c33bbca9b7961be8a54bc054391c33d99603c2c6ae8fddb3489bd0d40b0f8e2f9c967db683c7693677e651de351c68e94cb6d9d76c43cd009fbb2ab11f7fdff48714744a0910e18434276a12ed5ad2ee168a5b717f788d98fe1eb5c029cf58b087d4f91687ebcaf0892782e69f866f3d5ac6", 0xe8, 0x5, 0x0, 0x2}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x6, 0x200, 0xffffffffffffffff, &(0x7f00000005c0)="3bb26077d9a6263663ff50ead42f7d095bcd91b3e2385952ed00c9644ada6a47679669eb6b55ba35c95df68bfef79ca1789072e4a7148bb8c1a4ed3fe0c8a53b18282ce030bd635d69e48bb820232f4cdcdac40a", 0x54, 0xed7b}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x7, 0x8001, r4, &(0x7f00000006c0)="9b23f357a78e32efb2c7f41c6ad2ab7bdf1446245461bf03040d542ee62744159a747a35aab449916982", 0x2a, 0x0, 0x0, 0x3, r5}]) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r6, &(0x7f0000000300)=""/28, 0x1c) getdents(r6, &(0x7f0000000040)=""/97, 0x61) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8800) sendfile(r6, r7, &(0x7f0000000040)=0x8, 0x800000000000) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000100)=0x3) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r8 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r8, 0x0, 0x8400fffffffb) sendfile(r7, r0, 0x0, 0x8080ffffff82) 04:59:32 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) creat(&(0x7f00000000c0)='./file0\x00', 0x94) mount_setattr(r0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)={0x1000f0, 0x44}, 0x20) [ 295.853306][T23958] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:32 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x68, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 295.921482][T23968] loop5: detected capacity change from 0 to 264192 [ 295.989148][T23978] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xd7de, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000080)=ANY=[]) unlink(&(0x7f0000000000)='./file0\x00') chdir(&(0x7f0000000080)='./file0\x00') [ 296.096410][T23991] loop5: detected capacity change from 0 to 264192 04:59:32 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x30050000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:32 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6c, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000001540), 0x301c014, &(0x7f0000000000)=ANY=[@ANYRESDEC]) [ 296.279463][T24006] loop5: detected capacity change from 0 to 264192 [ 296.294996][T24007] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file0\x00') 04:59:32 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x74, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 296.436957][T24023] loop5: detected capacity change from 0 to 264192 [ 296.450234][T24024] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:33 executing program 3: open(0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x480, 0x0) futex(&(0x7f0000000000)=0x1, 0x86, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x1000000000000085, 0x0, 0x0, &(0x7f0000000000), 0x0) 04:59:33 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7a, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 296.764321][T24043] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:33 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) write$P9_RREAD(r0, &(0x7f0000000040)={0x10, 0x75, 0x2, {0x5, "1c0f680ce8"}}, 0x10) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) openat(r0, &(0x7f0000000000)='./bus\x00', 0x400, 0x80) 04:59:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x800002, &(0x7f00000001c0)={[{@huge_within_size}], [{@subj_user={'subj_user', 0x3d, 'vfat\x00'}}, {@euid_gt={'euid>', r0}}, {@pcr={'pcr', 0x3d, 0x1c}}, {@dont_measure}, {@seclabel}, {@context={'context', 0x3d, 'sysadm_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) 04:59:33 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfe, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 296.916100][T24063] loop5: detected capacity change from 0 to 264192 [ 296.951646][T24066] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4000000, &(0x7f00000004c0), 0x0, 0x0) [ 296.962152][T24063] tmpfs: Unsupported parameter 'huge' 04:59:33 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x204, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 297.014875][T24063] loop5: detected capacity change from 0 to 264192 04:59:33 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3f000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:33 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x301c014, &(0x7f0000000000)=ANY=[@ANYRESDEC]) getdents64(r0, &(0x7f0000000140)=""/189, 0xbd) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x400) r1 = signalfd4(r0, 0x0, 0x0, 0x800) openat(r1, &(0x7f0000000080)='./file0\x00', 0x1a9001, 0x0) [ 297.138901][T24087] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:33 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x300, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:33 executing program 5: r0 = clone3(&(0x7f0000000300)={0x200000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), {0x2d}, &(0x7f0000000180)=""/229, 0xe5, &(0x7f0000000280)=""/41, &(0x7f00000002c0)=[0xffffffffffffffff], 0x1}, 0x58) r1 = syz_open_dev$vcsu(&(0x7f0000000400), 0xac63, 0x20000) waitid$P_PIDFD(0x3, r1, 0x0, 0x8, &(0x7f0000000440)) ioprio_set$pid(0x0, r0, 0x800a) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000005}, {&(0x7f0000000000)="766740be85ce4e8d835e5dd9ae44578b358526f084", 0x15, 0x4}], 0x301c014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f00000003c0)='./file0\x00') chdir(&(0x7f0000000380)='./file0\x00') 04:59:33 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x402, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 297.298250][T24113] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 297.327582][T24112] loop5: detected capacity change from 0 to 264192 [ 297.407452][T24124] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 297.426580][T24128] loop5: detected capacity change from 0 to 264192 04:59:34 executing program 3: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x402, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'geneve0\x00', &(0x7f0000000000)=@ethtool_test={0x1a, 0x4, 0x5, 0x3, [0x0, 0x7, 0x7]}}) socketpair(0x4, 0x6, 0x7, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="e023a45529ca118e730c8ec28d362d0e506db33328d659e149fcef1f4f58b10adc337027f1d7e33eabcdb706b50273e89152390b3771e17768f0505c91a37183998cd31cff9ae22c57493930a9e42f8eeb2784f355531e2784fe3d04e9676be7eee62d27e7a12d4d60c19435b4d055e75e4f25e5bf96b168ef15cb424f672eed5692a27bf4571814d3e8d2047e923d59603d028596e89e85edd8dc54249f623d9c90d3cf54756410756ea41d781e73cb29c2d37cf2b0930bcbe85f3561478c9d73a63316d7487b0408eac45cfca158404811b7b44aa04bd306c4386b94717aacbb8b0edd1a0a5c", 0xe7}, {&(0x7f0000000500)="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", 0x1000}], 0x2}, 0x0) [ 297.697746][T24144] loop5: detected capacity change from 0 to 264192 [ 297.765794][T24147] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:34 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x406, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:34 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$inet_int(r0, 0x29, 0x12, 0x0, &(0x7f0000000080)) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:34 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x400001ff, &(0x7f0000000400)=0x0) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)=0x0) io_submit(r5, 0x2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r4, &(0x7f0000000000), 0x16000}]) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000, 0x0, 0x2}]) recvmsg$unix(r2, &(0x7f0000000100)={&(0x7f0000000300), 0x6e, &(0x7f0000001a80)=[{&(0x7f0000000440)=""/110, 0x6e}, {&(0x7f0000000580)=""/147, 0x93}, {&(0x7f0000000640)=""/143, 0x8f}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/129, 0x81}, {&(0x7f0000001840)=""/153, 0x99}, {&(0x7f0000001900)=""/190, 0xbe}, {&(0x7f0000000080)=""/28, 0x1c}, {&(0x7f00000019c0)=""/129, 0x81}], 0x9, &(0x7f0000001b40)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}, 0x10020) r7 = syz_mount_image$tmpfs(&(0x7f00000004c0), &(0x7f0000000500)='./bus\x00', 0x800100, 0x8, &(0x7f0000002140)=[{&(0x7f0000001c80)="f1275e2ee64bd64b853bacff8f5e11ced333c110540330741d9c83707f99fca01f74600be9a1960d4d45c2f27efa06ed7de8db45b65b0203c0fb302fcba6f836019fd80ffc849351f67512737ddd12ade17bd6fc6dd5bb933e49242f249cc03da2718f824ea54968ba6eea19ba64e45290b851843f02364b0e73ad828cf82458adc343ebf8748a24e8505eec1c2a0c0d65218260f18051e59d94c1e2b5baf470f20448784b5e26f2ec5c963c4e9d55a6f6db8b104314c0f3f88d11e26e07889c93fd0206ff3c242795bca70d27378dbc50f0577a55e488ba6a4474f6797fcb098fbf8af34125d5cfcbf80194d00307", 0xef, 0xff}, {&(0x7f0000001d80)="b25e0f2f965279435d3a6c3e89e97daf5d592362fa58aecce00ad1a48119b3ff19537bc2c83c62c224114edf8671afe15fa770cec1d8146856f07bf4082f89811ddcf5226f63f8ca5e4a2d9c98adb1e962e1659e8f002b", 0x57, 0x2}, {&(0x7f0000001e00)="dda4fe8fa4d9de008b509eb62e05b23835b40bdf0b691909842e01851e8598a3cb303da08e3c933eca91d1aec488f250192ae293a15e8cd7aa84b1f4a37d27d84d34b2a8650e9d697f5c58b5957d9d1797ba122b0c6fe03b971c67ad9a2512fb34eb48fcb19c23135b6c24d5631f2fc6e71adf8060d2f032820889d71df4b3a796ee1830b5f91b62aac39f3be672", 0x8e}, {&(0x7f0000001ec0)="27b189837a7717f81e3804b597aee974cf15dfb6a1a25847b9382ddc68d935172d8a670cc7ba21892d9bfe9ffb2cbbf12e208c3070e9751fb77de75e7072f82595143cd4275296dbc1c5502563d4f50e072007b6c807319fcc365bfd338d37011b45bd9a530fbf12a0a6e4b7b03f6a2eb88ea3f01d9d5c8bc9d6b2d962dfaa8e3338efce5f845fc78309e3ad52518f508b0316aaa3a3629107272fb1187500920c369a2b487aacf37be3f453da2612", 0xaf, 0x4}, {&(0x7f0000000700)="8a049f01bb2a44a9c41be2ebb01760d72eb1025359aad604365b310ba1793a8df62fe8ca", 0x24, 0x3}, {&(0x7f0000001f80)="010765ec257659a2216611f68d8c02edcb148a2fcbccc316683dcb7f3f761dd223286f0fe4229cd8f3453b0f7a21e465e1a6f9767ec08f447c5ef7a1f44426c26c6b85ac7d2e698acef920d5f6ea1886341304a0c4bc278869bf2534b8d3c81965ae49816140ef749c05a1", 0x6b, 0x800000}, {&(0x7f0000002000)="e6dd8a1ce79b20f05cd58adf0b289285505dd9b06dffb3af929c67976dbe00f78e7bfe9b8a2394140a62cd29103c6fd1286e000ce38ab1f3b65a6d576f9bb2f371d23f4ef4b8c40cfac15d1163187e01941f569a36b0b0cef56b2202702f658992a749", 0x63, 0x3}, {&(0x7f0000002080)="b1526d30fc0a070715df2ede5f28d44e9df9e27700b5170634643b880db5b610a0753a90d07bbfab7cc78c968ca28fe86fa9a9cc99379ae9fe4cf33a91f4892eea8fc475983c246f49eaefb6727d27a484ba3ba384c8c47a9f39ef8bff4d3b8791c4a079c2602318e5a240b14a409ea5e14ad6c7d7aa82e04d9951b514ff5557bd08b8b71b8e77e2b1db30", 0x8b, 0x9}], 0x200020, &(0x7f0000002200)={[{@gid}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}], [{@smackfshat={'smackfshat', 0x3d, '\x9c'}}, {@fsmagic={'fsmagic', 0x3d, 0xffffffffffffffe1}}, {@hash}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffff8}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@permit_directio}, {@permit_directio}]}) pipe2(&(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) pipe(&(0x7f00000024c0)={0xffffffffffffffff}) r10 = syz_io_uring_complete(0x0) r11 = accept(r1, &(0x7f0000002640)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000026c0)=0x80) io_submit(r3, 0x5, &(0x7f0000002800)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0xffff, r4, &(0x7f0000000200)="b05f7ce5fec370cd44c153f756e65e20696e5f35857dc75b43b3cc925810ac982ec76b82ae3ef0d5b32fb5cb5ff878a0c245eae4e76ec4e2acf6165526e6d4e51f517a8465ad7f1d0b366e1017f497842eb10a4ab15f5947e03a3bdfd9aa8ebf14b0b04d554f4a4f73fa3c2517692c8e78adfe85dc27f6ba96dc99b0d6c4550f5406e6c4be177ddf87931f82d359eb", 0x8f, 0xe5, 0x0, 0x1, r6}, &(0x7f0000002400)={0x0, 0x0, 0x0, 0x9, 0x7, r7, &(0x7f0000002300)="eeb640ad584647267df442fa23ebdbf0829343c2058a4c94059e191c980108c97e181ae0863234eb8df633e33d06f68767bf0a827449a548ef71e0461c20e94340f55e4d996692d1ec9108413fd36281d6e9b1d78514df893e47e8db5e44069ba38be43474de50b3a3f63eaf01a221f5a644d51413e38d64e2404614b7074c9bef14d120bcc6290f4ba61afb1c424287", 0x90, 0x1000, 0x0, 0x1, r8}, &(0x7f0000002500)={0x0, 0x0, 0x0, 0x3, 0x0, r0, &(0x7f0000002440)="44881c42e7e75a3af91a18fc7fedb48240f10ceb1f560b581fa528061d6623afc9ef47210ed87d0b237821193e27140194110b446d46624722e50cfe1e5e77fc2ffe04031a497740a11259bf5ed7949815f69cffc10e98", 0x57, 0x100000001, 0x0, 0x0, r9}, &(0x7f0000002600)={0x0, 0x0, 0x0, 0x8, 0xffba, r4, &(0x7f0000002540)="a9e275da6d8df525c00211f04840d21305f5517fed13537c652f7508679fb47643fbf89a40b9f1719ca44858542d7ef60bf4d520a117febc0ae5c99335ebe953a70ca46dc52465d5a95fa7ba2d198d771efcd042b99e092010dc28c4db083e2a0642cf6adf3c69e86b081c612cdbb97ca04f1714240cf22d369572fcd31a8d468a472f8ce25ebaafeb724ee6", 0x8c, 0x3, 0x0, 0x1, r10}, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x7fe, r11, &(0x7f0000002700)="64296c5adccdf54b6ad9e3eeef26b0e0739b20fd74b63405e7b61f92912b291bd11207fdc346617d90050de87e554b1987d06f97d514187aa29dbc952288ded78b17d38ee44a132ca79570df7dc9fa1ec1a2f535c71ea45e8c6fab7b1a2998e2dafc32c6c54d0fdbc99429bd75bd2ee493f77166e7d48ac34d3533a12e95ec59cc9813a4f6deea1f30189c9017fd7fc2e11d36e5139af42ce470581ea84c021c8a6ebe3a1cb986f994676daa42", 0xad, 0x7fff, 0x0, 0x2}]) r12 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r12, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) 04:59:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x5000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 1) [ 297.882748][T24166] loop5: detected capacity change from 0 to 264192 [ 297.915315][T24170] loop2: detected capacity change from 0 to 32768 [ 297.926233][T24169] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 297.959865][T24182] FAULT_INJECTION: forcing a failure. [ 297.959865][T24182] name failslab, interval 1, probability 0, space 0, times 0 [ 297.972768][T24182] CPU: 0 PID: 24182 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 297.981589][T24182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.991643][T24182] Call Trace: [ 297.994922][T24182] dump_stack_lvl+0xd6/0x122 [ 297.999508][T24182] dump_stack+0x11/0x1b [ 298.003676][T24182] should_fail+0x23c/0x250 [ 298.008123][T24182] ? __se_sys_memfd_create+0xfb/0x390 [ 298.013498][T24182] __should_failslab+0x81/0x90 [ 298.018327][T24182] should_failslab+0x5/0x20 [ 298.022895][T24182] __kmalloc+0x6f/0x350 [ 298.027054][T24182] ? strnlen_user+0x137/0x1c0 [ 298.031846][T24182] __se_sys_memfd_create+0xfb/0x390 [ 298.037056][T24182] __x64_sys_memfd_create+0x2d/0x40 [ 298.042289][T24182] do_syscall_64+0x44/0xa0 [ 298.046760][T24182] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 298.052669][T24182] RIP: 0033:0x7f8eb44e68d9 [ 298.057176][T24182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 298.077007][T24182] RSP: 002b:00007f8eb225df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 298.085794][T24182] RAX: ffffffffffffffda RBX: 00000000200004c0 RCX: 00007f8eb44e68d9 [ 298.093767][T24182] RDX: 00007f8eb225e000 RSI: 0000000000000000 RDI: 00007f8eb453fe76 [ 298.101829][T24182] RBP: 0000000000000000 R08: 00007f8eb225dff8 R09: ffffffffffffffff 04:59:34 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x40000800, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000300)=""/148, 0x94}], 0x1, 0x11c, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r1, &(0x7f0000000300)=""/28, 0x1c) getdents(r1, &(0x7f0000000040)=""/97, 0x61) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r2, &(0x7f0000000300)=""/28, 0x1c) getdents(r2, &(0x7f0000000040)=""/97, 0x61) getdents(r2, &(0x7f00000003c0)=""/144, 0x90) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/md_mod', 0x200, 0x20) recvmmsg$unix(r2, &(0x7f0000008b00)=[{{&(0x7f0000000900)=@abs, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000980)=""/214, 0xd6}, {&(0x7f0000002580)=""/4096, 0x1000}], 0x2, &(0x7f0000000a80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}}, {{&(0x7f0000000b00)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000b80)=""/167, 0xa7}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2}}, {{&(0x7f0000000c40)=@abs, 0x6e, &(0x7f0000000f80)=[{&(0x7f0000004580)=""/4096, 0x1000}, {&(0x7f0000000cc0)=""/86, 0x56}, {&(0x7f0000000d40)=""/72, 0x48}, {&(0x7f0000000dc0)=""/163, 0xa3}, {&(0x7f0000000e80)=""/245, 0xf5}], 0x5, &(0x7f0000001000)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}, {{&(0x7f0000001080), 0x6e, &(0x7f0000001440)=[{&(0x7f0000001100)=""/241, 0xf1}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/68, 0x44}, {&(0x7f0000001300)=""/21, 0x15}, {&(0x7f0000001340)=""/225, 0xe1}], 0x5, &(0x7f00000014c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000005580), 0x6e, &(0x7f00000058c0)=[{&(0x7f0000005600)=""/119, 0x77}, {&(0x7f0000005680)=""/96, 0x60}, {&(0x7f0000005700)=""/249, 0xf9}, {&(0x7f0000005800)=""/190, 0xbe}], 0x4, &(0x7f0000005900)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}}, {{&(0x7f0000005940), 0x6e, &(0x7f0000006b00)=[{&(0x7f00000059c0)=""/4096, 0x1000}, {&(0x7f00000069c0)=""/85, 0x55}, {&(0x7f0000006a40)=""/123, 0x7b}, {&(0x7f0000006ac0)=""/15, 0xf}], 0x4, &(0x7f0000006b40)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}, {{&(0x7f0000006b80)=@abs, 0x6e, &(0x7f0000007dc0)=[{&(0x7f0000006c00)=""/51, 0x33}, {&(0x7f0000006c40)=""/201, 0xc9}, {&(0x7f0000006d40)=""/14, 0xe}, {&(0x7f0000006d80)=""/4096, 0x1000}, {&(0x7f0000007d80)=""/34, 0x22}], 0x5, &(0x7f0000007e40)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}}, {{&(0x7f0000007e80)=@abs, 0x6e, &(0x7f0000008380)=[{&(0x7f0000007f00)=""/92, 0x5c}, {&(0x7f0000007f80)=""/22, 0x16}, {&(0x7f0000007fc0)}, {&(0x7f0000008000)=""/129, 0x81}, {&(0x7f00000080c0)=""/143, 0x8f}, {&(0x7f0000008180)=""/166, 0xa6}, {&(0x7f0000008240)=""/109, 0x6d}, {&(0x7f00000082c0)=""/171, 0xab}], 0x8, &(0x7f0000008400)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x100}}, {{&(0x7f0000008500)=@abs, 0x6e, &(0x7f0000008840)=[{&(0x7f0000008580)=""/162, 0xa2}, {&(0x7f0000008640)=""/71, 0x47}, {&(0x7f00000086c0)=""/35, 0x23}, {&(0x7f0000008700)=""/134, 0x86}, {&(0x7f00000087c0)=""/96, 0x60}], 0x5, &(0x7f00000088c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x168}}, {{&(0x7f0000008a40), 0x6e, &(0x7f0000008ac0)}}], 0xa, 0x40000000, 0x0) sendfile(r4, r2, &(0x7f0000008d80)=0x2, 0xffffffffffffffa2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000140)={"b8c318f46602287aa48cf214efdaa01a", 0x0, 0x0, {0x9, 0xffff}, {0x8, 0x8}, 0x0, [0x6, 0x0, 0x7, 0x9, 0x6, 0x0, 0x4, 0x5, 0x101, 0x6, 0x4, 0x1, 0x1, 0x3f, 0x7, 0x3]}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000500)={0x0, 0x3, {0x4, @usage=0x20, 0x0, 0x1, 0x8f57, 0x3f, 0x80000000, 0x7, 0xc0, @struct={0x3, 0xfff}, 0x2, 0x3, [0x40, 0x8001, 0xf12000000000, 0x7, 0x6]}, {0xfff, @usage=0x8, 0x0, 0x0, 0x80000001, 0x8, 0x5, 0x4, 0x92, @usage=0x9, 0x1f, 0x9, [0xd3, 0x0, 0x1, 0x8001, 0xfffffffffffffffb, 0xef7e]}, {0xfff, @struct={0x0, 0x2}, 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x1db, 0x400, 0x48, @usage=0x6, 0x1, 0x2, [0x3, 0x1f, 0x100000000, 0x0, 0xa5, 0x8]}, {0x8, 0x2, 0xfffffffffffffffb}}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, &(0x7f0000001580)={{r3}, r5, 0x2, @inherit={0x60, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000000000000300000000000000000001000000000000000000000000001d0000000000000007000000000000000400000000000000ffffffff00000000d7842fd2d3b7aa263bb364f13944fde5f37700000000000006000000000000000000008000"/112]}, @devid=r6}) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 298.110520][T24182] R10: 00007f8eb225dffc R11: 0000000000000246 R12: 0000000020000100 [ 298.118493][T24182] R13: 0000000020000140 R14: 0000000000000000 R15: 0000000020001480 04:59:34 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x500, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 298.204272][T24201] loop5: detected capacity change from 0 to 264192 04:59:34 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x600, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:34 executing program 5: clock_gettime(0x0, &(0x7f0000004600)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000044c0)=[{{&(0x7f0000000200), 0x6e, &(0x7f0000001540)=[{&(0x7f0000000280)=""/66, 0x42}, {&(0x7f0000000300)=""/187, 0xbb}, {&(0x7f00000003c0)=""/12, 0xc}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000400)=""/134, 0x86}, {&(0x7f0000001500)=""/1, 0x1}], 0x6, &(0x7f00000015c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xe0}}, {{&(0x7f00000016c0), 0x6e, &(0x7f0000001880)=[{&(0x7f0000001740)=""/47, 0x2f}, {&(0x7f0000001780)=""/120, 0x78}, {&(0x7f0000001800)=""/125, 0x7d}], 0x3, &(0x7f00000018c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001940)=""/91, 0x5b}, {&(0x7f00000019c0)=""/221, 0xdd}], 0x2}}, {{&(0x7f0000001b00)=@abs, 0x6e, &(0x7f0000002d80)=[{&(0x7f0000001b80)=""/14, 0xe}, {&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000002bc0)=""/134, 0x86}, {&(0x7f0000002c80)=""/38, 0x26}, {&(0x7f0000002cc0)=""/29, 0x1d}, {&(0x7f0000002d00)=""/73, 0x49}], 0x6, &(0x7f0000002e00)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000002e40)=@abs, 0x6e, &(0x7f00000042c0)=[{&(0x7f0000002ec0)=""/65, 0x41}, {&(0x7f0000002f40)=""/175, 0xaf}, {&(0x7f0000003000)}, {&(0x7f0000003040)=""/174, 0xae}, {&(0x7f0000003100)=""/135, 0x87}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/194, 0xc2}], 0x7, &(0x7f0000004340)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x158}}], 0x5, 0x2, &(0x7f0000004640)={r0, r1+60000000}) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000004680)) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}, {&(0x7f0000000140)="e067660f57c447bad61782314ff7d3fef280d856f9ddd62229c892694ab08755fa6d32dd6f27237f99b3fa330203408dad23587c49ae7d1222272fe674010001", 0x40, 0x7fffffff}], 0x301c014, &(0x7f0000000180)=ANY=[]) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='./file0/file0\x00', 0xe, 0x1) [ 298.249299][T24205] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 298.347874][T24220] loop5: detected capacity change from 0 to 264192 04:59:34 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="5c5231675fde49b041849b8d88b58f761b9b1dda26cfd614c60561c7be149ee8a2f9332c56ccf9b7ee2acd66e010ab5865da3e42e340f141e7cc3cf5de4b4139d00e888b037c19401d36bd67c0fd0dca8ee2bd0d70f036b1076a98093c712e9b2d86689f0dce0d825f166d5dbe53e38557a33d4a9184772632ced7205d59ef72a13c67ef52049f8e093183775d43cb0f8ceb5faf2ce8293b565e0d47987ade92c68ec8483abde8d64cecce5ec820a5778b6b9c4e1e65ab241332b1c18a7babb7aad8c8af004a02a6749e24be2df90aaa6c5125b765b6abb3b5", 0xd9, 0x7}], 0x201c014, &(0x7f0000000000)=ANY=[@ANYRESHEX, @ANYRES16, @ANYRES16, @ANYRESDEC=0x0, @ANYRES16=r0]) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r1, &(0x7f0000000300)=""/28, 0x1c) getdents(r1, &(0x7f0000000040)=""/97, 0x61) getdents64(r1, &(0x7f00000000c0)=""/7, 0x7) [ 298.401815][T24219] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:35 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x604, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 2) [ 298.546458][T24235] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 298.592847][T24252] FAULT_INJECTION: forcing a failure. [ 298.592847][T24252] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 298.605935][T24252] CPU: 0 PID: 24252 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 298.614785][T24252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.624828][T24252] Call Trace: [ 298.628108][T24252] dump_stack_lvl+0xd6/0x122 [ 298.632704][T24252] dump_stack+0x11/0x1b [ 298.636850][T24252] should_fail+0x23c/0x250 [ 298.641336][T24252] should_fail_usercopy+0x16/0x20 [ 298.646433][T24252] _copy_from_user+0x1c/0xd0 [ 298.651025][T24252] __se_sys_memfd_create+0x137/0x390 [ 298.656317][T24252] __x64_sys_memfd_create+0x2d/0x40 [ 298.661518][T24252] do_syscall_64+0x44/0xa0 [ 298.665978][T24252] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 298.671933][T24252] RIP: 0033:0x7f8eb44e68d9 [ 298.676349][T24252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 298.696038][T24252] RSP: 002b:00007f8eb225df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 298.704479][T24252] RAX: ffffffffffffffda RBX: 00000000200004c0 RCX: 00007f8eb44e68d9 [ 298.713001][T24252] RDX: 00007f8eb225e000 RSI: 0000000000000000 RDI: 00007f8eb453fe76 [ 298.720979][T24252] RBP: 0000000000000000 R08: 00007f8eb225dff8 R09: ffffffffffffffff [ 298.728962][T24252] R10: 00007f8eb225dffc R11: 0000000000000246 R12: 0000000020000100 04:59:35 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x700, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 298.736939][T24252] R13: 0000000020000140 R14: 0000000000000000 R15: 0000000020001480 [ 298.790903][T24190] loop2: detected capacity change from 0 to 32768 04:59:35 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r4, &(0x7f0000000300)=""/28, 0x1c) getdents(r4, &(0x7f0000000040)=""/97, 0x61) dup3(r0, r4, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffb) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, 0x0, 0x300, 0x70bd25, 0x25dfdbfd, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x24048801}, 0x20004084) sendfile(r0, r0, 0x0, 0x8080ffffff80) 04:59:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x200, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c814, &(0x7f0000000180)=ANY=[]) 04:59:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x6000000, &(0x7f00000004c0), 0x0, 0x0) [ 298.861626][T24263] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 298.963324][T24280] loop5: detected capacity change from 0 to 264192 04:59:35 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x80040000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 3) 04:59:35 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x900, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x288640, 0x10) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '.'}, {0x20, 'vfat\x00'}, {0x20, '{'}, {0x20, 'vfat\x00'}, {0x20, 'vfat\x00'}, {}], 0xa, "75ca6222a008820e2e9a4adf3a1cc05ba649543acdf8d8c0a9974366109d986826f97945c1e5cb84fffb35935e17b4698e99"}, 0x54) open(&(0x7f0000000000)='./file0\x00', 0x480000, 0x110) [ 299.042358][T24280] loop5: detected capacity change from 0 to 264192 [ 299.103748][T24299] FAULT_INJECTION: forcing a failure. [ 299.103748][T24299] name failslab, interval 1, probability 0, space 0, times 0 [ 299.116433][T24299] CPU: 1 PID: 24299 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 299.125199][T24299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.135337][T24299] Call Trace: [ 299.138611][T24299] dump_stack_lvl+0xd6/0x122 [ 299.143286][T24299] dump_stack+0x11/0x1b [ 299.147454][T24299] should_fail+0x23c/0x250 [ 299.152026][T24299] ? shmem_alloc_inode+0x22/0x30 [ 299.156966][T24299] __should_failslab+0x81/0x90 [ 299.161720][T24299] ? shmem_match+0xa0/0xa0 [ 299.166152][T24299] should_failslab+0x5/0x20 [ 299.170792][T24299] kmem_cache_alloc+0x4f/0x300 [ 299.175544][T24299] ? shmem_match+0xa0/0xa0 [ 299.179954][T24299] shmem_alloc_inode+0x22/0x30 [ 299.184812][T24299] new_inode_pseudo+0x38/0x1c0 [ 299.189574][T24299] new_inode+0x21/0x120 [ 299.193772][T24299] shmem_get_inode+0xb7/0x4a0 [ 299.198446][T24299] __shmem_file_setup+0xf1/0x1d0 [ 299.203376][T24299] shmem_file_setup+0x37/0x40 [ 299.208098][T24299] __se_sys_memfd_create+0x1eb/0x390 [ 299.213448][T24299] __x64_sys_memfd_create+0x2d/0x40 [ 299.218639][T24299] do_syscall_64+0x44/0xa0 [ 299.223309][T24299] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 299.229206][T24299] RIP: 0033:0x7f8eb44e68d9 [ 299.233618][T24299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 299.253385][T24299] RSP: 002b:00007f8eb225df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 299.261800][T24299] RAX: ffffffffffffffda RBX: 00000000200004c0 RCX: 00007f8eb44e68d9 [ 299.269841][T24299] RDX: 00007f8eb225e000 RSI: 0000000000000000 RDI: 00007f8eb453fe76 [ 299.277803][T24299] RBP: 0000000000000000 R08: 00007f8eb225dff8 R09: ffffffffffffffff [ 299.285796][T24299] R10: 00007f8eb225dffc R11: 0000000000000246 R12: 0000000020000100 [ 299.293762][T24299] R13: 0000000020000140 R14: 0000000000000000 R15: 0000000020001480 04:59:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 4) [ 299.343022][T24306] loop5: detected capacity change from 0 to 264192 [ 299.385036][T24312] FAULT_INJECTION: forcing a failure. [ 299.385036][T24312] name failslab, interval 1, probability 0, space 0, times 0 [ 299.397804][T24312] CPU: 1 PID: 24312 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 299.406569][T24312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.416642][T24312] Call Trace: [ 299.419915][T24312] dump_stack_lvl+0xd6/0x122 [ 299.424508][T24312] dump_stack+0x11/0x1b [ 299.428695][T24312] should_fail+0x23c/0x250 [ 299.433102][T24312] ? security_inode_alloc+0x30/0x180 [ 299.438376][T24312] __should_failslab+0x81/0x90 [ 299.443167][T24312] should_failslab+0x5/0x20 [ 299.447663][T24312] kmem_cache_alloc+0x4f/0x300 [ 299.452424][T24312] security_inode_alloc+0x30/0x180 [ 299.457535][T24312] inode_init_always+0x20b/0x430 [ 299.462464][T24312] ? shmem_match+0xa0/0xa0 [ 299.466881][T24312] new_inode_pseudo+0x73/0x1c0 [ 299.471644][T24312] new_inode+0x21/0x120 [ 299.475799][T24312] shmem_get_inode+0xb7/0x4a0 [ 299.480511][T24312] __shmem_file_setup+0xf1/0x1d0 [ 299.485440][T24312] shmem_file_setup+0x37/0x40 [ 299.490116][T24312] __se_sys_memfd_create+0x1eb/0x390 [ 299.495406][T24312] __x64_sys_memfd_create+0x2d/0x40 [ 299.500593][T24312] do_syscall_64+0x44/0xa0 [ 299.505179][T24312] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 299.511085][T24312] RIP: 0033:0x7f8eb44e68d9 [ 299.515488][T24312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:59:36 executing program 5: sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x8}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x880) [ 299.535093][T24312] RSP: 002b:00007f8eb225df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 299.543496][T24312] RAX: ffffffffffffffda RBX: 00000000200004c0 RCX: 00007f8eb44e68d9 [ 299.551455][T24312] RDX: 00007f8eb225e000 RSI: 0000000000000000 RDI: 00007f8eb453fe76 [ 299.559420][T24312] RBP: 0000000000000000 R08: 00007f8eb225dff8 R09: ffffffffffffffff [ 299.567392][T24312] R10: 00007f8eb225dffc R11: 0000000000000246 R12: 0000000020000100 [ 299.575359][T24312] R13: 0000000020000140 R14: 0000000000000000 R15: 0000000020001480 04:59:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 5) [ 299.588650][T24305] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 299.630263][T24322] FAULT_INJECTION: forcing a failure. [ 299.630263][T24322] name failslab, interval 1, probability 0, space 0, times 0 [ 299.642954][T24322] CPU: 1 PID: 24322 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 299.651857][T24322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.661904][T24322] Call Trace: [ 299.665184][T24322] dump_stack_lvl+0xd6/0x122 [ 299.669774][T24322] dump_stack+0x11/0x1b [ 299.673932][T24322] should_fail+0x23c/0x250 [ 299.678435][T24322] ? __d_alloc+0x36/0x370 [ 299.682893][T24322] __should_failslab+0x81/0x90 [ 299.687660][T24322] should_failslab+0x5/0x20 [ 299.692236][T24322] kmem_cache_alloc+0x4f/0x300 [ 299.697004][T24322] ? security_inode_alloc+0x138/0x180 [ 299.702380][T24322] ? __init_rwsem+0x59/0x70 [ 299.706973][T24322] __d_alloc+0x36/0x370 [ 299.711216][T24322] d_alloc_pseudo+0x1a/0x50 [ 299.715718][T24322] alloc_file_pseudo+0x77/0x150 [ 299.720628][T24322] __shmem_file_setup+0x14c/0x1d0 [ 299.725664][T24322] shmem_file_setup+0x37/0x40 [ 299.730348][T24322] __se_sys_memfd_create+0x1eb/0x390 [ 299.735635][T24322] __x64_sys_memfd_create+0x2d/0x40 [ 299.740910][T24322] do_syscall_64+0x44/0xa0 [ 299.745345][T24322] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 299.751261][T24322] RIP: 0033:0x7f8eb44e68d9 [ 299.755665][T24322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:59:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:36 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa00, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 299.775361][T24322] RSP: 002b:00007f8eb225df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 299.783787][T24322] RAX: ffffffffffffffda RBX: 00000000200004c0 RCX: 00007f8eb44e68d9 [ 299.791784][T24322] RDX: 00007f8eb225e000 RSI: 0000000000000000 RDI: 00007f8eb453fe76 [ 299.799750][T24322] RBP: 0000000000000000 R08: 00007f8eb225dff8 R09: ffffffffffffffff [ 299.807721][T24322] R10: 00007f8eb225dffc R11: 0000000000000246 R12: 0000000020000100 [ 299.815685][T24322] R13: 0000000020000140 R14: 0000000000000000 R15: 0000000020001480 04:59:36 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./bus\x00', 0x401, 0x2, &(0x7f0000000080)=[{&(0x7f0000000200)="4ed0537cb6b2d99ce2c8f57a0753df7b05d71a20a225090e0f4a0231b84d14fa13ff4dafd71716cf78171d49745dc4752fee07c4069919d38e89a251fcf8bd09c7bb6e152165f0b09b0459107764885d0dabb16ff59cb091a89cb69dcb6f6cdfdfa50fac3082bf2cc9b56ddac74a88ed3beccff07b1d929e8a05eac235d18fc8392ba2073122bc096e4a3dcb7fe8b521d0b4", 0x92, 0x10000}, {&(0x7f0000000300)="6570bcfbc7783e82bd4b05d98a8b3aea54db9034507b89d7f7aeaa3fb6cb624d0235eaf88dcd8175fd2d0be24cd1c2188a2f5c7cda15a722af512c45de3f1dc54e77fdd65fc542110c9ac5d94ef1bb2d08c343b4967ec3da5a0f62a201987bf9e431dcc7f18f754aca9dcd451c6c3b1859d5900cd3bfc4773f6bbec2f78d604b4f0df542cbef5c3be2856126585a2bd7f7928cfaeeb1dc4463c61a946a97507047fa0d3943fe930bded451ce10de59", 0xaf, 0x7}], 0x2000800, &(0x7f00000014c0)=ANY=[@ANYBLOB="757466383d302c7569643e80a6d6c95822e1ef996afa2341a2381759dc53bec4f6b529dde2a2eb700e6120826bd368012e096140dd842102ee0e99d33653aae742493d6144b6ceffb047c0e7ea1567320c15acad26e2aeef38a6b67195998c69d176d27efcb6d60e697b747944285fa44ce26787013d86fabb214ed1d7b1dc8036b79b9eaa81fca7a373", @ANYRESDEC=0xee01, @ANYBLOB=',func=PATH_CHECK,appraise_type=imasig,subj_type=*{^^,\x00']) r2 = openat(r1, &(0x7f0000000100)='./bus\x00', 0x610000, 0x96) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r3, 0x41fe, 0x0) r4 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000780)={0x2, 0x0, @status={[0x1f, 0x4, 0x1f, 0x5d, 0x7, 0x7ff]}, [0x200, 0x8, 0x101, 0x9, 0x3, 0xf5, 0xfffffffffffffff9, 0x100, 0x3, 0x9, 0x0, 0x14000000, 0x9, 0x7, 0x2162800, 0x9d6e, 0x3, 0x2, 0x7, 0x8, 0x1, 0x4, 0x6, 0x8001, 0x0, 0x7, 0x7, 0x3ff, 0x3, 0x52, 0x7, 0x3, 0xd2, 0x95, 0x80000001, 0xfffffffffffffffe, 0x3, 0xffffffffffff1e65, 0x6, 0x101, 0x3, 0xfc00000000000000, 0x1000, 0x5, 0x85, 0xf300000, 0xffffffffffff1328, 0x0, 0xb7fd, 0x7, 0x0, 0x5, 0x3, 0x3, 0x1, 0x8, 0x1, 0x0, 0x3, 0x0, 0x1000, 0x2, 0x9, 0x1]}) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r3, r6, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)=0x0) io_submit(r8, 0x2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r7, &(0x7f0000000000), 0x16000}]) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/97, 0x61) r9 = open_tree(r7, &(0x7f0000001680)='./bus\x00', 0x101) r10 = openat$incfs(r7, &(0x7f00000018c0)='.pending_reads\x00', 0x101000, 0x130) io_submit(r8, 0x9, &(0x7f0000001a00)=[&(0x7f0000000600)={0x0, 0x0, 0x0, 0x6, 0xfffd, r6, &(0x7f0000000580)="9850a8d4529eccd2b7479bc5a6fa2082b0213d0cbeb0cb03647400e36d07e09d80f48e947bef98d93e2ce2f2baedbb54a01a5223259c4e37579ef8e03318b4b5961355d92e16b2f96575f13e985d6aa28cdd3503", 0x54, 0x8001, 0x0, 0x1, r4}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffffffffffff, &(0x7f00000011c0)="d0bb1d608959568c8adabc386c4a953d5b88f23cf1206875f571370e68c2e8cf2ded1d306a4c3ae70cf054df26d393ef62b4e184f1e60e07e0dc1cff63d0a6ff6cf5f894af6c87a49adc84c8e7cf76e87ab48db0395205dc70e836154e57a2f59669addc8a00ac3a38fd76de5aed2d27806463eda12c91af24c0103697cd90738282de9eef67379b1abb77bd31e9a426c7e6f776982d753ba32eb08d5907d7a542373ca45e7ea569ebb6b9ffc8da071e35b678c29d841359d132811cefb7008343239fed71f5adf98b97efce7e8614a02880032e1e8673390013b81c48aab046acaadd31faed762f40c1f6bc7a6bc3e2a011", 0xf2, 0x9, 0x0, 0x1}, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x401, r3, &(0x7f00000012c0)="b9d50f803fdc6f4c00000cdda4446ae1602715dcb07dbc4b0e626d643ca04e8b35e74c55395f1f410346dcab4a01bea01b6ad5a0ddfa0ad03e9c1979faa309eb208374f5798749951dd0b68c9ffc60f7a1da78ddcf773df39476e7f7a044cf0abe5e45ca6579497463", 0x69, 0x1864e0000, 0x0, 0x3}, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x800, r4, &(0x7f0000001380)="6501b07005482fdbadf1d05456cceb582a819bd85f16682c6067eab69ce1c6f1daa341a564c45a0943d72ea618997cd02f4d089640b322b02551fdeb7d8d2898778cafdf1f409b8939459c34e7130fb6b3d6ce55897755b589fc9ebc0e638b429813d0e5bf87111f6018abf8d75d51b5db42a1caaac773be918143ba1ec327d06059e4ef7c17b33dd279bd7cf42ef66985e48d7609640e37ff92de5c75945eee7cbacc2c3878746f2a4d14d144c518b6832e48739dba8b90a684eb434f2bd86c5a259163013104872856de16bbfd55321655bc76b69ce65b987761cb36c1656e1414cfcf6ec63afa6b77a0f7014ba443acc6f80d", 0xf4, 0x2, 0x0, 0x1, r0}, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x7, 0x60, 0xffffffffffffffff, &(0x7f00000015c0)="cc783ff94ff1439dadd5a162cf2485f7b3a5f449f0ea5d733b22240e7c7e5da5553cb1b948ca536e8648b6c68eea9d33279b6134dad0b7fcdabb825a0a8c5f", 0x3f, 0xffffffff, 0x0, 0x1}, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x2, 0x1, r0, &(0x7f0000001640)="39f726df6cb53c", 0x7, 0x1f, 0x0, 0x2, r9}, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x2, 0xddb6, 0xffffffffffffffff, &(0x7f0000001700)="f7d8904de684c812b1175babcf614cc7abf56727df681c07d0550f5f7654f071bb87f9a660a2e4af9d2ba3822090d3f1f1d4c4f3bfa8b6019de10b739fc46a44a6b741292afb43d681746e7adc8bedabd64d772e84482b18a3f960c5115f8f1b57ff83740f51860ff0fe045cc3fe72137e17af70d87afcee5770059a11079fda1f5b9ced3f7019b09f90", 0x8a, 0x101, 0x0, 0x0, r4}, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x3, 0x1, r2, &(0x7f0000001800)="76bc25c2048035b793059633bfaf0ab59aad94623563f8e87f3ba3df1dd6e91af96c7a735fc6bb4f61212ed14b760c2b6ef6bea6a81c798058c6d52a9e71b95f10dd324da6286d505b48ceda7506fd4778cf8ba369d56afaa3ff1e2c9723400179a689bbdc5805c84731cb6ef5c134c369e4970f2b5027cbfc8d534e5b18575afd85", 0x82, 0x2, 0x0, 0x3, r10}, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0x6, r2, &(0x7f0000001940)="b50f1bc639ebed5b2dddfa790fc43711075732d47f7c7e17779580436fe20360aba79216ba1a4aa42a421c9e2c48b5efc757d998aa0003eff067aca183fda8f1167795e1451da6681b1fe9e5adaad361b524a687ae484af3bd5c6b52c89874c6f648", 0x62, 0x56d, 0x0, 0x1, r0}]) io_pgetevents(r8, 0x4, 0x2, &(0x7f00000003c0)=[{}, {}], 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={[0x5]}, 0x8}) 04:59:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}]}, 0x28}}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r2, &(0x7f0000000300)=""/28, 0x1c) getdents(r2, &(0x7f0000000040)=""/97, 0x61) syz_genetlink_get_family_id$ethtool(&(0x7f0000000380), r2) sendmsg$NL80211_CMD_JOIN_OCB(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="300020000717e3105f6fb78b66766d798b37d3fba095a39c73edfeb01fc7785a28ed451ae7e9", @ANYRES16=r1, @ANYBLOB="00022dbd7000fedbdf256c00000008000300", @ANYRES32=0x0, @ANYBLOB="0c0099001b470000340000000800a00001000000"], 0x30}}, 0x804) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r3, &(0x7f0000000300)=""/28, 0x1c) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r4, &(0x7f0000000300)=""/28, 0x1c) getdents(r4, &(0x7f0000000040)=""/97, 0x61) preadv(r4, &(0x7f0000000400)=[{&(0x7f00000003c0)=""/12, 0xc}], 0x1, 0x53, 0x9) getdents(r3, &(0x7f0000000040)=""/97, 0x61) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r3, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x74, 0x0, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}]}]}, 0x74}}, 0x20004010) [ 299.918249][T24333] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:36 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb00, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 300.018634][T24348] loop5: detected capacity change from 0 to 264192 [ 300.028364][T24349] loop2: detected capacity change from 0 to 256 [ 300.053711][T24349] FAT-fs (loop2): Unrecognized mount option "uid>€¦ÖÉX"áï™jú#A¢8YÜS¾Äöµ)Ýâ¢ëpa ‚kÓh. a@Ý„!î™Ó6SªçBI=aD¶Îÿ°GÀçêg2 ¬­&â®ï8¦¶q•™ŒiÑvÒ~ü¶Öi{tyD(_¤Lâg‡=†ú»!NÑױ܀6·›žªü§£s00000000000000060929" or missing value [ 300.125025][T24357] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 300.140763][T24360] loop5: detected capacity change from 0 to 264192 04:59:36 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf6ffffff, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:36 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xc00, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'security.', '\xf8\x00'}, &(0x7f00000000c0)='\\^', 0x2, 0x1) 04:59:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 6) [ 300.255053][T24383] loop5: detected capacity change from 0 to 264192 [ 300.262229][T24349] loop2: detected capacity change from 0 to 256 [ 300.276950][T24389] FAULT_INJECTION: forcing a failure. [ 300.276950][T24389] name failslab, interval 1, probability 0, space 0, times 0 [ 300.289595][T24389] CPU: 1 PID: 24389 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 300.298444][T24389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.308578][T24389] Call Trace: [ 300.311853][T24389] dump_stack_lvl+0xd6/0x122 [ 300.316432][T24389] dump_stack+0x11/0x1b [ 300.320578][T24389] should_fail+0x23c/0x250 [ 300.324992][T24389] ? __alloc_file+0x2e/0x1a0 [ 300.329639][T24389] __should_failslab+0x81/0x90 [ 300.334480][T24389] should_failslab+0x5/0x20 [ 300.338984][T24389] kmem_cache_alloc+0x4f/0x300 [ 300.343747][T24389] __alloc_file+0x2e/0x1a0 [ 300.348227][T24389] alloc_empty_file+0xcd/0x1c0 [ 300.352996][T24389] alloc_file+0x3a/0x280 [ 300.357375][T24389] alloc_file_pseudo+0xfa/0x150 [ 300.362231][T24389] __shmem_file_setup+0x14c/0x1d0 [ 300.367249][T24389] shmem_file_setup+0x37/0x40 [ 300.371916][T24389] __se_sys_memfd_create+0x1eb/0x390 [ 300.377204][T24389] __x64_sys_memfd_create+0x2d/0x40 [ 300.382462][T24389] do_syscall_64+0x44/0xa0 [ 300.386874][T24389] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 300.392878][T24389] RIP: 0033:0x7f8eb44e68d9 [ 300.397312][T24389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 300.416910][T24389] RSP: 002b:00007f8eb225df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 300.425403][T24389] RAX: ffffffffffffffda RBX: 00000000200004c0 RCX: 00007f8eb44e68d9 [ 300.433367][T24389] RDX: 00007f8eb225e000 RSI: 0000000000000000 RDI: 00007f8eb453fe76 [ 300.441360][T24389] RBP: 0000000000000000 R08: 00007f8eb225dff8 R09: ffffffffffffffff [ 300.449329][T24389] R10: 00007f8eb225dffc R11: 0000000000000246 R12: 0000000020000100 [ 300.457371][T24389] R13: 0000000020000140 R14: 0000000000000000 R15: 0000000020001480 [ 300.503741][T24382] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 300.523645][T24383] loop5: detected capacity change from 0 to 264192 04:59:37 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) recvmmsg$unix(r2, &(0x7f00000030c0)=[{{&(0x7f0000000000), 0x6e, &(0x7f0000000080)=[{&(0x7f0000000300)=""/218, 0xda}, {&(0x7f0000000200)=""/82, 0x52}], 0x2, &(0x7f0000000440)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000000280)=[{&(0x7f0000000100)=""/37, 0x25}, {&(0x7f0000000580)=""/92, 0x5c}, {&(0x7f0000000600)=""/70, 0x46}], 0x3, &(0x7f0000000680)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f0000000780)=@abs, 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000800)=""/174, 0xae}], 0x1, &(0x7f0000000900)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/186, 0xba}, {&(0x7f0000000b00)=""/186, 0xba}, {&(0x7f0000000bc0)=""/134, 0x86}], 0x3, &(0x7f0000000cc0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}}, {{&(0x7f0000000d80)=@abs, 0x6e, &(0x7f00000010c0)=[{&(0x7f0000000e00)=""/157, 0x9d}, {&(0x7f0000000ec0)=""/233, 0xe9}, {&(0x7f0000000fc0)=""/233, 0xe9}], 0x3, &(0x7f0000001100)=[@cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x70}}, {{&(0x7f0000001180), 0x6e, &(0x7f0000001300)=[{&(0x7f0000001200)=""/131, 0x83}, {&(0x7f00000012c0)=""/48, 0x30}], 0x2, &(0x7f0000001340)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x90}}, {{&(0x7f0000001400), 0x6e, &(0x7f0000002780)=[{&(0x7f0000001480)=""/20, 0x14}, {&(0x7f00000014c0)=""/122, 0x7a}, {&(0x7f0000001540)=""/54, 0x36}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000002580)=""/200, 0xc8}, {&(0x7f0000002680)=""/98, 0x62}, {&(0x7f0000002700)=""/23, 0x17}, {&(0x7f0000002740)}], 0x8, &(0x7f0000002800)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000028c0)=""/47, 0x2f}, {&(0x7f0000002900)}, {&(0x7f0000002940)=""/19, 0x13}, {&(0x7f0000002980)=""/251, 0xfb}], 0x4, &(0x7f0000002ac0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78}}, {{&(0x7f0000002b40)=@abs, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002bc0)=""/251, 0xfb}, {&(0x7f0000002cc0)=""/28, 0x1c}, {&(0x7f0000002d00)=""/239, 0xef}, {&(0x7f0000002e00)=""/10, 0xa}, {&(0x7f0000002e40)=""/177, 0xb1}, {&(0x7f0000002f00)=""/94, 0x5e}, {&(0x7f0000002f80)=""/139, 0x8b}], 0x7}}], 0x9, 0x20, &(0x7f0000003300)={0x77359400}) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000003340)={0x1d, 0x0, '\x00', [@pad1]}, 0x10) sendfile(r0, r0, 0x0, 0x8080ffffff80) 04:59:37 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xd00, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x3}], 0x301c014, &(0x7f0000000180)=ANY=[]) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x400000, 0x90, 0x3}, 0x18) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/240, 0xf0) [ 300.675553][T24415] loop5: detected capacity change from 0 to 264192 [ 300.711927][T24408] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x8000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:37 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) syz_open_pts(r0, 0x40000) r1 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0xcb3) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x10) 04:59:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 7) 04:59:37 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xe00, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 300.821708][T24435] loop5: detected capacity change from 0 to 264192 [ 300.850175][T24441] FAULT_INJECTION: forcing a failure. [ 300.850175][T24441] name failslab, interval 1, probability 0, space 0, times 0 [ 300.862839][T24441] CPU: 0 PID: 24441 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 300.871697][T24441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.881759][T24441] Call Trace: [ 300.885037][T24441] dump_stack_lvl+0xd6/0x122 [ 300.889627][T24441] dump_stack+0x11/0x1b [ 300.893820][T24441] should_fail+0x23c/0x250 [ 300.898259][T24441] ? security_file_alloc+0x30/0x190 [ 300.903490][T24441] __should_failslab+0x81/0x90 [ 300.908247][T24441] should_failslab+0x5/0x20 [ 300.912745][T24441] kmem_cache_alloc+0x4f/0x300 [ 300.917503][T24441] security_file_alloc+0x30/0x190 [ 300.922540][T24441] __alloc_file+0x83/0x1a0 [ 300.926997][T24441] alloc_empty_file+0xcd/0x1c0 [ 300.931813][T24441] alloc_file+0x3a/0x280 [ 300.936153][T24441] alloc_file_pseudo+0xfa/0x150 [ 300.941009][T24441] __shmem_file_setup+0x14c/0x1d0 [ 300.946094][T24441] shmem_file_setup+0x37/0x40 [ 300.950837][T24441] __se_sys_memfd_create+0x1eb/0x390 [ 300.956114][T24441] __x64_sys_memfd_create+0x2d/0x40 [ 300.961386][T24441] do_syscall_64+0x44/0xa0 [ 300.965845][T24441] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 300.971740][T24441] RIP: 0033:0x7f8eb44e68d9 [ 300.976139][T24441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 300.995739][T24441] RSP: 002b:00007f8eb225df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 301.004133][T24441] RAX: ffffffffffffffda RBX: 00000000200004c0 RCX: 00007f8eb44e68d9 [ 301.012087][T24441] RDX: 00007f8eb225e000 RSI: 0000000000000000 RDI: 00007f8eb453fe76 04:59:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 8) [ 301.020084][T24441] RBP: 0000000000000000 R08: 00007f8eb225dff8 R09: ffffffffffffffff [ 301.028039][T24441] R10: 00007f8eb225dffc R11: 0000000000000246 R12: 0000000020000100 [ 301.036040][T24441] R13: 0000000020000140 R14: 0000000000000000 R15: 0000000020001480 [ 301.050454][T24439] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 301.118779][T24450] loop5: detected capacity change from 0 to 264192 [ 301.158798][T24457] FAULT_INJECTION: forcing a failure. [ 301.158798][T24457] name failslab, interval 1, probability 0, space 0, times 0 [ 301.171549][T24457] CPU: 0 PID: 24457 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 301.180535][T24457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.190596][T24457] Call Trace: [ 301.193876][T24457] dump_stack_lvl+0xd6/0x122 [ 301.198482][T24457] dump_stack+0x11/0x1b [ 301.202643][T24457] should_fail+0x23c/0x250 [ 301.207060][T24457] ? getname_flags+0x84/0x3f0 [ 301.211809][T24457] __should_failslab+0x81/0x90 [ 301.216593][T24457] should_failslab+0x5/0x20 [ 301.221095][T24457] kmem_cache_alloc+0x4f/0x300 [ 301.225861][T24457] getname_flags+0x84/0x3f0 [ 301.230381][T24457] ? up_write+0x25/0xc0 [ 301.234532][T24457] getname+0x15/0x20 [ 301.238421][T24457] do_sys_openat2+0x6d/0x2b0 [ 301.243011][T24457] __x64_sys_openat+0xef/0x110 [ 301.248276][T24457] do_syscall_64+0x44/0xa0 [ 301.252697][T24457] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 301.258650][T24457] RIP: 0033:0x7f8eb44997f4 [ 301.263061][T24457] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 301.282755][T24457] RSP: 002b:00007f8eb225ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 301.291345][T24457] RAX: ffffffffffffffda RBX: 00007f8eb4530cc0 RCX: 00007f8eb44997f4 [ 301.299323][T24457] RDX: 0000000000000002 RSI: 00007f8eb225e000 RDI: 00000000ffffff9c [ 301.307387][T24457] RBP: 00007f8eb225e000 R08: 0000000000000000 R09: ffffffffffffffff 04:59:37 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfeffffff, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:37 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf00, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x441, 0x0) [ 301.315350][T24457] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 301.323350][T24457] R13: 0000000000000004 R14: 00000000200004c0 R15: 0000000000000000 04:59:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 9) [ 301.433016][T24465] loop5: detected capacity change from 0 to 264192 [ 301.464862][T24471] FAULT_INJECTION: forcing a failure. [ 301.464862][T24471] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 301.477948][T24471] CPU: 0 PID: 24471 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 301.486787][T24471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.496921][T24471] Call Trace: [ 301.500196][T24471] dump_stack_lvl+0xd6/0x122 [ 301.504793][T24471] dump_stack+0x11/0x1b [ 301.509003][T24471] should_fail+0x23c/0x250 [ 301.513660][T24471] should_fail_usercopy+0x16/0x20 [ 301.518689][T24471] strncpy_from_user+0x21/0x250 [ 301.523548][T24471] getname_flags+0xb8/0x3f0 [ 301.528063][T24471] getname+0x15/0x20 [ 301.531967][T24471] do_sys_openat2+0x6d/0x2b0 [ 301.536584][T24471] ? __schedule+0x435/0x680 [ 301.541211][T24471] __x64_sys_openat+0xef/0x110 [ 301.545965][T24471] do_syscall_64+0x44/0xa0 [ 301.550383][T24471] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 301.556343][T24471] RIP: 0033:0x7f8eb44997f4 [ 301.560750][T24471] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 301.580350][T24471] RSP: 002b:00007f8eb225ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 301.587311][T24463] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 301.588753][T24471] RAX: ffffffffffffffda RBX: 00007f8eb4530cc0 RCX: 00007f8eb44997f4 [ 301.603213][T24471] RDX: 0000000000000002 RSI: 00007f8eb225e000 RDI: 00000000ffffff9c [ 301.611193][T24471] RBP: 00007f8eb225e000 R08: 0000000000000000 R09: ffffffffffffffff [ 301.619223][T24471] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 301.627191][T24471] R13: 0000000000000004 R14: 00000000200004c0 R15: 0000000000000000 04:59:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 10) 04:59:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x9000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:38 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) mount(&(0x7f0000000000)=@md0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='incremental-fs\x00', 0x1c5042, &(0x7f0000000100)='\x00') io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) 04:59:38 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1020, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:38 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r1, &(0x7f0000000300)=""/28, 0x1c) getdents(r1, &(0x7f0000000040)=""/97, 0x61) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x34) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r2, &(0x7f0000000300)=""/28, 0x1c) getdents(r2, &(0x7f0000000040)=""/97, 0x61) sendfile(r1, r2, &(0x7f0000000000)=0x9, 0x1) [ 301.683423][T24465] loop5: detected capacity change from 0 to 264192 [ 301.766783][T24497] FAULT_INJECTION: forcing a failure. [ 301.766783][T24497] name failslab, interval 1, probability 0, space 0, times 0 [ 301.779418][T24497] CPU: 0 PID: 24497 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 301.788222][T24497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.798309][T24497] Call Trace: [ 301.801586][T24497] dump_stack_lvl+0xd6/0x122 [ 301.806251][T24497] dump_stack+0x11/0x1b [ 301.810410][T24497] should_fail+0x23c/0x250 [ 301.814850][T24497] ? __alloc_file+0x2e/0x1a0 [ 301.819475][T24497] __should_failslab+0x81/0x90 [ 301.824257][T24497] should_failslab+0x5/0x20 [ 301.828789][T24497] kmem_cache_alloc+0x4f/0x300 [ 301.833555][T24497] __alloc_file+0x2e/0x1a0 [ 301.837995][T24497] alloc_empty_file+0xcd/0x1c0 [ 301.842764][T24497] path_openat+0x6a/0x1ec0 [ 301.847194][T24497] ? avc_has_perm_noaudit+0x1c0/0x270 [ 301.852579][T24497] ? avc_has_perm+0x70/0x160 [ 301.857164][T24497] ? avc_has_perm+0xd5/0x160 [ 301.861756][T24497] do_filp_open+0x105/0x220 [ 301.866263][T24497] do_sys_openat2+0xb5/0x2b0 [ 301.870870][T24497] __x64_sys_openat+0xef/0x110 [ 301.875642][T24497] do_syscall_64+0x44/0xa0 [ 301.880061][T24497] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 301.885964][T24497] RIP: 0033:0x7f8eb44997f4 [ 301.890396][T24497] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 301.910098][T24497] RSP: 002b:00007f8eb225ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 301.918510][T24497] RAX: ffffffffffffffda RBX: 00007f8eb4530cc0 RCX: 00007f8eb44997f4 [ 301.926543][T24497] RDX: 0000000000000002 RSI: 00007f8eb225e000 RDI: 00000000ffffff9c [ 301.934510][T24497] RBP: 00007f8eb225e000 R08: 0000000000000000 R09: ffffffffffffffff [ 301.942599][T24497] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 301.950568][T24497] R13: 0000000000000004 R14: 00000000200004c0 R15: 0000000000000000 [ 301.983881][T24501] loop5: detected capacity change from 0 to 264192 04:59:38 executing program 5: write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000000)=@target={'target ', {'PCI:', '18', ':', '12', ':', '1e', '.', '3'}}, 0x16) [ 302.029079][T24494] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 11) 04:59:38 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1100, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 302.137653][T24520] FAULT_INJECTION: forcing a failure. [ 302.137653][T24520] name failslab, interval 1, probability 0, space 0, times 0 [ 302.150318][T24520] CPU: 0 PID: 24520 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 302.159151][T24520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.169247][T24520] Call Trace: [ 302.172532][T24520] dump_stack_lvl+0xd6/0x122 [ 302.177149][T24520] dump_stack+0x11/0x1b [ 302.181375][T24520] should_fail+0x23c/0x250 [ 302.185790][T24520] ? security_file_alloc+0x30/0x190 [ 302.190991][T24520] __should_failslab+0x81/0x90 [ 302.195752][T24520] should_failslab+0x5/0x20 [ 302.200317][T24520] kmem_cache_alloc+0x4f/0x300 [ 302.205102][T24520] security_file_alloc+0x30/0x190 [ 302.210174][T24520] __alloc_file+0x83/0x1a0 [ 302.214779][T24520] alloc_empty_file+0xcd/0x1c0 [ 302.219594][T24520] path_openat+0x6a/0x1ec0 [ 302.224047][T24520] ? avc_has_perm_noaudit+0x1c0/0x270 [ 302.229417][T24520] ? avc_has_perm+0x70/0x160 [ 302.234002][T24520] ? avc_has_perm+0xd5/0x160 [ 302.238594][T24520] do_filp_open+0x105/0x220 [ 302.243207][T24520] do_sys_openat2+0xb5/0x2b0 [ 302.247802][T24520] __x64_sys_openat+0xef/0x110 [ 302.252584][T24520] do_syscall_64+0x44/0xa0 [ 302.257014][T24520] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 302.263080][T24520] RIP: 0033:0x7f8eb44997f4 [ 302.267505][T24520] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 302.287162][T24520] RSP: 002b:00007f8eb225ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 302.295576][T24520] RAX: ffffffffffffffda RBX: 00007f8eb4530cc0 RCX: 00007f8eb44997f4 [ 302.303550][T24520] RDX: 0000000000000002 RSI: 00007f8eb225e000 RDI: 00000000ffffff9c [ 302.311527][T24520] RBP: 00007f8eb225e000 R08: 0000000000000000 R09: ffffffffffffffff [ 302.319525][T24520] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 302.327490][T24520] R13: 0000000000000004 R14: 00000000200004c0 R15: 0000000000000000 04:59:38 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff7f, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:38 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) openat(r0, &(0x7f0000000000)='./file0\x00', 0x282402, 0x80) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r1, &(0x7f0000000300)=""/28, 0x1c) getdents(r1, &(0x7f0000000040)=""/97, 0x61) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x182) 04:59:38 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, 0x0, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8001}, 0x4010) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45fd121b80259c1a}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x320, r2, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MLSLVLLST={0x38, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xef}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7e}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x586246ca}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfd}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f1c286b}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xf8, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x872a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x705f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc7f1}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5ac31b08}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7c1}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2d0d142c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6f18434}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf2f2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x602c454e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x35ea6638}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x95ac}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x430aae91}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cf90ac}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe952}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4301}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6e519d3b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x144a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3c684f96}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc816}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x28cf}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdf79}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbb37}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1ec8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x92ae}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ab3d7ee}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x16324e80}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe252}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x80, 0xc, 0x0, 0x1, [{0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1c4b47af}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3fc5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9a3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x53bb1cfe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8735}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x74ae}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3fefd00f}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x99d9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb1ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x463b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f551b5b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x553ac3fd}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x743e71f8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3766}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4c, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x65}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1ab210b1}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfa}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x70d43479}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x54450f28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d319c8f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1a5a345a}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xf8, 0x8, 0x0, 0x1, [{0x4}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3e658f39}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x54f68979}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ad141e4}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3638242c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6337e432}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3ac096f7}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x44}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x85}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4d0eb901}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x39ecbcb6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x41e21ab0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e0bea13}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x73}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5764d2c4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2c088a86}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d79e4b4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x99}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x20}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x74a278d7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x231f291e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x80}]}]}]}, 0x320}, 0x1, 0x0, 0x0, 0x4000800}, 0x4048) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x200, 0x70bd2d, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 302.403955][T24529] loop5: detected capacity change from 0 to 264192 [ 302.417489][T24526] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:39 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1200, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 302.548043][T24547] loop5: detected capacity change from 0 to 264192 04:59:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xa000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 12) [ 302.609058][T24546] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 302.624384][T24551] loop5: detected capacity change from 0 to 264192 [ 302.689377][T24567] FAULT_INJECTION: forcing a failure. [ 302.689377][T24567] name failslab, interval 1, probability 0, space 0, times 0 [ 302.702018][T24567] CPU: 0 PID: 24567 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 302.710789][T24567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.720840][T24567] Call Trace: [ 302.724108][T24567] dump_stack_lvl+0xd6/0x122 [ 302.728778][T24567] dump_stack+0x11/0x1b [ 302.733007][T24567] should_fail+0x23c/0x250 [ 302.737411][T24567] ? kzalloc+0x16/0x20 [ 302.741480][T24567] __should_failslab+0x81/0x90 [ 302.746280][T24567] should_failslab+0x5/0x20 [ 302.750874][T24567] __kmalloc+0x6f/0x350 [ 302.755072][T24567] ? _atomic_dec_and_lock+0x60/0xd0 [ 302.760320][T24567] kzalloc+0x16/0x20 [ 302.764268][T24567] alloc_workqueue+0x12f/0xad0 [ 302.769044][T24567] ? disk_unblock_events+0x35/0x40 [ 302.774170][T24567] ? bd_prepare_to_claim+0x1e6/0x270 [ 302.779566][T24567] ? loop_attr_do_show_dio+0x70/0x70 [ 302.784942][T24567] ? loop_set_status_from_info+0x35e/0x3a0 [ 302.790743][T24567] loop_configure+0x681/0xeb0 [ 302.795429][T24567] lo_ioctl+0x618/0x13e0 [ 302.799673][T24567] ? path_openat+0x18d4/0x1ec0 [ 302.804502][T24567] ? blkdev_common_ioctl+0x438/0x1110 [ 302.809939][T24567] ? selinux_file_ioctl+0x981/0xa10 [ 302.815144][T24567] ? lo_release+0x120/0x120 [ 302.819643][T24567] blkdev_ioctl+0x1d0/0x3f0 [ 302.824158][T24567] block_ioctl+0x6e/0x80 [ 302.828389][T24567] ? blkdev_iopoll+0x80/0x80 [ 302.832981][T24567] __se_sys_ioctl+0xcb/0x140 [ 302.837573][T24567] __x64_sys_ioctl+0x3f/0x50 [ 302.842150][T24567] do_syscall_64+0x44/0xa0 [ 302.846572][T24567] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 302.852522][T24567] RIP: 0033:0x7f8eb44e6697 [ 302.856925][T24567] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 302.876520][T24567] RSP: 002b:00007f8eb225df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 04:59:39 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x400001, 0x1) mount$tmpfs(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x2001480, &(0x7f0000000200)={[{@gid={'gid', 0x3d, 0xee00}}, {@mode={'mode', 0x3d, 0x400}}, {@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x33, 0x32, 0x33, 0x33, 0x38, 0x3a, 0x2c, 0x2f, 0x30, 0x32]}}}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '['}}, {@fsname={'fsname', 0x3d, '\x89\xdb[][-)&'}}]}) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) 04:59:39 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x5}], 0x301c014, &(0x7f0000000140)=ANY=[]) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v1={0x1000000, [{0x4, 0x401}]}, 0xc, 0x3) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x8) r2 = syz_io_uring_setup(0x187, &(0x7f0000000440)={0x0, 0x0, 0x1, 0x1, 0x4000000, 0x0, r1}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000100)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(0x0, r4, &(0x7f00000000c0)=@IORING_OP_FILES_UPDATE={0x14, 0x3, 0x0, 0x0, 0x5, &(0x7f0000000380)=[0xffffffffffffffff, r6, r5, r2, r6, r0], 0x6}, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/97, 0x61) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r8, &(0x7f0000000300)=""/28, 0x1c) getdents(r8, &(0x7f0000000040)=""/97, 0x61) r9 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x80241, 0x10) r10 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x1, 0x0) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r11, &(0x7f0000000300)=""/28, 0x1c) getdents(r11, &(0x7f0000000240)=""/139, 0xfffffffffffffed5) poll(&(0x7f0000000400)=[{0xffffffffffffffff, 0x90}, {r8}, {r9, 0xc067}, {r10, 0x5142}, {r11, 0x62a0}], 0x5, 0x2) getdents64(r7, &(0x7f0000000300)=""/28, 0x1c) getdents(r7, &(0x7f0000000040)=""/97, 0x61) syz_io_uring_submit(r3, 0x0, &(0x7f0000000180)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40000000, 0x1, {0x2}}, 0x2387) [ 302.884918][T24567] RAX: ffffffffffffffda RBX: 00007f8eb4530cc0 RCX: 00007f8eb44e6697 [ 302.892914][T24567] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 302.900872][T24567] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 302.908837][T24567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 302.916817][T24567] R13: 0000000000000004 R14: 00000000200004c0 R15: 0000000000000000 04:59:39 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 13) [ 303.011559][T24579] loop5: detected capacity change from 0 to 264192 [ 303.024423][T24582] FAULT_INJECTION: forcing a failure. [ 303.024423][T24582] name failslab, interval 1, probability 0, space 0, times 0 [ 303.037087][T24582] CPU: 1 PID: 24582 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 303.045839][T24582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.055884][T24582] Call Trace: [ 303.059174][T24582] dump_stack_lvl+0xd6/0x122 [ 303.063907][T24582] dump_stack+0x11/0x1b [ 303.068070][T24582] should_fail+0x23c/0x250 [ 303.072504][T24582] __should_failslab+0x81/0x90 [ 303.077323][T24582] ? alloc_workqueue+0x15d/0xad0 [ 303.082258][T24582] should_failslab+0x5/0x20 [ 303.086756][T24582] kmem_cache_alloc_trace+0x52/0x320 [ 303.092104][T24582] alloc_workqueue+0x15d/0xad0 [ 303.096884][T24582] ? disk_unblock_events+0x35/0x40 [ 303.102022][T24582] ? bd_prepare_to_claim+0x1e6/0x270 [ 303.107367][T24582] ? loop_attr_do_show_dio+0x70/0x70 [ 303.112657][T24582] ? loop_set_status_from_info+0x35e/0x3a0 [ 303.118527][T24582] loop_configure+0x681/0xeb0 [ 303.123200][T24582] lo_ioctl+0x618/0x13e0 [ 303.127452][T24582] ? path_openat+0x18d4/0x1ec0 [ 303.132270][T24582] ? blkdev_common_ioctl+0x438/0x1110 [ 303.137682][T24582] ? selinux_file_ioctl+0x981/0xa10 [ 303.142949][T24582] ? lo_release+0x120/0x120 [ 303.147504][T24582] blkdev_ioctl+0x1d0/0x3f0 [ 303.152063][T24582] block_ioctl+0x6e/0x80 [ 303.156339][T24582] ? blkdev_iopoll+0x80/0x80 [ 303.160916][T24582] __se_sys_ioctl+0xcb/0x140 [ 303.165501][T24582] __x64_sys_ioctl+0x3f/0x50 [ 303.170088][T24582] do_syscall_64+0x44/0xa0 [ 303.174570][T24582] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 303.180548][T24582] RIP: 0033:0x7f8eb44e6697 [ 303.184958][T24582] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 303.204586][T24582] RSP: 002b:00007f8eb225df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 303.212993][T24582] RAX: ffffffffffffffda RBX: 00007f8eb4530cc0 RCX: 00007f8eb44e6697 [ 303.220965][T24582] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 303.228931][T24582] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 303.236906][T24582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 303.244870][T24582] R13: 0000000000000004 R14: 00000000200004c0 R15: 0000000000000000 04:59:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 14) 04:59:39 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffff6, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 303.413127][T24597] FAULT_INJECTION: forcing a failure. [ 303.413127][T24597] name failslab, interval 1, probability 0, space 0, times 0 [ 303.425780][T24597] CPU: 0 PID: 24597 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 303.434544][T24597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.444597][T24597] Call Trace: [ 303.447922][T24597] dump_stack_lvl+0xd6/0x122 [ 303.452511][T24597] dump_stack+0x11/0x1b [ 303.456676][T24597] should_fail+0x23c/0x250 [ 303.461091][T24597] ? kzalloc+0x16/0x20 [ 303.465197][T24597] __should_failslab+0x81/0x90 [ 303.469960][T24597] should_failslab+0x5/0x20 [ 303.474457][T24597] __kmalloc+0x6f/0x350 [ 303.478618][T24597] ? number+0xa13/0xb60 [ 303.482252][T24588] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 303.482765][T24597] kzalloc+0x16/0x20 [ 303.482790][T24597] apply_wqattrs_prepare+0x3a/0x630 [ 303.498355][T24597] ? vsnprintf+0xe8f/0xed0 [ 303.502834][T24597] apply_workqueue_attrs+0x9e/0x100 [ 303.508032][T24597] alloc_workqueue+0x777/0xad0 [ 303.512826][T24597] ? disk_unblock_events+0x35/0x40 [ 303.518093][T24597] ? bd_prepare_to_claim+0x1e6/0x270 [ 303.523421][T24597] ? loop_attr_do_show_dio+0x70/0x70 [ 303.528732][T24597] ? loop_set_status_from_info+0x35e/0x3a0 [ 303.534540][T24597] loop_configure+0x681/0xeb0 [ 303.539270][T24597] lo_ioctl+0x618/0x13e0 [ 303.543515][T24597] ? path_openat+0x18d4/0x1ec0 [ 303.548323][T24597] ? blkdev_common_ioctl+0x438/0x1110 [ 303.553746][T24597] ? selinux_file_ioctl+0x981/0xa10 [ 303.558949][T24597] ? lo_release+0x120/0x120 [ 303.563451][T24597] blkdev_ioctl+0x1d0/0x3f0 [ 303.567954][T24597] block_ioctl+0x6e/0x80 [ 303.572261][T24597] ? blkdev_iopoll+0x80/0x80 [ 303.576849][T24597] __se_sys_ioctl+0xcb/0x140 [ 303.581445][T24597] __x64_sys_ioctl+0x3f/0x50 [ 303.586034][T24597] do_syscall_64+0x44/0xa0 [ 303.590450][T24597] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 303.596385][T24597] RIP: 0033:0x7f8eb44e6697 [ 303.600817][T24597] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 303.620585][T24597] RSP: 002b:00007f8eb225df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 303.629093][T24597] RAX: ffffffffffffffda RBX: 00007f8eb4530cc0 RCX: 00007f8eb44e6697 [ 303.637061][T24597] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 303.645112][T24597] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 303.653112][T24597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 04:59:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xb000000, &(0x7f00000004c0), 0x0, 0x0) [ 303.661085][T24597] R13: 0000000000000004 R14: 00000000200004c0 R15: 0000000000000000 04:59:40 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x80, 0x1f, 0xfd, 0x5, 0x2, 0x0, 0x20, 0x40180, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffff0001, 0x2, @perf_bp={&(0x7f0000000000), 0xa}, 0xa00, 0x2, 0x4bc, 0x4, 0x3ff, 0xffffff81, 0x81, 0x0, 0x6, 0x0, 0x1}, r0, 0x1, r1, 0x6) sendfile(r5, r6, &(0x7f0000000100)=0x5, 0x0) 04:59:40 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2010, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 15) [ 304.208502][T24623] FAULT_INJECTION: forcing a failure. [ 304.208502][T24623] name failslab, interval 1, probability 0, space 0, times 0 [ 304.221157][T24623] CPU: 1 PID: 24623 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 304.229919][T24623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.240002][T24623] Call Trace: [ 304.243278][T24623] dump_stack_lvl+0xd6/0x122 [ 304.247880][T24623] dump_stack+0x11/0x1b [ 304.252093][T24623] should_fail+0x23c/0x250 [ 304.256647][T24623] __should_failslab+0x81/0x90 [ 304.261418][T24623] ? apply_wqattrs_prepare+0x5f/0x630 [ 304.266794][T24623] should_failslab+0x5/0x20 [ 304.271402][T24623] kmem_cache_alloc_trace+0x52/0x320 [ 304.276692][T24623] apply_wqattrs_prepare+0x5f/0x630 [ 304.281887][T24623] ? vsnprintf+0xe8f/0xed0 [ 304.286305][T24623] apply_workqueue_attrs+0x9e/0x100 [ 304.291511][T24623] alloc_workqueue+0x777/0xad0 [ 304.296293][T24623] ? __schedule+0x435/0x680 [ 304.300793][T24623] ? loop_set_status_from_info+0x35e/0x3a0 [ 304.306676][T24623] loop_configure+0x681/0xeb0 [ 304.311365][T24623] lo_ioctl+0x618/0x13e0 [ 304.315608][T24623] ? path_openat+0x18d4/0x1ec0 [ 304.320431][T24623] ? blkdev_common_ioctl+0x438/0x1110 [ 304.325804][T24623] ? asm_common_interrupt+0x1e/0x40 [ 304.331125][T24623] ? lo_release+0x120/0x120 [ 304.335629][T24623] blkdev_ioctl+0x1d0/0x3f0 [ 304.340138][T24623] block_ioctl+0x6e/0x80 [ 304.344396][T24623] ? blkdev_iopoll+0x80/0x80 [ 304.348983][T24623] __se_sys_ioctl+0xcb/0x140 [ 304.353582][T24623] __x64_sys_ioctl+0x3f/0x50 [ 304.358249][T24623] do_syscall_64+0x44/0xa0 [ 304.362674][T24623] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 304.368648][T24623] RIP: 0033:0x7f8eb44e6697 [ 304.373118][T24623] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 304.393213][T24623] RSP: 002b:00007f8eb225df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 304.401677][T24623] RAX: ffffffffffffffda RBX: 00007f8eb4530cc0 RCX: 00007f8eb44e6697 [ 304.409703][T24623] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 304.417680][T24623] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 304.425651][T24623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 304.433627][T24623] R13: 0000000000000004 R14: 00000000200004c0 R15: 0000000000000000 04:59:41 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffffe, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xc000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:41 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x78, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:cron_spool_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x11, 0x2, @loopback={0x100000000000000}}, @NLBL_UNLABEL_A_IPV6MASK={0x11, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'lo\x00'}]}, 0x78}, 0x1, 0x1000000}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r2) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf251400000008000300", @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="0c00060002000000000000000800010000000000"], 0x38}, 0x1, 0x0, 0x0, 0x4810}, 0x800) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x40, r4, 0x8, 0x70bd29, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x40040) r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r3) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x38, r6, 0x207, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x200f5}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x4}]}, 0x38}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), r7) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x74, r1, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x25}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}]}, 0x74}, 0x1, 0x0, 0x0, 0x84}, 0x40) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:41 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x40, 0x5, 0x7f, 0x4, 0x0, 0x7, 0x8024, 0xe, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xff, 0x2}, 0x2, 0x1, 0xffffffff, 0x7, 0x62ae, 0xac, 0x7f, 0x0, 0x3f, 0x0, 0x8}, 0x0, 0x7, r0, 0x2) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) 04:59:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 16) [ 304.880786][T24635] loop5: detected capacity change from 0 to 264192 [ 304.909444][T24624] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:41 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2200, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 304.984079][T24644] loop5: detected capacity change from 0 to 264192 [ 304.999257][T24656] FAULT_INJECTION: forcing a failure. [ 304.999257][T24656] name failslab, interval 1, probability 0, space 0, times 0 [ 305.011946][T24656] CPU: 1 PID: 24656 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 305.020739][T24656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.030790][T24656] Call Trace: [ 305.034066][T24656] dump_stack_lvl+0xd6/0x122 [ 305.038742][T24656] dump_stack+0x11/0x1b [ 305.042941][T24656] should_fail+0x23c/0x250 [ 305.047362][T24656] __should_failslab+0x81/0x90 [ 305.052112][T24656] ? apply_wqattrs_prepare+0xbe/0x630 [ 305.059137][T24656] should_failslab+0x5/0x20 [ 305.063725][T24656] kmem_cache_alloc_trace+0x52/0x320 [ 305.069088][T24656] ? apply_wqattrs_prepare+0x5f/0x630 [ 305.074446][T24656] apply_wqattrs_prepare+0xbe/0x630 [ 305.079636][T24656] ? vsnprintf+0xe8f/0xed0 [ 305.084052][T24656] apply_workqueue_attrs+0x9e/0x100 [ 305.089309][T24656] alloc_workqueue+0x777/0xad0 [ 305.094178][T24656] ? loop_set_status_from_info+0x35e/0x3a0 [ 305.099994][T24656] loop_configure+0x681/0xeb0 [ 305.104723][T24656] lo_ioctl+0x618/0x13e0 [ 305.108968][T24656] ? path_openat+0x18d4/0x1ec0 [ 305.113749][T24656] ? blkdev_common_ioctl+0x438/0x1110 [ 305.119130][T24656] ? selinux_file_ioctl+0x981/0xa10 [ 305.124318][T24656] ? lo_release+0x120/0x120 [ 305.128817][T24656] blkdev_ioctl+0x1d0/0x3f0 [ 305.133308][T24656] block_ioctl+0x6e/0x80 [ 305.137606][T24656] ? blkdev_iopoll+0x80/0x80 [ 305.142208][T24656] __se_sys_ioctl+0xcb/0x140 [ 305.146796][T24656] __x64_sys_ioctl+0x3f/0x50 [ 305.151377][T24656] do_syscall_64+0x44/0xa0 [ 305.155849][T24656] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 305.161741][T24656] RIP: 0033:0x7f8eb44e6697 04:59:41 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r1, &(0x7f0000000300)=""/28, 0x1c) getdents(r1, &(0x7f0000000040)=""/97, 0x61) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x2100801, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '.]}\xc2['}}, {@cache_mmap}, {@access_client}, {@privport}, {@cache_none}, {@debug={'debug', 0x3d, 0x7}}, {@posixacl}, {@aname={'aname', 0x3d, '(^'}}], [{@fowner_eq={'fowner', 0x3d, r2}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', 0xee01}}]}}) [ 305.166221][T24656] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 305.185820][T24656] RSP: 002b:00007f8eb225df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 305.194224][T24656] RAX: ffffffffffffffda RBX: 00007f8eb4530cc0 RCX: 00007f8eb44e6697 [ 305.202189][T24656] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 305.210149][T24656] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 305.218144][T24656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 305.226107][T24656] R13: 0000000000000004 R14: 00000000200004c0 R15: 0000000000000000 [ 305.313197][T24665] loop5: detected capacity change from 0 to 264192 04:59:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) dup(r0) creat(&(0x7f0000000080)='./file0\x00', 0x4) 04:59:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xd000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:42 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x80000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 17) [ 305.436886][T24666] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 305.450540][T24676] loop5: detected capacity change from 0 to 264192 04:59:42 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2500, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 305.520111][T24692] FAULT_INJECTION: forcing a failure. [ 305.520111][T24692] name failslab, interval 1, probability 0, space 0, times 0 [ 305.532769][T24692] CPU: 1 PID: 24692 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 305.541586][T24692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.551619][T24692] Call Trace: [ 305.554888][T24692] dump_stack_lvl+0xd6/0x122 [ 305.559544][T24692] dump_stack+0x11/0x1b [ 305.563697][T24692] should_fail+0x23c/0x250 [ 305.568089][T24692] __should_failslab+0x81/0x90 [ 305.572846][T24692] should_failslab+0x5/0x20 [ 305.577409][T24692] kmem_cache_alloc_node+0x61/0x2c0 [ 305.582604][T24692] ? alloc_unbound_pwq+0x3e6/0x780 [ 305.587691][T24692] alloc_unbound_pwq+0x3e6/0x780 [ 305.592606][T24692] apply_wqattrs_prepare+0x1ed/0x630 [ 305.597873][T24692] ? vsnprintf+0xe8f/0xed0 [ 305.602273][T24692] apply_workqueue_attrs+0x9e/0x100 [ 305.607460][T24692] alloc_workqueue+0x777/0xad0 [ 305.612202][T24692] ? disk_unblock_events+0x35/0x40 [ 305.617291][T24692] ? bd_prepare_to_claim+0x1e6/0x270 [ 305.622591][T24692] ? loop_attr_do_show_dio+0x70/0x70 [ 305.627861][T24692] ? loop_set_status_from_info+0x35e/0x3a0 [ 305.633649][T24692] loop_configure+0x681/0xeb0 [ 305.638427][T24692] lo_ioctl+0x618/0x13e0 [ 305.642727][T24692] ? path_openat+0x18d4/0x1ec0 [ 305.647545][T24692] ? blkdev_common_ioctl+0x438/0x1110 [ 305.652926][T24692] ? selinux_file_ioctl+0x981/0xa10 [ 305.658142][T24692] ? lo_release+0x120/0x120 [ 305.662626][T24692] blkdev_ioctl+0x1d0/0x3f0 [ 305.667146][T24692] block_ioctl+0x6e/0x80 [ 305.671368][T24692] ? blkdev_iopoll+0x80/0x80 [ 305.675965][T24692] __se_sys_ioctl+0xcb/0x140 [ 305.680559][T24692] __x64_sys_ioctl+0x3f/0x50 [ 305.685124][T24692] do_syscall_64+0x44/0xa0 [ 305.689617][T24692] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 305.695491][T24692] RIP: 0033:0x7f8eb44e6697 [ 305.699938][T24692] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 305.719560][T24692] RSP: 002b:00007f8eb225df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 305.727963][T24692] RAX: ffffffffffffffda RBX: 00007f8eb4530cc0 RCX: 00007f8eb44e6697 [ 305.735926][T24692] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 305.743877][T24692] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 305.751867][T24692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 305.759908][T24692] R13: 0000000000000004 R14: 00000000200004c0 R15: 0000000000000000 04:59:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) (fail_nth: 18) [ 305.796339][T24676] loop5: detected capacity change from 0 to 264192 [ 305.846932][T24708] FAULT_INJECTION: forcing a failure. [ 305.846932][T24708] name failslab, interval 1, probability 0, space 0, times 0 [ 305.859582][T24708] CPU: 1 PID: 24708 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 305.868362][T24708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.878423][T24708] Call Trace: [ 305.881701][T24708] dump_stack_lvl+0xd6/0x122 [ 305.886315][T24708] dump_stack+0x11/0x1b [ 305.890466][T24708] should_fail+0x23c/0x250 [ 305.894875][T24708] __should_failslab+0x81/0x90 [ 305.899631][T24708] ? kobject_uevent_env+0x1a7/0xc40 [ 305.904914][T24708] should_failslab+0x5/0x20 [ 305.909484][T24708] kmem_cache_alloc_trace+0x52/0x320 [ 305.914869][T24708] ? pwq_adjust_max_active+0x491/0x4b0 [ 305.920581][T24708] ? dev_uevent_filter+0x70/0x70 [ 305.925553][T24708] kobject_uevent_env+0x1a7/0xc40 [ 305.930626][T24708] ? __list_add_valid+0x28/0x90 [ 305.935478][T24708] ? alloc_workqueue+0xa18/0xad0 [ 305.940468][T24708] disk_force_media_change+0xe3/0x170 [ 305.945916][T24708] loop_configure+0x6c0/0xeb0 [ 305.950603][T24708] lo_ioctl+0x618/0x13e0 [ 305.955044][T24708] ? path_openat+0x18d4/0x1ec0 [ 305.959910][T24708] ? blkdev_common_ioctl+0x438/0x1110 [ 305.965280][T24708] ? selinux_file_ioctl+0x981/0xa10 [ 305.970532][T24708] ? lo_release+0x120/0x120 [ 305.975022][T24708] blkdev_ioctl+0x1d0/0x3f0 [ 305.979511][T24708] block_ioctl+0x6e/0x80 [ 305.983741][T24708] ? blkdev_iopoll+0x80/0x80 [ 305.988355][T24708] __se_sys_ioctl+0xcb/0x140 [ 305.992933][T24708] __x64_sys_ioctl+0x3f/0x50 [ 305.997561][T24708] do_syscall_64+0x44/0xa0 [ 306.001969][T24708] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 306.007943][T24708] RIP: 0033:0x7f8eb44e6697 [ 306.012364][T24708] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 306.032224][T24708] RSP: 002b:00007f8eb225df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 306.040625][T24708] RAX: ffffffffffffffda RBX: 00007f8eb4530cc0 RCX: 00007f8eb44e6697 [ 306.048594][T24708] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 306.056584][T24708] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 306.064542][T24708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 306.072501][T24708] R13: 0000000000000004 R14: 00000000200004c0 R15: 0000000000000000 04:59:42 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) r1 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000000c0), 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x800004, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@mmap}, {@cache_none}, {@cache_mmap}, {@access_any}, {@access_client}, {@access_any}, {@debug={'debug', 0x3d, 0x5}}, {@version_u}, {@posixacl}, {@noextend}], [{@seclabel}, {@seclabel}, {@dont_hash}]}}) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 306.092940][T24704] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:42 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) r5 = accept4$inet(r1, 0x0, &(0x7f0000000000), 0x100000) fcntl$setlease(r5, 0x400, 0x0) sendfile(r0, r0, 0x0, 0x8080ffffff80) 04:59:42 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3f00, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 306.181861][T24716] loop5: detected capacity change from 0 to 264192 04:59:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x301c014, &(0x7f0000000140)=ANY=[@ANYRES64, @ANYBLOB="f4f9621f4400f586cfaec973d2674efe565e45eb8f4584b24a28fd0b190e7a3c4db1c3d44c4522310e6d28a3c270579119815be0ffdb8b675da90b2535720d88baa842dd50babf14060d3d30320d73ab3d05bd74acbf59a6d87696248c42640ce02a567e72deea19efa4f1ef1e219539e85b304715e9b0f70c1b927a5a7cf11ce6f261a907a895cfee4592d00648a85937b563af7ff0aa", @ANYRES32]) [ 306.237066][T24729] 9pnet: Insufficient options for proto=fd [ 306.431555][T24730] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:43 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:43 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1000000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xe000000, &(0x7f00000004c0), 0x0, 0x0) [ 306.736975][T24751] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:43 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4800, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:43 executing program 5: socketpair(0x25, 0x80000, 0x10000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa64f, 0x0, @perf_bp, 0x0, 0x200, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000018c0)={0x3, 0x80, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x2, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x1}, 0x10, 0x9, 0xb4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdbe, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f0000000400)={{}, r4, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r5]}, @devid}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001940)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r7, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYRESOCT, @ANYRES32=r3, @ANYRES32, @ANYRES64, @ANYRESHEX=r1], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f0000000080)=r5) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 306.948356][T24775] device lo entered promiscuous mode [ 306.955975][T24775] Y­4`Ò˜: renamed from lo [ 306.959304][T24782] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 306.982893][T24782] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 306.988642][T24775] loop5: detected capacity change from 0 to 264192 04:59:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 307.090048][T24796] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 307.119376][T24796] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:43 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x1100c08, &(0x7f0000000200)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@version_u}, {@dfltuid={'dfltuid', 0x3d, r5}}, {@access_client}], [{@dont_measure}]}}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) lseek(r4, 0x0, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r6, 0x0, 0x8400fffffffb) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r7, &(0x7f0000000300)=""/28, 0x1c) getdents(r7, &(0x7f0000000040)=""/97, 0x61) write(r7, &(0x7f0000000100)="45b7de324c19394e0f5eff9b5885b6c461edc358839363731ffc8a24616e10959a6e8b1c25f4f0d901", 0x29) sendfile(r0, r0, 0x0, 0x8080ffffff80) 04:59:43 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) [ 307.173756][T24796] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 307.197807][T24796] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 307.223471][T24818] loop5: detected capacity change from 0 to 264192 04:59:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x3, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:43 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000002c0)="da", 0x1, 0x1000, 0x0, 0x3}]) r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) open(&(0x7f0000000000)='./bus\x00', 0x640000, 0x111) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r4, &(0x7f0000000300)=""/28, 0x1c) getdents(r4, &(0x7f0000000040)=""/97, 0x61) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)=0x800010) [ 307.282352][T24773] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x3, &(0x7f00000001c0)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b0500000000000000", 0x15, 0x1}, {&(0x7f0000000080)="d385b54bfbacba04eb3cadb05e8312b1e64eab101ee353e36e0ce0a9875eb72a61a33ce0c64ab6ec9519f72c9cb2ce8395f9bb10ef061cc9d78e066cb821a285eb154f3525d6612b0bb8eb3c6889405e611336df8097e024855d5e8739539b289d5cca6f52156770b854", 0x6a, 0x2}], 0x16e096, &(0x7f0000000180)=ANY=[]) 04:59:43 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4c00, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 307.371453][T24834] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 307.391122][T24834] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 307.415927][T24847] loop5: detected capacity change from 0 to 264192 04:59:44 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x20000000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 307.469692][T24834] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 307.491961][T24834] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x10000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:44 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) 04:59:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 307.596134][T24873] loop5: detected capacity change from 0 to 264192 04:59:44 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000a80)={{0x2, 0x0, @dev}, {0x304, @broadcast}, 0x7, {0x2, 0x0, @loopback}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x200000, 0x20) getdents64(r1, &(0x7f0000000300)=""/28, 0x1c) getdents(r1, &(0x7f0000000040)=""/97, 0x61) r2 = signalfd(r0, &(0x7f0000000340)={[0x5]}, 0x8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="e00000226401010000000000070000005e000101ac141425e0000001ffffffff64010100ec0000000000000026548d9db9cabe6943d192d741988d63a9"], 0x2c) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000000)=0x6, 0x4) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x8100, 0x60) getdents64(r3, &(0x7f0000000300)=""/28, 0x1c) getdents(r3, &(0x7f0000000040)=""/97, 0x61) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000400)={{0x2, 0x4e22, @local}, {0x306, @multicast}, 0x8, {0x2, 0x4e22, @multicast2}, 'wg2\x00'}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000280)={{0x2, 0x4e23, @private=0xa010102}, {0x306, @broadcast}, 0x6e, {0x2, 0x4e21, @loopback}, 'dummy0\x00'}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r4, &(0x7f0000000300)=""/28, 0x1c) getdents(r4, &(0x7f0000000040)=""/97, 0x61) mknodat$loop(r4, &(0x7f0000000180)='./file0\x00', 0x2000, 0x1) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000080)={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x306}, 0x0, {0x2, 0x4e20, @private=0xa010100}}) getdents64(r1, &(0x7f00000001c0)=""/173, 0xad) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x321c814, &(0x7f0000000180)=ANY=[]) [ 307.650903][T24880] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 307.688260][T24880] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 307.721435][T24846] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 307.755311][T24880] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 04:59:44 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:44 executing program 5: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x100) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000008, 0xc000012, r0, 0x835c0000) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 307.787305][T24880] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 307.889520][T24911] loop5: detected capacity change from 0 to 264192 04:59:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) mkdir(&(0x7f0000000000)='./file0\x00', 0xc0) creat(&(0x7f0000000080)='./file0\x00', 0x21) [ 307.965478][T24919] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 307.990992][T24919] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x6, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 308.036507][T24919] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 308.059652][T24919] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 308.077267][T24931] loop5: detected capacity change from 0 to 264192 04:59:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) creat(&(0x7f0000000000)='./file0/file0\x00', 0x18b) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x404000, 0x189) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000180)={0x2008}) chdir(&(0x7f00000000c0)='./file0/file0\x00') [ 308.193961][T24940] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 308.216703][T24947] loop5: detected capacity change from 0 to 264192 [ 308.225957][T24940] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 308.311599][T24940] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 308.345926][T24940] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 308.395549][T24904] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:45 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x100000000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x11000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:45 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000140), 0x4, 0x80200) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xc0, 0x453, 0x100, 0x70bd29, 0x25dfdbfc, "ad494f6c79adeffccf88140f08fea0831dbcd50bd980454eda20ae842a56688769dda5c742cdb0593a985aa79ed850dda51dc6b644faa3571a30f57d04b6f9e59497797fd172527836574f2d66391da97eee7d1b9f464ec16999a84c3ae50443fc38e02a7805d7800f60972b525b39b6e2251f884347208a85f60e14190584c37ecf21a86953c0c8f312a945ab126322d2756bf65764afcefc7cba34ef860dc2d2ce4f48f1899ee63305a3bbbd5aca73", [""]}, 0xc0}, 0x1, 0x0, 0x0, 0x40000}, 0x4890) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:45 executing program 2: open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r0, 0x41fe, 0x0) r1 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000002c0)="da", 0x1, 0x1000}]) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r3 = signalfd4(r1, &(0x7f0000000000)={[0x7]}, 0x8, 0x0) fsetxattr(r3, &(0x7f0000000040)=@known='user.incfs.id\x00', &(0x7f0000000080)=',]/}]**-):!/\xdc[\x00', 0xf, 0x1) r4 = pidfd_open(0xffffffffffffffff, 0x0) r5 = syz_io_uring_complete(0x0) sendfile(r4, r5, 0x0, 0x8080ffffff80) 04:59:45 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6800, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f00000000c0)=ANY=[@ANYRESDEC=0x0]) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1000000017020007102e2d66696c6530074f6b5d7b3c1f4778e0631a5262fa95bd491e5180f4d72eb5b18e7cb7d3f5b5967107fa52b70506ec683c7b410f80084a865f3317f91f096cb5f96af5c54292be2f6cd0f4cda8f9b0b6fa605522ab9a40a74a"], 0x10) creat(&(0x7f0000000080)='./file0\x00', 0x0) [ 308.578223][T24986] loop5: detected capacity change from 0 to 264192 [ 308.579440][T24985] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 04:59:45 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) rename(&(0x7f0000000080)='./bus/file0\x00', &(0x7f0000000100)='./bus\x00') lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r1, r0, &(0x7f0000000000)=0x703e87e2, 0x9) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000040)=0xfec, 0x4) sendfile(r0, r0, 0x0, 0x8080ffffff80) [ 308.651358][T24985] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 308.692895][T24999] loop5: detected capacity change from 0 to 264192 [ 308.718301][T24985] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 04:59:45 executing program 5: socket$netlink(0x10, 0x3, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000001340)={0x104, 0x11, 0x1, 0x801, 0x70bd2b, 0x25dfdbfd, {0xa, 0x0, 0x8}, [@nested={0x8, 0x70, 0x0, 0x1, [@typed={0x4, 0x18}, @generic]}, @nested={0xc, 0x84, 0x0, 0x1, [@typed={0x8, 0x79, 0x0, 0x0, @u32=0x7f}]}, @nested={0x4, 0x64}, @nested={0xd6, 0x5, 0x0, 0x1, [@generic="925c9cad0d4d", @typed={0x8, 0xe, 0x0, 0x0, @ipv4=@remote}, @generic="90f3a75e2d8ed808eec92d40afab064f4f7ebe39b68971d8b2c9dba5684957f83a06f4f20e08361adee74d24ba70e28a1681383f2e6dc9779deb307c9add3be5c492ff18dba2cb8d3a54f7a29e94983329a84cd36632acdd160222e2fdafd4d11b44a381048025c9c80383bd7deb9790d44ec3769513c59e652752fe665516336f41264d2ab1958db1847171bc32c8c7140cfab4edc3fa21581075b8aca2b868d37a587e39b52264dcdd124fc19302e7030605d1ce4e97b3f7898c6f12a993124330299f"]}]}, 0x104}, 0x1, 0x0, 0x0, 0x20000000}, 0x11) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r2, &(0x7f0000000300)=""/28, 0x1c) getdents(r2, &(0x7f0000000040)=""/97, 0x61) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000340)="834db47c4020831d0234df19d1b87d0b47df8928303f6e3c44542ced3af58835b285c9be7d35fcf8a528d53359c3ad1c8d4826759e6824d4f6f79beb7f794389b6a9569dffc33d1b376d3a1cbacfa561bb29163e8a28b3f0f83dba94f4a52a69b4da163846980bcbed7283abd9e42ef95baba1f41e8140e2b0e36b9e63bb141a6ea843c0c92c19f4e39292f9e9736ec408c5690dcbd001e7cd8c15ce6905f1dd24c86ca353311a8ee3ec633d9d2288d1fee376c213329b0dae00acee352674b7b74fa484894e8d0b173f43a4218a0b49755d3820bfc41c5f31c7cfde19a38f82f2421090c8b12a217b78731c7b06e3ceed925278e5aa484d00529d86fbfc4e2736c0e7fc0842d85ae00396520e85ad1cf4bf94a2772c237d8573db6e07d91fa952f88ec47d0330cd60864a119cf880b164002b2f0edaa3be6928b5306fba73f1e3ecd3609c65e1ab391d6591b46b2d86f6b6f0d3047cb4f82701fee8ffa65f88b726f7ead1a5bf5d345a3d9b3a50f1ff98045838c47550ac72ac789d520dc94459aad65df46030991e6f75163157f6e11cd215c5bda90ba2dc86cbeced6132c7aef29515eb473567d3937795336486f0ea32ef35a96feb55274f6085c27874ad90137f256c0348a1324c46c4b846cf0530c0eb1f49d52f53f41759a43e953acaf60339cc3e5e5781535fdef9c52aaa0a77c17dd8c073049b74dbc78905a3b4734fb89119191033695d6238811053992bdfd21b1143c078f4a5514fc09f3709a60a5369004367afeadbed24cf1c5dd24803af6b6f9170c13ddf8bbc8a9d6c059a995772f21aa9540e5f7dc5d2733020dacb4f21f37641d14b13437135ca37b7b1d4ab3330f3889ab62c071bcfa07db2a668414f282940e204b160477791c286a48461c2d56ec06ef6d447dfd160002a578c801f75c619342690ba5bf58f74e1ac8a72701589fbc4420f17a385bc92c3eef0c531203d9f382ea58d286c3a5dcd3bca006a36ceb53ad9c7aafa3969f171d05932079d14ade5f9849eeba97fcc613dad7381b54c62c912e687104317ac5a43905f10059d4046240d692d48feb607cfd2e464d009da02e888d81865ac8d75b257c67ba54cb51ee16909506ea7850a507a8356a45fd0cb9033e8f6704bab817e04427429c560c7e1b1abcb3e73acdfc58b13403321bc913db553a73790803bf22decd0579d63f75460fd04c0cfc158569ab34c29364e9cb14fa9967fba7854ac70684daa5c1705202a087622a8c026049ef605cd2b590e428bfb72e4701174eaa5af91d0af127ed81f89774f8cd3f10d445fe1bcdaa7c56d44f54b0f61bdfbd7637a4675913df3eb440dffa22c1b1b7a15e8af02c6fdfc6c88e22963bc2c5d663f22392eab1e61ac8540484d463335cb7b2f90fcfd45460468fab41c0075ae7d10c2393f5e5805a698b173fea54a7309362675fc4cd2a719b885fe61ac85a7f101c21a0e40f5302937e85edbde213b06c5d6ebe8a89456512db0cd08b5778a3b1166a39f798e24c0a78d8d3506857678823d0fb2881ce11a4190a491691eb6578608ec00a6255706197ddcaddb44f48babbf05ea67d0cc54b6997e151468ed3729b6c48fe9af4242039e6935b7c31f5fffda6990110c01e10e4fd793807b092ab40966973ded97eecd47860f5175ac0e4217a2ac7a0320de56e45ceb80acaebd5d655357feabf3d8b1b52a1647186fd08296ab39fd2cf41ff360dd9f1fdec283bb6410d843a802adcdd05abb2643d1e2c802f7a8ef1a1536f46512a84d708ac14c9ba55716316bd6bec4f04491e22238f081d7c33a229a15bd3b373091683964ce6746b39b84014da6e1f139bf79c171f26cf8e8c37acef8d43221c7cd4ff19439cd7400958e8ddaef19594cd516b437af921bf00243a00b47b8d0a5e160c806d89342acf2ce41ef846fd8a34870ed893cebd9f6daa90de0df31e2893b51f74b512664519f85b1365d0707269a1fb968bb7f5b245fb540752afa0eb4e1394223a173042ff1d9eeb38cda8e4a3f6041943df43d8753cf2a4c41757e17908c68dafa136e3f0f715880db5aa52badd8034970a98e8aa69a5d42814735e48e9cc4df39cf400850024d1f276983865f46e3607ac1313c3251ea8da940b4cacc9a2d769159d3a7ba6ef334c06cb59e7c3e7ece212d577fffdb9fafcc0ad351028db985b336f669002d0edf23bdde634bace34e4c7e6a0cb097f18930d044ae651ce001942c9ba407252754381c7f68fb031b6dc4c9ca7145db92f6d5a3365ac28394c5fae8d2794808ea39bcbbb775f0556aff2d4d8f8e7f9ae7f97482d08429ef62ef4c56f919eb0bd245c83d0dc0aa7657bd223d0f0de6f6d7dfe62a10bd9d245acace5e1fd5b28475e803b72f143a57b1c460b0268c4cd2f32f43316bf768f5b7c79d2af5e4acabd543c91e225a5b84171399fffdd60fdbc50f1a5a6fba949a0f2c0035387839e9dd60e1ea7ceda8adfbc4baa360521452e35b6efffc03026870986ae0586f29c940b8d42f4f053f79a9708e33064dabda4c4a191c57354a2bfcdc347485562bf3b35065f6201a69715e3c1b5e70f396f54d013f005cfd420e309fb35d56adb4b344be5a8a8b6af136fea8038cd48bbf1c5b1bba4ac5ccd985c567086921e0a3b1b251bbc5e8c83ce4bc8546d2ac0c9be31da875f3eb48de29b9396673002a1380e88eda65bb8ffeea60545c443ebd94ba03a677ea04db109c0b908a973da49c74d0c6f84077e5d3525c095de94f2219538fbda0d35d1175035e8957a25d195a8dc1779e1bd4b367567ff3b27720d08dba8bb475aca75eab53d0693afd519d5cc012231722800ad94d02cbab5b59982e795f075bf09f5d26ead19c38bfd2512b02057035fd4a3b6343fdae8da867ab3e5415812d5346df92a853a383fd7315be035b28a5bf48040d4d756d85c3fe2bf1893535979adaaeb62e51980b5c66c1f6e314756bc287bc44256faa60e59989ff9f40edff0e5558051eac9002d6338ef9b2501c876fe9420b5854e69560e920bc43617e5b8e16ea56f6696fbc3c3bac3aaac24065535637f4c17706b7d07fb1c1050a185f1f1320acdeebf580f7e945e2bb0f3bc3f75200de2c0ad05a540883802e6ba66a2f9a3969681857f22f63972a038d4b7957494d66e0028bd7e731dcb3428736fa6ea0fea2ca46cb4aab900cdb5fff54f2836d52d50310f2a6490b389333a0f84e27df1e2f3317d02acb310c1ca36162bf8a05d9b5d8ae314d5e4b1e241f3149a1a0f4b2311b0a9ad8828c14571497df9f50aea264aabbeca381d382f1841376821479dd9f1d7975a2bd3b3814ceea17201487825cb2f20b3b6caf7b13d93f837468c68925b4bdd98bb854c2533f58151d4f1495d2ae8f3bc40824de6946fd6938dfa4336d0834895b1ab615136f93c6757ba97f5bb43285ce2c30d1a288ab0241c251994624602b630e7e346406c464a3ea8a0457ab87ef815583a8613ed6c98688c42b85a394123a7b34ac343380266b52f7d71e25ed5e299e3cff7b48ac023f65a02776201968fed711455c9bd1629bb6fe9ee8031ea210896824c6de06773ef75e7eeee0949a8ae4eea7ac64f99938c50db3718b3d75ba79ed4a5fac6102351c9b7add136106d4aa77a6ace697d06576545c09b10ebd11f85319cee3c90d8b47ae59f53413f64cf51e304303a72a98031f522aa1e825d1fb5569b274d54507bf72ae6d2d4e2acb0ebddb7e194a7580bea329cc22624a81f364931669c18669642fa63d25521238371de2e2c56fa22881e4b181e375b94c5a45a79e49a52b61502a60aeac4c3ee235ee26b5b6fd17c4c87e95beb5cfc110fc977dd4a5f4c373f8439023043c89c6b4e47c5bb25a5e386fcacf83da8a2973249cf0ef95b1dbb562e051cc93813c4dce8795a99b644b77a93e881156969d94e9ee26d0397e88d34a67b43081afd6ab7dd4f89f9af9ce4bdfd51aca6e90f73caaf8b1eeef93676ed6180a64c8d3ff761b89e32fa41d11184eecf8da5a7f69025adf9e38ee05872be9331c923f0574f626507c5969a2042e79cd37bb91f899835d0627b940f52db263e3fcf65278224e85427212f10307720d14d695d00c9927861c5f9b89162ce2fbb062eb167471d544d7bd3bcd0d07bca7ae4861d717069350f912f5940cb90e67f63bf2b7a15e83cffa58177788925a768961c540e8d28712a0b888aa91b00100f53a727f8a52a34a7c8e5a7965beebbd2cba1112878e153fb23f0091ea934dc3581c933edca238d7b863e5432a3aaf60835c26575e019802000d63d6cb36edff5540cad3a72fe3b94a198adeb7b3edd90ecb571a0cb42e5704c379f41da23089b69ea05332bc7de03f0bec69233f9ba1563e75b6bfab1d9c08e80ccee11d8c60faef373ffaa7e02274489d10ff4be4c6ba95b8483da45df944f28de2d2c6cb0d804475b2ef768864f1a0b19d2e9dd9165d7c34bc5f2b93dac2b72d8cde4d671e6e170cb26c87773be823334600bdd9c89280c7626ad17b865394ce332027d59f71bcd3a88570fcc764effdeab33cfd120f21d3f6d6f38925b8202a13cdf245ce4bce6885b29740b560cb8396686d2e1b4a6aba3023b41ec6adc7104edef8d5547eb32475412ecb3b91c57738afcd751333fb4414228e231b4d71b03f89d2d9f906afbd7682beaf454e3ef099c4f2eca4fd6c0592523dee98890b2a8676358792cdd23e505e9cd732938d892ed99afee3e415d60f1d023f576a697f1106142f315332f3f7f30d79a532b284711a58c6cae90c45cddc8f90ce4944811c99d3954b7bea17671fe92231f2e48d86b11da6a1274ab305a92c218116df8f44059d73f220c24508bbd6461dbdf25c4b9df79c541749718b1c6ee257da211139cd2ca60ce524bfcdd660f7cb03acfe71384fa0a3d62d4dcb4209ce02ee1e2ff31865a0e00e05734c182479cc97ca112d1b40ff59a5e19f751fda1d5c14fc549ac34a68de7e36802fa2f8f9f583e8951e559aa0839cdf8a3b7cd47fc44d875a84f2be346c4e25b2e673a55e1e7464e938d2e448625acbefa6490ad050fed7e98249c6f2e1de6fec90e4f5876a26e4858f4561f2b44ddfe4c6de73dc8a72931f74c1265e57ff7753b3b256daf7bb4fada94bb575b28d7a8a52f98c0f7ab3968850a808581c0bb3dfedfdbf49dbe8d32338cf86aca416d205231c4d4026f56cd9ab29e1a75d3fc79de6c1270d608c0349b383a03eca30967805b3d9734f06cac13d682a5897434e886c32fc91569f77311084b2f361a29d6dfd71345a3cbe908fd038035c21e84bdf3d42ca6ebfa39fbc5e90f17bfe5d43c1d377acff3c84c456f07b825e6e70b1940bfc9615057f484355589c12fb5f4598ea001d7e4c8a521bb5452b3a123f708810ac789ce4b44b720dc0efd0438d221b88dafdca163f9e78b62a17b39431c351a13d8abf311c816d51ef78e13c4b99a00f4403bb3432373263881ab67167715526f5a9ae6d50eaccce41373a9152448c7642d67227696b8f367b24af7b624bf10c10a8d15eb8a32f4c4294ac55881046312beb57d2e6125a996d56187a76552263c0f380d3b47f9ab24528c58c7216d7bbe8017f77c90c144fc8b3d292fd248d6c122d7ea6018b3bdb962ff441a3891c64fcc3cbdb9a2194cae419fd6e4cb9058ce793654d204b1640eedfa4846b9c51896a634b859f33e4c1fb04e49cc0a34c7ca9becabc2fe010f4e818d676b7e23cb07adeedef2690811181fea8f7201e136f4bf8e982f988c35405e6cf103f8c3cca197a", 0x1000, 0x3}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 308.748773][T24985] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 308.860772][T25023] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 308.872088][T25024] loop5: detected capacity change from 0 to 8 04:59:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) open(&(0x7f0000000000)='./file1\x00', 0x480040, 0x8a) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f00000001c0)={0x4, {0x0, 0x9d8, 0x7, 0x4, 0x7ff}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r1, &(0x7f0000000300)=""/28, 0x1c) getdents(r1, &(0x7f0000000040)=""/97, 0x61) setsockopt$inet_buf(r1, 0x0, 0x11, &(0x7f0000000140)="c211c57b9302a5565e7877bcc0a284fd899be052b57c1260e64a5c8cb0ab93ae6deae07fc8dfb66bcfe85adf97c4a5e622e08e2e8c03b53a6ae46c57edd34721f36d9deffa3994c366cbdba12c75f65eddebe21b8087b8a84d4648", 0x5b) [ 308.915174][T25023] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 308.976625][T25023] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 309.014266][T25041] loop5: detected capacity change from 0 to 264192 [ 309.023857][T25023] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 309.083523][T24991] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 309.116698][T25041] loop5: detected capacity change from 0 to 264192 [ 309.134744][T25057] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 309.161503][T25057] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 309.239956][T25057] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 309.252065][T25057] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:45 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x200000000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x12000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xa, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'osx.', 'vfat\x00'}) 04:59:45 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6c00, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 309.388036][T25088] loop5: detected capacity change from 0 to 264192 [ 309.396170][T25084] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 309.406662][T25084] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:46 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x7fff}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) r1 = openat2(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x109002, 0x61, 0x16}, 0x18) connect$unix(r1, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) [ 309.458457][T25084] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 309.468958][T25084] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xb, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 309.536096][T25109] loop5: detected capacity change from 0 to 127 [ 309.573942][T25115] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 309.604930][T25115] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:46 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r4, &(0x7f0000000300)=""/28, 0x1c) getdents(r4, &(0x7f0000000040)=""/97, 0x61) write$binfmt_misc(r4, &(0x7f0000000300)={'syz0', "1db78859b5415e097c0ca5132e41848b4d07d55f2997bad1d3e13ddc42ed39d1b8e73585fa1348f4b4f4773870892548fc55dd59c95accbd627e928d972559ca8b520661a62c3c1317478cdea9eb3f9ae08650a2a07fa9e2fa8d1db9030cc5ecc41da34c9b4a0302d5e0fca9b9dbb553e08561a1538a0ae39b8c57319c9914fa874dc1d1a5647df54d5a43c0a7183830ddd7f8e2749b143f5c243d5612a8bb004fb5108a8ba9222b8a1ec65fc025654f9ac2adc42b13bd75a2f4782bc1336c3d689e090725a9fa03e0e24446"}, 0xd0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) [ 309.653575][T25115] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 309.671249][T25115] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:46 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) getresuid(&(0x7f00000000c0), &(0x7f0000000140)=0x0, &(0x7f0000000180)) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000001c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@nodevmap}, {@version_9p2000}, {@noextend}], [{@hash}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, r1}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}}) 04:59:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xc, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 309.747653][T25135] loop5: detected capacity change from 0 to 264192 [ 309.782549][T25142] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 309.810360][T25135] 9pnet: Insufficient options for proto=fd [ 309.819538][T25142] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 309.867161][T25147] 9pnet: Insufficient options for proto=fd [ 309.884065][T25142] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 309.905024][T25142] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:46 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x10) 04:59:46 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7400, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 309.921594][T25094] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 309.955468][T25161] loop5: detected capacity change from 0 to 264192 04:59:46 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x204000000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x18000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xd, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:46 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) io_setup(0x9, &(0x7f00000000c0)=0x0) r2 = socket(0x23, 0xa, 0xfd5) r3 = ioctl$TIOCGPTPEER(r0, 0x5441, 0xfffffffffffffffc) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000440), 0xea9b99bacdde4663, 0x0) io_submit(r1, 0x3, &(0x7f0000001500)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x4, r2, &(0x7f0000000180)="18eb301cc6e7c04a6931a4734893be15e21c136a5a4454db40bf8e5ff1a0c4187ecb68c6236d27ba778a43832695a5bc2e9787a195b7307f7c730cdba77ec3e010b80303eb536d5d2ce2949875a8dba1cb89008c316e547a088cf2e8d3e7fcf9779e1c237d66260ac20f60f51e8f7f182e9fb035e38d7d455221bb8d950e3f39a53e4cac0213cdd81757daf075d43f386c1b0dcd99ae8ad1f901a7b0927e3a204bd3af4f3bf75e1946ec8eb87ad889ad6a03ed742a28ae55864921ef406df3bfbd4952657587c9b889cd9c3b64d17d4324d23c93bac949a81e1c986f4d48db253ec478b2d0", 0xe5, 0xffffffffffffffff, 0x0, 0x2, r0}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0xda, r3, &(0x7f0000000500)="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", 0x1000, 0x10001, 0x0, 0x1, r0}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x2, 0x0, r4, &(0x7f0000000340)="bd09918075a86c7a2e1cde3ab3ac05d79bfc74c81ab11b1e589dc91b3cd195d4e23ece464c50cc9452f5e456c1f4db4d17c43e868f5cca7a8abb73e5db2f887df91dafa6b48f695a02c07e9988d36cdbd61d3ee6fd2a50ca120de2fdf5f73db97b8dac0ffbc5c81fb7492aec4d1e9adda1cab9d81a0215b233a43a4dfc34dbaf4ca171a95c73339d05a2fb35c425bac3193685fd615e98983c9bf87ec8e13a08ded9e8f686d66e9b02e63c4da607ebffc63a936feb14c5ac5f27571b0142959ea6cfb784a07fd0d0f41ee5377c52a13545d40789512c9fd0bcf26c", 0xdb, 0x95, 0x0, 0x3, r5}]) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r6, &(0x7f0000000300)=""/28, 0x1c) getdents(r6, &(0x7f0000000040)=""/97, 0x61) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r6, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f00000004c0)=0xd) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x301c014, &(0x7f0000000180)=ANY=[]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)=0x0) io_submit(r8, 0x2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r7, &(0x7f0000000000), 0x16000}]) io_submit(r8, 0x1, &(0x7f0000001640)=[&(0x7f0000001600)={0x0, 0x0, 0x0, 0x6, 0x100, r4, &(0x7f0000001540)="77cd6e5c089d577b7a82e5a1366efdb673b3fc625d9673dd0dd6c122e07726713b3b00f9109bb75860ecd5b103d3a25a6710ac95002cb185a580ef222389613cd1fe4a2eec92c87ccfa428746677518ddb8d83976ba2ebedc62b360d02c47a9a5025f6017accabeb8929918d55095c1dabf52c87344d4d057db092697b7a1916d792b7d5249551a78dc1a87d7eb111bff3cc78ae8acf2b81fa572f33d83839964ca5395943f671aef1ee", 0xaa, 0x10000, 0x0, 0x7, r6}]) socket(0x29, 0x4, 0xfffff800) [ 310.315811][T25185] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 310.345549][T25172] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 310.363181][T25185] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:46 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7a00, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 310.415322][T25185] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 310.451245][T25185] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x401, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000080)=ANY=[@ANYRESHEX, @ANYBLOB="822822588958c3bd74e705c9cf93a9cddfef1085fca1fe1ea0a26dc659acd603b3c730f4d3c34ecd195b941a8454e895ab987b07b8fde7a88a9ff274c16aab6522d9d5e900"/78]) 04:59:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xe, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 310.568580][T25227] loop5: detected capacity change from 0 to 264192 04:59:47 executing program 5: mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 310.615286][T25235] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 04:59:47 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0xcc0c2, 0x18) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r3, &(0x7f0000000300)=""/28, 0x1c) getdents(r3, &(0x7f0000000040)=""/97, 0x61) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r4, &(0x7f0000000300)=""/28, 0x1c) io_submit(r2, 0x1, &(0x7f0000000100)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0x0, r4, &(0x7f00000002c0)="da", 0x63, 0x4}]) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffb) openat(r5, &(0x7f0000000040)='./file0\x00', 0x0, 0x6b) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x4010, r5, 0x2ca27000) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r6, &(0x7f0000000300)=""/28, 0x1c) getdents(r6, &(0x7f0000000040)=""/97, 0x61) getdents64(r6, &(0x7f0000000440)=""/250, 0xfa) sendfile(r0, r0, 0x0, 0x8080ffffff80) [ 310.655818][T25235] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 310.686254][T25244] loop5: detected capacity change from 0 to 264192 04:59:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f0000000080)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file0\x00') 04:59:47 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0xcc0c2, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x41fe, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x12, r1, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000004, 0x8010, r0, 0x10000000) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x3, 0x0, 0x8, 0x3, &(0x7f0000000000)="64c3973f0af58c14e7381088e584", 0x3fd, 0x0, 0x0, {0x2}}, 0x7) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x62) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0xa003, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000240)='\x00') io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f00000002c0)="da", 0x1, 0x1000}]) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r7, &(0x7f0000000300)=""/28, 0x1c) getdents(r7, &(0x7f0000000040)=""/97, 0x61) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000280)='/dev/vcsu\x00') r8 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r1, r8, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff80) openat(r8, &(0x7f0000000100)='./bus\x00', 0x440000, 0x40) [ 310.713530][T25235] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 310.737213][T25235] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xf, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 310.810380][T25260] loop5: detected capacity change from 0 to 264192 [ 310.867505][T25269] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 310.894547][T25269] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 310.923578][T25269] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 310.939107][T25269] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 310.957839][T25224] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:59:47 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x300000000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1ffff000, &(0x7f00000004c0), 0x0, 0x0) 04:59:47 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000080)={{0x0, 0x5, 0x5, 0x7, 0x81, 0x2118, 0xfffffffffffffffa, 0x2, 0x81, 0x5, 0xffff73ed, 0x7ff, 0x184dbcbd, 0x0, 0x8}, 0x10, [0x0, 0x0]}) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/148, 0x94) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x10, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:47 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xedc0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 311.190577][T25303] loop5: detected capacity change from 0 to 264192 [ 311.199305][T25304] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 04:59:47 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000000)={0xfffffffffffffff8, 0x10001}) [ 311.244045][T25304] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:47 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x38, r1, 0x207, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x200f5}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x4}]}, 0x38}}, 0x0) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r3, 0x8, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8011}, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 311.330100][T25304] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 311.352669][T25304] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x11, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 311.421528][T25327] loop5: detected capacity change from 0 to 264192 [ 311.482258][T25334] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 311.499835][T25334] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 311.542665][T25339] loop5: detected capacity change from 0 to 264192 04:59:48 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="0e96d75dd361a71f12e393"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x29}, {&(0x7f0000001880)=""/102388, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) r1 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) readv(r1, &(0x7f0000000680)=[{&(0x7f0000000240)=""/49, 0x31}, {&(0x7f00000003c0)=""/232, 0xe8}, {&(0x7f0000000500)=""/160, 0xa0}, {&(0x7f0000000280)=""/33, 0x21}, {&(0x7f00000005c0)=""/174, 0xae}], 0x5) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = gettid() rt_sigqueueinfo(r2, 0xa, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 311.590975][T25334] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 311.626368][T25334] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x12, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 311.710018][ T22] audit: type=1326 audit(1633064388.239:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25353 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x7ffc0000 [ 311.720316][T25357] loop5: detected capacity change from 0 to 264192 [ 311.769179][T25364] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 04:59:48 executing program 2: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2200, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:48 executing program 5: ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f00000000c0)=0xff) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) creat(&(0x7f0000000000)='./file0\x00', 0x11) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x400, 0x0) connect$unix(r0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e22}, 0x6e) [ 311.802500][ T22] audit: type=1326 audit(1633064388.239:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25353 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7efc94e228d9 code=0x7ffc0000 [ 311.831523][T25364] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 311.882463][T25375] loop5: detected capacity change from 0 to 264192 [ 311.894264][T25364] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 311.912619][ T22] audit: type=1326 audit(1633064388.239:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25353 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x7ffc0000 [ 311.943968][T25364] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:48 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x400000000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x20000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0, 0x0, 0x100000001}, {&(0x7f0000000500)="7607013000000000000000000500000000be80932d55d9d5b07363bfb8af7330085d8535488f005dd0e27e020516bf76ca54bb3107e8236776a62e9b5eccd72a73b8fb2b9678f505f9452de60b137d1514b418f0fcf8f2fb15382116b117365c49eb1b41ba10f0b4a0ffc2a0def4e4dccd7cf3a4e175931d119fcb41f709c8b75f1e11741ea3bb1d28196ff1053d92b8f93caa5aefe63e7c46458c3a5680e14192e8029859c373c55585557d7805ee945cb71f8502d7d886d41dba9d730f391ad85d3dc996912e73ef8beb9fb7fec4245befa287277abf0756080000954aecfc6c1fa32420e566e2c232ba7875ff02694f0000000000000000", 0xf9, 0xfffffffffffffffd}], 0x301c014, &(0x7f0000000180)=ANY=[]) r0 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) open(&(0x7f00000003c0)='./file0/file0\x00', 0x10400, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r1, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000340)=""/97, 0x61) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0xb6800, 0x21) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000400), 0x540, 0x0) syz_io_uring_setup(0x3ef7, &(0x7f0000000200)={0x0, 0x2b2a, 0x0, 0x3, 0x4007e, 0x0, r2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000440)=0x0, &(0x7f00000002c0)) syz_io_uring_complete(r3) r4 = socket(0x3, 0x6, 0x9) r5 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r6, &(0x7f0000000300)=""/28, 0x1c) getdents(r6, &(0x7f0000000040)=""/97, 0x61) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/97, 0x61) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY(r5, 0x5000940f, &(0x7f0000000600)={{r6}, "105303a4b8521a7e0974a2f2b4e003b85d67d7566c4a0d4871e6e66c080393bbf0f3dcbd4305afae617102b39698b5f983cd479d0b9f01acb5dce09cf766832b56f6d0f795ec061e1ea7074af41547348db8f909641982a2492ff9e7da91f0ae9da774772b35237548975bcc39a36ecb93f53640d3d20c3eddeb190b637149144d4b0526e2ab4e0d402f2ab619dc5c89ef1f467e801b3a8276a4354262c5427e9848a3ab6f862ba00e94a21148d99b0c868178ca5eb28f565fd8830971bd407c171845d6a5f4a41ec7b9f1fd93043d4ffd47cd227d96da24b84db4a5377935997c4ddda4cb26cbbc60b78895cc1fab766b0dfe2ed3166cb831cda810cb9b24d5b0f2ea236fe322757006c0570bfa36a658fd40db195239dc232a4ad7ef2792d0723dfee9479ead17de0faf118d78cd16726d638182aee89c46ca8ee1624bf18d4cbf574b3237e9ae91ca2b98592dfefb0745fbeb78955b65c9608342e147c3186244786b562d2d2a41b35854420da2bbac5da8e5e68ba692e9917b6aa7aec401fbe6c3ce4a3afe0d6b9f8c50cb933525d27123059e766eb8f6f73eba18a899df907df4cc16cc54fe512a804001a8300cd84c237be7e3dc9ab314aa351a76c76545e97be5a725ff24312143f994793b42b2808ad2a0828acf1f74eed9660e95633fe9c479e9ca2519208ed938768fa03ee3ae10e31ca96b8e8637df6ab1d0cf6e83a212e31a8f43445ac73b7733999ed4a030bfe33310fbf57ed7b7f7c6e49cf42414e7eaa7dbaddf4cca5540230446bf812c9d6514aa3fc6c2e0136566c80c7bd31c08015c46a8e99a9afc5f54e7fd3640ee3a7deb00d3d44935845be5dd620e4e0aeab33e931465da6c533723e5ff217f3a9ae5b563759f1028206158d5c893ae891becea953a0704ec4511025da847ce4384ce6e4ce6b3e94c3c84b74fbe8c1ca269b8f1a5948c60fe4232cf60dc2697898759e6986f9e2d4b125bd2f256cdb34cc44eb10a5824320fe0e4d989415a5a7b294fb8b463dc0f4a2da76ade8d898eb8a66c7dee8fcbff492a08b6c297858385674595244c9bbd56d13bfdb90d388687597f6a48497a22284927434cdc56effc6d7195a9e5a21dddd0ad357315b5ede50665d8d82fc3af70d54afb03349a3bf136658181ff652d006f8db9599ec30c5fd1698be0679f7d4a75e084113f7788d14bdb18c8fed9b642aac8fb78bdad292b11aa610e7643db0a8c90561c84ba0b8ee504067870388f2543435fb5b5725e7e24e283637b54aec03aaeda25ec3b00110b9d9bd33180d293cea85df3eaf406268eb70558fb787e15e495b1b54ac5d1178ee14e4c0a5dede340247a93783e6a10f5dd8614c3b15286a0546874ad032b5c32aada579d42b5ad7988939d8a3d411d4a7489b6c1cf7c9c9bf83aa0045ffab1bd45e3eba786c23d0443b04fa1270377527e11ea229dc63e96d2e42dc5e685a902416246e3fd8ecc5e639e0ab2213f6ae1159694cd17c360d7652671b6c83577b7a6e763a74e389e4a3b5891677384006b202fa69b1ff40639e61c5a9781711c42ed12f76eedd75cb527b0547fc21a9bb4656b5b0c59a1f1badd61994d5ddee90e44bb5c03f51b92025275f210a8cef2798cdfb458bc02e5656647a675379efce3388dc3293d34c225a076e6a0bf58091267e344bdcb1acef2228f5b2a2be241a379b8d92c44ad0270ca7313c398d0bccbcd7563b1e4ca401b63097ab5f77905f6aa41fcb3d4d972e7f82a31075b8d46481c40145fa12efabf7ce63be45980c6ecb8c16f6aab1bb8205247f92c2102636aaeea78770784046fd3a38c7639b18ad13816818850e9d99a68c53bfb79334af8b44bba6a150c6fb137ede0650c9d69b99ac9fa71dd62f0084244b3fa4480dce43595762ea69862a600feef17eaf8eb4600447b425875c542369f2a931e08cb9cac365c7190152184f9748caa6fbf870c490f51fd2936719eef50774f3a42e44ee71dea1fb265f0ddfe56a98d4c9a0557fa0ede1985bd72731fc0e56a81966f656f18f462a788aaa2aab2b65d2890a3e42b2fe21e730ec596ee9b4c095356f3eb04872e1d084f3993c6e6f8cecf27b6c0d245e59b410a0d847b19bfec14769de8790ebc5061941420c21d166d086d98e4e4f071953135fda21c6fd02feb7f0e7df210bce7e8c0004ed10891bffd389045b8fbf4d664ebc528ea671bcbe04aa668574cda32dad6892e02dd723f26d565f5d20ce9fd1fc285f844d4771da72ae7dd43518bcaed79fee942e34812f5f63d21c7203cfcf0e39ca65650a0171b624b6a57ea671908970c982664641019c80b0cfef21959005d7485230426ade9daa19ca3dedc68c18a0ed7c460073f84b2fa8b354ac4385750b02c358fbd1d114c062587a1aafe0e8bf75890795867db9ed95d786687e13a043dd153fe327978c4450950863c3bbf65c8a3f888e8aae73d6538a6618b23389b518c08b9f7a19dc2a0439f869ea29e276f74cb218ff68b105ad6753c38f98523bab597a8bed5c51180ffc828ad3db000271f32779afc112c238835cb3d0195eb31cac1e5cc2a8fb9045dba1badd9a0a5062932641c1345e64051a95400ae0b4dbe825834e5cecc6d1e8235e76b8b2c1a8202de7fb9d19e6d17a09eb2bb37e6a59a51313c0f69145960ec0b3f984380f5537049e3c6dac8a5338381d873b702e231755d6160dd4363c1bf58b95d2e65700fac720369334a52943b669d4fbacbb293511c785a4bc061962f21ac786ad1baf7b12a25a7a816fd92066a02e30274d3ce2df8ba0c776fa73a8593d4d818f75b893645dfa9a238ffd08f18a18366723004b7f46fd723edcc8b4c5591813e8929784fe2b247433ba21a9b517e9f2360119a8e34b18b108dfa76c9ee699fdf812fc665674e06e76669f6ab2faa46214b769716bb7f81ee520518281064e94650ce7ef8b1bab39b51457ad6a3a0b7efe3ad298242f150308ae2ceba5f66a46243206d80a06fa1ed3b65520272a77c9dc029bd9e71afafa450aceb09b15a9aa3f8e6f36c59c3fb0da2a59e18e80015fd2e451e3dd765afa7246e0e8bd05b0a4e8d8c103452cfa086b3a85894cb41b67df1eb685480ea21115d3230d78cf1683c33c99cd534648b5041fe835d505da8694e6d614e01cb3cc20a6167eaf1d11bec9a816bf4925ccb253f7bb33878ac2dd8756ce0ac3a6c8d937cd99c736df50a45f18108c918fbaf5cd5e758c1971ac9d98f3a55aedfa0cf589041c8a13dfc7dadaf57692b078c1967af6658ee30764bdae4bf0019649ac77eabab7246316ce5058614198f9ea329682bb73ebf899c8721e1a25a87b2a95b515ef288195c424256165321f5a4d1e8db41e4b844f7975f2985fed505285e4567ffbb651a2a20e42d9de848ef160cabc1d1733521d5ef5b2f8f29b1b55125ed8bc7a703593496dab5a3356e51a2f479f48e65bfb7dfd009169b4b0e6868389d6df4d12b8e7b37cce29773ed47d339bbbf7f74d3cf8a48294ee2ce1bcd1144cea0a9a2ea8e9ce9a1295fa1deaa31c8a505683de4e8c365891ececbf6c956f23a0e89003a0bf2d5db9348851853b0a49fd8e610150211bdafd5f884d2244172476fbd6b17796d0f859a9486eb80d38748e555234833a420fff1817d8561e51403890ee9ecebc2088e43366df546f90d3cff7d7b3b8be8b5d258368acc0dff75c61734b60494500bda114b5af13d3af9ec97f4798eda98fc66a267b1e155a72fe275d6b8ada7ad9777e1594c633d532e45abd1f66794c5704130a334fe046e97fafec7e99b4585be35acfe0e22637005c13fd0417da7f9ec85be62cdb7b142f22503d75c1f1f1d84324d3709ccaed80a26d9d247d39d35f8d48d0c55125ff783de0b6c6b7e842a25ec2134d53a74900d51714547bbd38fb2e7d06f7edfb510e16fca7376c9b543ceb317aadeff4999f679edb7e295064da952cc7eb1d9983dd1b6fd0b16e8a2f479f9e29f945a0789ccc3886d40c867d61579d308f5d4ec4c10495346bc0e3a05c00c9972ed7217beb03a4304c2226498f0e004af171930b287a0b9d91aefa880f2fac3d93e53e408afd29bfe8c789bae1ae46a4ba108d1dd09517dd9bc1acbd615aa15f9d1dce9e2c19791db2ea6dd1df9715ba05a66c7d81badf057443d9800aa75c844bcc49da7980025b605a925e10de0174e5995d40ccb562032595bdae93c439c1184c35b832ace67e78fa016b67dadb84b0c0ef40d1d7226943761fdbe192572755545286ba345af7fa28c537386557b4be68b8c9a7e98191848a1ef6969678a06decf81aa89d5fe2f332ea8854de54e63b947688137646ebee270103e1a8cea3f6cf9add2f8913571dee672ea1dc8dbb1bb616c4b586c6c2a58cf6550783fd875e69f06b4f115b2912ba5d2a08ededb6469b6c80af8bfc3443fce143a73832989c76ac9d4526086caee1c01652fc8f248ab6395574f1f8f071606e5ab33b578f13621db5826efa7a122f0bfecd6072c937f33c2fee64aa67bc71a69e5ac3ca8c895a060d5151b2b6c92cf254ed303ab5310c9c3136eaf34dcba9af930bc1f2b714096cfcdf9634b99c034f3d74fdfab4df3da6a8b66a0a51f95374eae2d5f0605ae4a622352c9431cfccc276eff49c8a67359b3c066a10c991be71211a83253896d49fb915cbd695b96f09bdcef28ca58be901274cf8dad5a4e524c2cb89a1c582f671f72a71036b59180a50812a7984051ccf030b104fea0ef621097d63ffcb1eb2ff2799dc9b2b3e52c5e173748ae57549cb0e724bb89295ae0e9a153a589b964b250bf83e676a6d9461bbe8d3f02db6260a79b8a4f6b9db290117b5f126887a2b3ec611ad88dd0cf7ddcfb2407bd6dc6236eeca2793564af5cf57ff86f79190696f27238294f689d2cb259c6b0ebbfe2c653e875cef4455b3b4f184997dceaa6f4d272e50aaec15456481415266bcc791274d91f763c08b48c0b098165d97d2addbc2b23f87cd4c57355482089ff606b76227dd04220875a94cdd2e3c88e856a11004cc08b58124240c920f1bf81ad1f4155c7e87cefc3b670d9d71f8b394e1b1a133d4336753cfb6509cada71e5296623753ce4cda56e178f3ebf2d851ced857a3894756083a02d42d696ec528ae33d77ca7012b7e1fb55d596c87fc24e8d27d5463abd22ebbd5702663686a2084301cc348723f2a55916e984364a777e6fd41033a02dc0c04983257b2f433bc323e80eff44ce8603e69f35ce543afd7ca40dccd85f01540a600982fd835ed3d4e3d0cea0eb31fc6e8e36b26625ddf03ab329ac9ba648fc99e3625ca17ee03cdf874d3c4c22917511c4c73a017cc98d18a2ee546a9bc8c6185ef87378e110adf858b0ecdba376ca7343ee2f590184c8529501cc4b3798fbafb3577fe2a0d58f1b9e4e2e246ffbf56812ac3c7186401d31c244ef0f4e2a3316b0f7aa4729b7cbd82d2886a57adde8550a744a143729e1769473c947c70527eaa13a3efd3e09f62c9046393a9e3682fa9e8840547fc940dcf72c3809262d7b1278ebf0b285f0491a0c1d3a4916c76a7d3a0fa42f1ed1a3fa37ab203edb975aa736dabcf297dde2b8d03bc540e4a42b61b0ac93bd526e40edaf53da889c0e803ae912fe4d059de954d040beb4fc1b8b7e6441f2235029e88d3895208d24d1a8a248d45271f365dfcb9d13d14725f5b49a4c7373d8019149c3813b3a9d66fa1e45e141a435258387fbdec55c400c14fe2ac8bbedf371508ac7feefa25e14cdc5321170a18920b2708734"}) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r4, 0x40089413, &(0x7f0000000080)=0x5) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f00000001c0)) 04:59:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x22, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:48 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfeff, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 312.042617][ T22] audit: type=1326 audit(1633064388.239:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25353 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7efc94e228d9 code=0x7ffc0000 [ 312.075171][T25376] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 04:59:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 1) [ 312.087161][ T22] audit: type=1326 audit(1633064388.239:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25353 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x7ffc0000 [ 312.105455][T25403] loop5: detected capacity change from 0 to 264192 [ 312.131717][T25409] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 312.180171][T25409] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 312.188497][ T22] audit: type=1326 audit(1633064388.239:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25353 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7efc94e228d9 code=0x7ffc0000 [ 312.190439][T25403] loop5: detected capacity change from 0 to 264192 [ 312.225764][T25426] FAULT_INJECTION: forcing a failure. [ 312.225764][T25426] name failslab, interval 1, probability 0, space 0, times 0 [ 312.238405][T25426] CPU: 0 PID: 25426 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 312.247183][T25426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.257240][T25426] Call Trace: [ 312.260591][T25426] dump_stack_lvl+0xd6/0x122 [ 312.265194][T25426] dump_stack+0x11/0x1b [ 312.269346][T25426] should_fail+0x23c/0x250 [ 312.273815][T25426] ? __se_sys_memfd_create+0xfb/0x390 [ 312.279176][T25426] __should_failslab+0x81/0x90 [ 312.283936][T25426] should_failslab+0x5/0x20 [ 312.288504][T25426] __kmalloc+0x6f/0x350 [ 312.292654][T25426] ? strnlen_user+0x137/0x1c0 [ 312.297326][T25426] __se_sys_memfd_create+0xfb/0x390 [ 312.299650][ T22] audit: type=1326 audit(1633064388.239:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25353 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x7ffc0000 [ 312.302569][T25426] __x64_sys_memfd_create+0x2d/0x40 [ 312.302595][T25426] do_syscall_64+0x44/0xa0 [ 312.302618][T25426] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 312.342515][T25426] RIP: 0033:0x7f74516f68d9 [ 312.346933][T25426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 312.362385][ T22] audit: type=1326 audit(1633064388.239:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25353 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7efc94e228d9 code=0x7ffc0000 [ 312.366547][T25426] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 312.366569][T25426] RAX: ffffffffffffffda RBX: 0000000020001540 RCX: 00007f74516f68d9 [ 312.366582][T25426] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 00007f745174fe76 [ 312.415252][T25426] RBP: 0000000000000003 R08: 0000000000000001 R09: ffffffffffffffff [ 312.423226][T25426] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 312.425553][ T22] audit: type=1326 audit(1633064388.239:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25358 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x7ffc0000 [ 312.431192][T25426] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000180 04:59:49 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_NOP={0x0, 0x3}, 0xa7bf) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) [ 312.475773][T25409] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 312.489551][T25409] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x25, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 312.557952][T25444] loop5: detected capacity change from 0 to 264192 [ 312.571584][ T22] audit: type=1326 audit(1633064388.239:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25358 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7efc94e228d9 code=0x7ffc0000 04:59:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) syz_open_dev$usbmon(&(0x7f0000000000), 0x4, 0x244200) [ 312.636178][T25454] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 312.666629][T25454] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:49 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x60) r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x102, 0x4) r1 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x10a) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) getdents64(r2, &(0x7f0000000300)=""/28, 0x1c) getdents(r2, &(0x7f0000000040)=""/97, 0x61) sendfile(r2, r0, &(0x7f0000000140)=0x5, 0x800) [ 312.695782][T25461] loop5: detected capacity change from 0 to 264192 [ 312.736056][T25454] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 312.763891][T25454] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 312.777787][T25472] loop5: detected capacity change from 0 to 264192 04:59:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x48, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) open(&(0x7f0000000000)='./file0\x00', 0x4240, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x21) [ 312.869263][T25483] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 312.893647][T25483] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 312.900091][T25487] loop5: detected capacity change from 0 to 264192 04:59:49 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x500000000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 312.933390][T25483] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 312.968461][T25483] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:49 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x21000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:49 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xff0f, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 2) 04:59:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x4c, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) open(&(0x7f0000000000)='./file0\x00', 0x40180, 0xc8) [ 313.010563][T25487] loop5: detected capacity change from 0 to 264192 [ 313.069288][T25516] FAULT_INJECTION: forcing a failure. [ 313.069288][T25516] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 313.082368][T25516] CPU: 0 PID: 25516 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 313.091183][T25516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.101237][T25516] Call Trace: [ 313.104514][T25516] dump_stack_lvl+0xd6/0x122 [ 313.109189][T25516] dump_stack+0x11/0x1b [ 313.113350][T25516] should_fail+0x23c/0x250 [ 313.117795][T25516] should_fail_usercopy+0x16/0x20 [ 313.122813][T25516] _copy_from_user+0x1c/0xd0 [ 313.127410][T25516] __se_sys_memfd_create+0x137/0x390 [ 313.132699][T25516] __x64_sys_memfd_create+0x2d/0x40 [ 313.137969][T25516] do_syscall_64+0x44/0xa0 [ 313.142391][T25516] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 313.148342][T25516] RIP: 0033:0x7f74516f68d9 [ 313.152752][T25516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 313.172525][T25516] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 313.181009][T25516] RAX: ffffffffffffffda RBX: 0000000020001540 RCX: 00007f74516f68d9 [ 313.189463][T25516] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 00007f745174fe76 [ 313.197425][T25516] RBP: 0000000000000003 R08: 0000000000000001 R09: ffffffffffffffff [ 313.205393][T25516] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 313.213356][T25516] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000180 [ 313.236780][T25517] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 04:59:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 3) 04:59:49 executing program 5: r0 = syz_io_uring_complete(0x0) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, 0xe, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x40008c0}, 0x24000080) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xfc, 0x4, 0x9, 0x9, 0x0, 0xe96, 0x80, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x88b, 0x9}, 0x48420, 0x9, 0x1f, 0x2, 0x8, 0x50, 0x40, 0x0, 0x1ff, 0x0, 0x3}, r1, 0x5, 0xffffffffffffffff, 0xa) [ 313.264181][T25517] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 313.264904][T25530] loop5: detected capacity change from 0 to 264192 [ 313.327607][T25535] FAULT_INJECTION: forcing a failure. [ 313.327607][T25535] name failslab, interval 1, probability 0, space 0, times 0 [ 313.340280][T25535] CPU: 1 PID: 25535 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 313.349093][T25535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.359134][T25535] Call Trace: [ 313.362405][T25535] dump_stack_lvl+0xd6/0x122 [ 313.367002][T25535] dump_stack+0x11/0x1b [ 313.371143][T25535] should_fail+0x23c/0x250 [ 313.375549][T25535] ? shmem_alloc_inode+0x22/0x30 [ 313.380487][T25535] __should_failslab+0x81/0x90 [ 313.385246][T25535] ? shmem_match+0xa0/0xa0 [ 313.389666][T25535] should_failslab+0x5/0x20 [ 313.394341][T25535] kmem_cache_alloc+0x4f/0x300 [ 313.399101][T25535] ? shmem_match+0xa0/0xa0 [ 313.403606][T25535] shmem_alloc_inode+0x22/0x30 [ 313.408366][T25535] new_inode_pseudo+0x38/0x1c0 [ 313.413194][T25535] new_inode+0x21/0x120 [ 313.417407][T25535] shmem_get_inode+0xb7/0x4a0 [ 313.422078][T25535] __shmem_file_setup+0xf1/0x1d0 [ 313.427006][T25535] shmem_file_setup+0x37/0x40 [ 313.431679][T25535] __se_sys_memfd_create+0x1eb/0x390 [ 313.436997][T25535] __x64_sys_memfd_create+0x2d/0x40 [ 313.442186][T25535] do_syscall_64+0x44/0xa0 [ 313.446679][T25535] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 313.452617][T25535] RIP: 0033:0x7f74516f68d9 [ 313.457030][T25535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 313.476638][T25535] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 313.485044][T25535] RAX: ffffffffffffffda RBX: 0000000020001540 RCX: 00007f74516f68d9 [ 313.493000][T25535] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 00007f745174fe76 [ 313.500961][T25535] RBP: 0000000000000003 R08: 0000000000000001 R09: ffffffffffffffff [ 313.508957][T25535] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 313.516926][T25535] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000180 04:59:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 4) [ 313.539937][T25517] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 313.559770][T25517] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 313.583682][T25548] FAULT_INJECTION: forcing a failure. [ 313.583682][T25548] name failslab, interval 1, probability 0, space 0, times 0 [ 313.596372][T25548] CPU: 1 PID: 25548 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 313.596410][T25545] loop5: detected capacity change from 0 to 264192 [ 313.605438][T25548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.605453][T25548] Call Trace: [ 313.605460][T25548] dump_stack_lvl+0xd6/0x122 [ 313.629833][T25548] dump_stack+0x11/0x1b [ 313.633993][T25548] should_fail+0x23c/0x250 [ 313.638402][T25548] ? security_inode_alloc+0x30/0x180 [ 313.643698][T25548] __should_failslab+0x81/0x90 [ 313.648576][T25548] should_failslab+0x5/0x20 [ 313.653115][T25548] kmem_cache_alloc+0x4f/0x300 [ 313.657956][T25548] security_inode_alloc+0x30/0x180 [ 313.663077][T25548] inode_init_always+0x20b/0x430 [ 313.668022][T25548] ? shmem_match+0xa0/0xa0 [ 313.672486][T25548] new_inode_pseudo+0x73/0x1c0 [ 313.677252][T25548] new_inode+0x21/0x120 [ 313.681396][T25548] shmem_get_inode+0xb7/0x4a0 [ 313.686148][T25548] __shmem_file_setup+0xf1/0x1d0 [ 313.691159][T25548] shmem_file_setup+0x37/0x40 [ 313.696013][T25548] __se_sys_memfd_create+0x1eb/0x390 [ 313.701288][T25548] __x64_sys_memfd_create+0x2d/0x40 [ 313.706546][T25548] do_syscall_64+0x44/0xa0 [ 313.710995][T25548] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 313.716942][T25548] RIP: 0033:0x7f74516f68d9 [ 313.721354][T25548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:59:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x60, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 313.740956][T25548] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 313.749365][T25548] RAX: ffffffffffffffda RBX: 0000000020001540 RCX: 00007f74516f68d9 [ 313.757391][T25548] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 00007f745174fe76 [ 313.765354][T25548] RBP: 0000000000000003 R08: 0000000000000001 R09: ffffffffffffffff [ 313.773336][T25548] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 313.781331][T25548] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000180 04:59:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 5) [ 313.837940][T25559] FAULT_INJECTION: forcing a failure. [ 313.837940][T25559] name failslab, interval 1, probability 0, space 0, times 0 [ 313.850992][T25559] CPU: 1 PID: 25559 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 313.859763][T25559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.869805][T25559] Call Trace: [ 313.873069][T25559] dump_stack_lvl+0xd6/0x122 [ 313.877658][T25559] dump_stack+0x11/0x1b [ 313.881803][T25559] should_fail+0x23c/0x250 [ 313.886221][T25559] ? __d_alloc+0x36/0x370 [ 313.890573][T25559] __should_failslab+0x81/0x90 [ 313.895340][T25559] should_failslab+0x5/0x20 [ 313.899889][T25559] kmem_cache_alloc+0x4f/0x300 [ 313.904650][T25559] ? security_inode_alloc+0x138/0x180 [ 313.910115][T25559] ? __init_rwsem+0x59/0x70 [ 313.914620][T25559] __d_alloc+0x36/0x370 [ 313.918771][T25559] d_alloc_pseudo+0x1a/0x50 [ 313.923273][T25559] alloc_file_pseudo+0x77/0x150 [ 313.928173][T25559] __shmem_file_setup+0x14c/0x1d0 [ 313.933250][T25559] shmem_file_setup+0x37/0x40 [ 313.937930][T25559] __se_sys_memfd_create+0x1eb/0x390 [ 313.943215][T25559] __x64_sys_memfd_create+0x2d/0x40 [ 313.948435][T25559] do_syscall_64+0x44/0xa0 [ 313.952865][T25559] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 313.958766][T25559] RIP: 0033:0x7f74516f68d9 [ 313.963173][T25559] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 313.982789][T25559] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 313.991192][T25559] RAX: ffffffffffffffda RBX: 0000000020001540 RCX: 00007f74516f68d9 [ 313.999173][T25559] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 00007f745174fe76 [ 314.007136][T25559] RBP: 0000000000000003 R08: 0000000000000001 R09: ffffffffffffffff [ 314.015089][T25559] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 314.023153][T25559] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000180 04:59:50 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) r1 = syz_io_uring_complete(0x0) getdents(r1, &(0x7f0000000340)=""/4096, 0x1000) getdents(r0, &(0x7f0000000040)=""/97, 0x61) recvmmsg$unix(r1, &(0x7f0000004140)=[{{&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000001580)=[{&(0x7f0000000200)=""/233, 0xe9}, {&(0x7f0000001340)=""/113, 0x71}, {&(0x7f00000013c0)=""/235, 0xeb}, {&(0x7f0000000100)=""/59, 0x3b}, {&(0x7f00000014c0)=""/30, 0x1e}, {&(0x7f0000001500)=""/79, 0x4f}], 0x6, &(0x7f0000001600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd0}}, {{&(0x7f0000001700)=@abs, 0x6e, &(0x7f0000002b80)=[{&(0x7f0000001780)=""/247, 0xf7}, {&(0x7f0000001880)=""/19, 0x13}, {&(0x7f00000018c0)=""/134, 0x86}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/191, 0xbf}, {&(0x7f0000002a40)=""/246, 0xf6}, {&(0x7f0000002b40)=""/23, 0x17}], 0x7, &(0x7f0000002c00)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x108}}, {{&(0x7f0000002d40), 0x6e, &(0x7f0000003000)=[{&(0x7f0000002dc0)=""/1, 0x1}, {&(0x7f0000002e00)=""/162, 0xa2}, {&(0x7f0000002ec0)=""/209, 0xd1}, {&(0x7f0000002fc0)=""/11, 0xb}], 0x4, &(0x7f0000003040)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x40}}, {{&(0x7f0000003080)=@abs, 0x6e, &(0x7f0000004100)=[{&(0x7f0000003100)=""/4096, 0x1000}], 0x1}}], 0x4, 0x40012120, 0x0) getdents(r2, &(0x7f0000004240)=""/187, 0xbb) sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x1, 0xa, 0x3, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4040014}, 0x24040811) 04:59:50 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x600000000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:50 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffe, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x68, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:50 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x25000000, &(0x7f00000004c0), 0x0, 0x0) [ 314.036840][T25556] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 314.057092][T25556] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:50 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r1, &(0x7f0000000300)=""/28, 0x1c) getdents(r1, &(0x7f0000000040)=""/97, 0x61) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x1000, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000}], [{@fsname={'fsname', 0x3d, '\\'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x66, 0x35, 0x62, 0x6d, 0x37, 0x65, 0x31], 0x2d, [0x63, 0x33, 0x38, 0x36], 0x2d, [0x31, 0x33, 0x50, 0x61], 0x2d, [0x3c, 0x54, 0x0, 0x64], 0x2d, [0x64, 0x66, 0x65, 0x30, 0x30, 0x35, 0x32, 0x64]}}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, '[:'}}, {@smackfshat={'smackfshat', 0x3d, ',{'}}]}}) 04:59:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 6) [ 314.120152][T25582] loop5: detected capacity change from 0 to 264192 [ 314.155420][T25585] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 314.169196][T25582] loop5: detected capacity change from 0 to 264192 [ 314.182791][T25596] FAULT_INJECTION: forcing a failure. [ 314.182791][T25596] name failslab, interval 1, probability 0, space 0, times 0 [ 314.195431][T25596] CPU: 0 PID: 25596 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 314.204196][T25596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.214246][T25596] Call Trace: [ 314.216521][T25585] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 314.217587][T25596] dump_stack_lvl+0xd6/0x122 [ 314.228647][T25596] dump_stack+0x11/0x1b [ 314.232799][T25596] should_fail+0x23c/0x250 [ 314.237212][T25596] ? __alloc_file+0x2e/0x1a0 [ 314.241834][T25596] __should_failslab+0x81/0x90 [ 314.246596][T25596] should_failslab+0x5/0x20 [ 314.251099][T25596] kmem_cache_alloc+0x4f/0x300 [ 314.255862][T25596] __alloc_file+0x2e/0x1a0 [ 314.260360][T25596] alloc_empty_file+0xcd/0x1c0 [ 314.265138][T25596] alloc_file+0x3a/0x280 [ 314.269398][T25596] alloc_file_pseudo+0xfa/0x150 [ 314.274256][T25596] __shmem_file_setup+0x14c/0x1d0 [ 314.279341][T25596] shmem_file_setup+0x37/0x40 [ 314.284020][T25596] __se_sys_memfd_create+0x1eb/0x390 [ 314.289306][T25596] __x64_sys_memfd_create+0x2d/0x40 [ 314.294509][T25596] do_syscall_64+0x44/0xa0 [ 314.298997][T25596] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 314.304896][T25596] RIP: 0033:0x7f74516f68d9 [ 314.309304][T25596] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 314.328904][T25596] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 314.337326][T25596] RAX: ffffffffffffffda RBX: 0000000020001540 RCX: 00007f74516f68d9 [ 314.345292][T25596] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 00007f745174fe76 [ 314.353259][T25596] RBP: 0000000000000003 R08: 0000000000000001 R09: ffffffffffffffff [ 314.361235][T25596] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 314.369220][T25596] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000180 04:59:51 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x4) umount2(&(0x7f0000000080)='./file0\x00', 0x0) [ 314.413565][T25585] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 314.452536][T25585] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x6c, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 314.499527][T25612] loop5: detected capacity change from 0 to 264192 04:59:51 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x6}, {&(0x7f00000004c0)="7607aa8e0001001b000000002b0500000000000000", 0x15, 0x1}], 0x21a501c, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=0x0, @ANYRESDEC=r0]) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x34) openat(r1, &(0x7f0000000100)='./file0/file0\x00', 0x2000, 0x40) [ 314.565102][T25619] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 314.584348][T25619] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x74, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 314.643358][T25619] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 314.665552][T25619] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 314.762584][T25646] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 314.787486][T25646] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 314.848745][T25646] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 314.870622][T25646] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x7a, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:51 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x20000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:51 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x604000000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:51 executing program 5: sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x1a4, 0x0, 0x720, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "6c9cda35fddf5e924641c5fc3930897ba3aa44a6035795e76d8f75995926011594"}}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x134, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc0a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3eec}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff379}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe6f4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x821}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff0000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2400}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xab50}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x2400c001}, 0x40000) r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x43030420}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xf8, r0, 0x109, 0x70bd28, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffff7f}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x9}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x10000}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x7fffffff}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x400}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x7}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4}, 0x91) r1 = accept4(0xffffffffffffffff, &(0x7f0000000540)=@sco={0x1f, @fixed}, &(0x7f00000005c0)=0x80, 0x80800) r2 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r2], 0xc63b9e35) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000700)={&(0x7f0000000640)={0xbc, r2, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0x98, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xde0c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}]}, 0xbc}}, 0x90) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f00000008c0)={&(0x7f0000000600), 0xc, &(0x7f0000000880)={&(0x7f0000000640)={0x238, r2, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0xdc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0xaa, 0x3, "a99d189a5afda4cdb86c3c57ec081fb08beb2569386110fff730ab435378ea0b13ee678b8ff9536da376f6d4cbbac8fe0ee24228bb8ebc5bd9f75dd128bdfd7c7f7e0a2f395bf5869ec5760b44c2b8907aa9a43d5c1443d632bd80a85b8e262dc685e980389b3f13e3afe3877459c48f6d0a0c126f965d0a58fe9aa299be364f41af29cf324b9110e6611509d31340bcf044c54d67cfcef0b03ad5d5d6330f913aa6a437dbe0"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8001}]}, @TIPC_NLA_NODE={0x13c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x87, 0x3, "d3a908cc05deb71236f0fc156b1e4bbf68b7d90ba1972289fb203905e68892b4ab66678d50ae55821183340e47675cdaf1261f61479369c62495576a59ca6c7264ecfe79be9ec07bc126626c20cdbdd5a5c819ee6079be26d03dfd7ab7a5ff4995f74f65318920a8ee6264425abebae7dd7e60803b01fd8bf08a737d472f5996d88184"}, @TIPC_NLA_NODE_ID={0xa2, 0x3, "7de84d6e2b617c297315ccb0d9f1a6ce0deabcd36ab4182e9a531aeb6cf3dfeb1e29e69dbad5588ee18d20e31f5c57b7cbcd8b31502fd86dc0ffa306e6c052cb41fb7305fb08aa217d9a4135dd1387ae242880eeaa56662f019d165850b2016843c728613f94464617c5bef1f5fd9bc102d7d2280b54fa6fa609c64e02209f0a13f40aa83c9f437c09fbaa4db60caa9400bf7415dbb9dfec3c771e4e8d24"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}]}, 0x238}, 0x1, 0x0, 0x0, 0x20000040}, 0x90) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 314.974039][T25663] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 04:59:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 7) 04:59:51 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x26000000, &(0x7f00000004c0), 0x0, 0x0) [ 315.022753][T25663] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 315.062077][T25672] loop5: detected capacity change from 0 to 264192 [ 315.074470][T25679] FAULT_INJECTION: forcing a failure. [ 315.074470][T25679] name failslab, interval 1, probability 0, space 0, times 0 [ 315.087218][T25679] CPU: 1 PID: 25679 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 315.096031][T25679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.106085][T25679] Call Trace: [ 315.109421][T25679] dump_stack_lvl+0xd6/0x122 [ 315.114021][T25679] dump_stack+0x11/0x1b [ 315.118195][T25679] should_fail+0x23c/0x250 [ 315.122619][T25679] ? security_file_alloc+0x30/0x190 [ 315.127831][T25679] __should_failslab+0x81/0x90 [ 315.132588][T25679] should_failslab+0x5/0x20 [ 315.137095][T25679] kmem_cache_alloc+0x4f/0x300 [ 315.141885][T25679] security_file_alloc+0x30/0x190 [ 315.146969][T25679] __alloc_file+0x83/0x1a0 [ 315.151393][T25679] alloc_empty_file+0xcd/0x1c0 [ 315.156218][T25679] alloc_file+0x3a/0x280 [ 315.160471][T25679] alloc_file_pseudo+0xfa/0x150 [ 315.165333][T25679] __shmem_file_setup+0x14c/0x1d0 [ 315.170420][T25679] shmem_file_setup+0x37/0x40 [ 315.175088][T25679] __se_sys_memfd_create+0x1eb/0x390 [ 315.180414][T25679] __x64_sys_memfd_create+0x2d/0x40 [ 315.185628][T25679] do_syscall_64+0x44/0xa0 [ 315.190266][T25679] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 315.196171][T25679] RIP: 0033:0x7f74516f68d9 [ 315.200580][T25679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 315.220184][T25679] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 315.228844][T25679] RAX: ffffffffffffffda RBX: 0000000020001540 RCX: 00007f74516f68d9 [ 315.236816][T25679] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 00007f745174fe76 [ 315.244782][T25679] RBP: 0000000000000003 R08: 0000000000000001 R09: ffffffffffffffff [ 315.252747][T25679] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 315.260717][T25679] R13: 0000000020000100 R14: 0000000008100000 R15: 0000000020000180 [ 315.279493][T25663] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 315.296138][T25663] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 315.318168][T25697] loop5: detected capacity change from 0 to 264192 04:59:51 executing program 5: semctl$IPC_RMID(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x301d015, &(0x7f0000000180)=ANY=[]) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) semtimedop(0xffffffffffffffff, &(0x7f0000000000)=[{0x4, 0x6, 0x1800}, {0x0, 0x4}, {0x4, 0x5, 0x1000}, {0x3, 0xffff, 0x800}, {0x2, 0xfffd, 0x1800}, {0x0, 0x5}], 0x6, &(0x7f00000000c0)={r0, r1+60000000}) r2 = semget$private(0x0, 0x5, 0x0) semop(r2, &(0x7f0000000140)=[{0x0, 0x0, 0x1800}, {0x2, 0x9}, {0x2}], 0x3) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000000)=[0x5fdb]) semtimedop(r2, &(0x7f0000000180)=[{0x2, 0x3, 0x800}, {0x3, 0xa59a, 0x1000}, {0x1, 0x8}, {0x4, 0x4}, {0x4, 0x1}, {0x2}, {0x4, 0x7}, {0x0, 0x8, 0x1000}], 0x8, &(0x7f00000001c0)={0x0, 0x989680}) semop(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x4, 0x800}, {0x0, 0x6, 0x1000}, {0x1, 0x5, 0x1000}, {0x4, 0x3f, 0x1000}, {0x1, 0xff}, {0x2, 0x0, 0x1800}], 0x6) r3 = semget$private(0x0, 0x5, 0x0) semop(r3, &(0x7f0000000140)=[{0x0, 0x0, 0x1800}, {0x2, 0x9}, {0x2}], 0x3) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000000)=[0x5fdb]) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000200)=[0x40]) 04:59:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x204, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 8) [ 315.416898][T25709] loop3: detected capacity change from 0 to 1 [ 315.436953][T25716] FAULT_INJECTION: forcing a failure. [ 315.436953][T25716] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 315.450221][T25716] CPU: 1 PID: 25716 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 315.458987][T25716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.469036][T25716] Call Trace: [ 315.472465][T25716] dump_stack_lvl+0xd6/0x122 [ 315.477059][T25716] dump_stack+0x11/0x1b [ 315.481216][T25716] should_fail+0x23c/0x250 [ 315.485631][T25716] __alloc_pages+0x102/0x320 [ 315.490225][T25716] alloc_pages_vma+0x5ee/0x770 [ 315.495084][T25716] shmem_getpage_gfp+0x96d/0x13d0 [ 315.500113][T25716] ? policydb_context_isvalid+0x135/0x230 [ 315.505853][T25716] shmem_write_begin+0x7e/0x100 [ 315.510714][T25716] generic_perform_write+0x1b8/0x3e0 [ 315.516024][T25716] __generic_file_write_iter+0x174/0x310 [ 315.521656][T25716] ? generic_write_checks+0x250/0x290 [ 315.527135][T25716] generic_file_write_iter+0x75/0x130 [ 315.532506][T25716] vfs_write+0x7bc/0x900 [ 315.536755][T25716] __x64_sys_pwrite64+0xf5/0x150 [ 315.541685][T25716] do_syscall_64+0x44/0xa0 [ 315.546113][T25716] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 315.552017][T25716] RIP: 0033:0x7f74516a98a7 [ 315.556445][T25716] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 315.576065][T25716] RSP: 002b:00007f744f46df20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 315.584576][T25716] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516a98a7 [ 315.592537][T25716] RDX: 0000000000000016 RSI: 00000000200002c0 RDI: 0000000000000004 [ 315.600492][T25716] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 315.608457][T25716] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 315.616471][T25716] R13: 0000000000000004 R14: 0000000020001540 R15: 0000000000000000 [ 315.652337][T25709] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 315.661049][T25709] EXT4-fs (loop3): unable to read superblock 04:59:52 executing program 5: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000500)={0x0, 0x0, "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", "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"}) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) chdir(&(0x7f0000000000)='./file0\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001580)={r3, r0, "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", "8ddd18ab29fc3242ac51a51fda05902e8690ee76b6a8a42aa5c133ce0649f5f70338368c5d0a61dce7f1c1c14a6fe3b01e443161fe101f36a4b5bfc3f730472fc616c2625fefd48c403d9b400dad5bd28b508f541aebc2b72bcb27bde6a301b6f9e9cdb4fc466c996a66ab8a77a624dda3a93ef4a22f2fcacb8a988b55c073c0651288576b8d0ec58bfc571153428210d5f6e7082b6d3d057d01ea52e06547f14e29e8c883672b8078a69365b03ceb00f5fa95d8628824a32474ec8da316f4407feda46c5fc08de31c86da77dfe8e896eaaf55c40dca89b8cd63bdfc70a27d43e6a4b6df0cdaec6129b40a6b87a5bdb37949e27fbef05211dc1a2321e120ccac93ac07a06ba2fe13cbff385b50d8ece59e1f8906b24d644f3ace5d1e2ed3b94281564b3a7db2a037e2f35278fe38e150f8207e13c71f4680ebcb9d7bef3bce6ad37f72f4c574ab65bba9b3c4a2e1ce4e2f4ab9d02621f7d1b3abec43a8ce047a4414d05d5689c4947c754fef10e7091af486049f94360f791666065d4aa002f0746ae689f8da29d26a0e9b63ff5f0e07cc0db0e1a266fdab9b98314e31a01066efbc3d99405245b5f9c98cc106b80d3d3f47760c11182dc5b241a5bc7c5f2bf99d324100af0aac0c1b8af4f98af0a7084c53ec2a52a94b4f331a93b5ccacbebc165022296b3e584b7d71b701fe48024656d34224b053b623e164baed64a594c74756b6a820156a5c02f4a39fcbd9baef9a0816421d2ab71e896093892343b67105c4fa7a218d2735530e32670f86ced5a6a18d6db90fad07926088f49596f3b876cda0b2d9b9197aee6cf8f91f875c3454221c2b14de116efe174aba2b83bb5b2b47f6e2cd5963a42259cac74839fc8b0b338b8606fbb46a55af43563805df0c522b1262aaf513f76ad72851cd2e512034a6cbe5991711cd8729d19293468fd51e8e6f0fd177f33de836d93ffc8c739bb67e1058850309718120867265086e07260dfb72527db1982c5ecb1d63a13ccfa3dc26e330dfd57896b41649bafdb10d1bd4aa58b7606fd64c8a2ce6f84ebc94b3fe584e97a844d54d67c49767453a50703e9cc68cdcd32fc975c96a2a4fa58ac1dc2e193144b88fd0ee8147b5c01a3add3f747602ab0ed4a464d873710bdaa0215a880844ab45f499110aa20a8ccab57a5d809948a571d6bb9dcc0f99534a6c02584c5ea22bcaf695128dd919eb34f0e15cc287ce12f1dd6e36739b9218685a7ab44ea92f32a99d728077f99a017b7de2576e0839a732965da828428e1a56d82dd13eda81f076fec20853178c9b98249fa79a9159457ccc763aee74746195be20d75f9631c948a7e9d579820e0006b8b086dc67e2499886e6d01096596e23638d2bac8fa962f7c8ff33bc16bd6591b13989661fbe59b14086321715a8c8047d1accb64cbeb50b0a6f7ed85d8708b4ab51f19799a0dc5e3d9fd929cb5075837a97e64aaddebaa186706f3146c9564943bd02dddd24de50d41ac4e80c375dc9668dca69c6204dfb41ef371aa41f30c7f0f04484f4479cf7c366511308eb0cd32088bd8231edffc9533b758b30b52e1a91c2b9016c730d88cdea39b158b3d4dbcff8f89ee0b186307b3d02bf96de49896e1e752f6f365767fdaba4e8878068d6221f6fc42718e6aec5f7e69cbed882d3cca5cd8418939b6b646aba01729fe9d0ed46bbd2ae6f6bb37ae4c1f41af72fbdc00617ba2cef946d6b00b49cc1bc0b8c11eb3b0de36296b3ee362927489c397a768ea08d5785bc5962a0278489440f85c558056eff36d026386a57c5ab5c379d230c8adc87c3b2f3f44149bed4e9faa36b2a62491d9caa4ddf5e254c8ed3bf7ca98793589d2b9052cee43c8d95e70625ec20e4e60dbcf956e789300da209e96be43b372221278f2447cb1b1d12f3dcc57bee49921b9c8b72442b2ae87a4e255d435f25830e0dc02e93c805dfb5805ab9db6df1d232b12c9d58bc6b806718ce0eb90e6c6fa08cbf5ad5e0157530a2b9e9aac8a77d731b7c4c010eb647f2144a1d5180a0090dcd8abd6a62c3f6361122efd525f22c27445e910076f7941b5ed3d9b2490942a1c1614822b1585c87325f8a387554c0e95e9932e0ec78ad36c337896e685944468a952c11965f6cb663f311a848cd7a0e47fbba1b6af33f1025dd33256cf296c845b39c9d7258cb390df1f6befa6b200d500c59dcc9bacbccd5f0b253f206c92c67353134af6ebca6fcf72209d5342201ff22585101a0534bfa78b75f768603a4666d39dd1aa046b66b0e6785b0f184e1d6339a93c6a478a41aa888166c86e332f8fac8121e54f638efd19ff529a9d261c8af469f02fa4ba80cc99e76de4bcef7100201b71da477b7c5e1359c8477338fee87014a0dfaba95616aaadaee4d9bc410123fb25221bf32ffe76ba60e02d2f60d96ddf9dfedf3ab642bb3b28e265ea034cc2b7b39284f48f03aa2d1abe8eaf427f2dc862470ef3bd0bccda8ada4c4f641c696de84d4002e9f9a5aa8de2d815c2d395b23f8331e443836c0b675cce60daab25f25d66c65dff9f5cb7ae03fa10533f92e815f6773c269cbb2fcd5b49710a2bd775990667c87d862019d8effe92cc21a23675ed7b759df776db1aa628ba7be5984f8798529985a7f3e0f64e4863a748da5a334df4ba2ee0831730f8c784893c927dcdc8479629fbd13b378b5a37fdc46d927376be2caf76c7b27888247fdf21b7d2bdc908f33af32b6be5bc4588af167e98ae82b4781a030c570d4a6985b1f13cfcd652b0cad7226e598238069385083576bdd3a9c0d575c2bcacb9111e0b73c2aa6febea374061e0721a3615910ccd124e7e7b98f6816fff3b13e1a8976b482c7bc9b99a191f4b967964f2b18df738dc7a594ccc71478bdebda49e83b4ee7eba3bde7ee692f67280ce6a9a1f32a6c3bb3d61d6a87c4b2d2a8158423e063667c1bdfd9bbeea522f3032751959ef6a9d49d64d23e9d40bf61d16af7d24674c2ef2cb9c7ca8d1a4df01fb57f2470d3a27975efecb9964e758da4ab02faaccbee112b18fc00195993e5c62bdf2f9ac855eca5f197a8514f53511105b942e20bb50d7a8995f411dfc11a76505caa8446204b6d7fcb2fdb8aac66912c445f68bef82b44032b2fe1b28f08b5766158886f8ebaa69571ded02655fb3d511f06b36132199576bfd3738cdef75254739ef3d98ffddc2da14a67af3da495e56c72596912ce89428c5f7154494b9b772872aa77feb6ccd5b7562f03fb9f9355e4ebf029f1b23f1ac754fec7fce363f9dc1bde49e5c5e483abda9ace5b1ada9b0c074128f697b7ecfe6cb277fe55a453fd6e18085543023f50c9f7bf61f09cb1cc158cdfbc40b32239d26c3cda190ab098782f74ae1d1224ede50ec6510ea7948265321b86029e4b5b51988f44410885eba400e0c51d928a8070c3832446e19ce077403c86cd463657142f29b254efa005a36ea425d875d8604c4ef0562ecb20b2e85242a0a543e604f5c73509ea75f511cb99dd4c9ecf79e377d1d0bbc07bc503daa11b38b5968319eb416fe469aeb507c38690a80c40cde1a29d6bf8591fdad7ba9be5f50d28b8bd317d16e2f462f0a9c4fc4ad1fb59726dd4e112840fbc6f1ec1cdc98acd833200c303a229e137b7d64d2340ac491d1d546361552427ad2f8beefb95850f6ce3414f4fa0ec633c7efd65170efa1b7f9fa68dd5c977f206e36e86e5cd8a1d009ed9f25aec79c987ecdce5f4ff6c84e548ee00e7e5f9c5f45398d3c6175f52dbf913561576ee5ef45036768f9e5639d8bbb6e2164b62ed568ca9cb07665de0fd6c466f15e677276e32327e6de91124311974f454ef8b83bfe7724b18319352923da3ee679be175e34b4523bbf5bb159430a09a443dc3ae9678f0bd9688ee77b6cb7afcd065b582ec5bf59da3f708dea62d2b6b3b94c1f56e68f8e9ce3b9e2296d6c2f2825e866ea97b855b01bc30628cf4e898bb297d7320a74f1283f57615ff84a14f87701a3a851ec8a6315c843162f510d0e9599d663357be8aaf565941bfddf1c8ef3f4d767c21cd7ec78b93613c0d2da9fe8c458149a9f056cf2adc845d0cff17e21e15126a2f5518fee38356f2b7f509f5568b0d1f6bd7cc0ee6b2ac9ead9cedc7e3c85cbed16f771cacdc44d586d4ae257190c9f90058789f85360e26d728695a14a0074053fbc2d45ca960204d353d2e77d613d93a48be5e2a2ac4476aebe1302e0896335760a2c0c74ea6777f22b2b4b9a9890a66b0783e41f85961f081382a897ecb34811cf09e5ba58101373b3d7ff4ab971fcdd235d929c44f14fe425b94ede9b195730c668ef41413fbf72310e3d88d518f5b63d79da162744891e9b0cec514f3683172e9efd093458ee3fb73204331960088f86ac26a111ab57ce05240cec24b1c3a1b441a5763990fa0808f34e7986c5053dc6863bc99bc1afa3fabc0e081a771f36deda1a02535f6cbe0e029672ed18188f123e289b10789f27af8ab1f37c3c4f5b9fb0dbb2fd0caf310fd43ec0b768c4abf6a0da2bb482717d5234f11d4cd47f766708799a0b5adcc64fd32d107a7eaafd9e08f5e79aafff9409029a8405d00b5203cbecbae100c366bd3c62af3fdeacc2b27b91f1929a08bd63828a3179eda41dc3f16947bd01517d398838d76d458dd4d2356fc3ca2ee48a65123f71c19ca514c3f1fea4ef56889f2964a2070a89908bf24982146a6509ee58aacc54e719dd47e1fcd59b7f6a4e92c2eee9174ab6b59ef0971de474a1008e0ccd8d5c51ef1f5259b61ca48b848e1e71be602c330b31424e980b87af96fd19302eeba5642e7d5afdd25941e25b00393fbd53d54a14ec105f1e217b525ba981b675144a2b4ef4a2f227f66bb13fc9ac3645148866b1a8280685166fdeeaebbbbff3c9062889859c887f6a004f85655c1d4b094931e76384e369a631efec1ace4471c47e471d740c7d8c413b56b61f40336e6b4b55fc9d7822f2371784cbda82333b78e87b2ce594348d39663eeb07439fba9b96c119f33b97bc54ca3a1a73d802dad2495b62854a02180005c5cf02485d5c9fa0af5541210aa694aae9560546a23c453b6a400f9aa7febe6c8be2573509a44564f59d74d4cbc60c5b318e7262157b76d5da82c88498e65175f49814c4660c1846de5ebc32affc5251a5db68a3d7c09cfb359a4bf7bb2de94cb76f192e177db7b0ce59d4bad4d7f870967b79ab361c0ea31bdd3c1aaf5c1765c4409b50b3bab82daa23ce7b4f18d91817090ddec03321394a2a535c79ac0b5000c8f2e4bf0e7d5fdb2db74c22c438f5d1ff2960081b5313c0411e426efd6c09914c9a28c0daf4a1866fac864aa61751a3e5edcecae551e777a5582d390ea5242423fcea5661fc20513fc8dc451ea8fdf8a058698890c7e86b40806"}) [ 315.765874][T25709] loop3: detected capacity change from 0 to 1 [ 315.773508][T25709] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 315.792242][T25732] loop5: detected capacity change from 0 to 264192 04:59:52 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r1, &(0x7f0000000300)=""/28, 0x1c) getdents(r1, &(0x7f0000000040)=""/97, 0x61) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x5, &(0x7f0000000500)=[{&(0x7f00000000c0)="74d5a21b418f37317a5ceb05e845d49fbb2164897d65af5c4bf31d288be109a0", 0x20, 0x4}, {&(0x7f0000000200)="11fb1a95eae0ca80a78cdc62ba9074387e58a79ef840f5ea1e7b3b880e1b061d590858706c074559ed1aa3ea74aaf8b221981e84c53db58c3e07a276cccdc1b2c7940f36ff6b88383c609f3274823f7f2fba90b05063087f377b0ab089bed31a1ba1783b9d22b341b3a23e6516f2e0067928fa3fb165a451bd9d269ced39743bbe09ca1dcffa318ad7422b577c21e17756597981bc1ff869fbba40ecb21b5fc854e6611fe105401d5784f59ae9ca8304fc66431f78a113ba7dadd00d5b526362616723f3b6309c9b235f981147e136b5bd12afb8958da93cd0dfa3df0340d2d80ff06e7b34300e051cd572e8afd5a87ddee9f4c3c8000000", 0xf8, 0xffff}, {&(0x7f00000003c0)="a02f1c6b2ed58b7d3e8a7257eced23685c34cd83a1bc9d64828819c903b70145fc962cb43002a76b78f4bf7c644046ef00880688d2feb597f639dfc2be74289ff14f5f79babe073d8fa99f0dbd4d5af9c57f977c5ff8e9e40525669d9ad997d4419f7ec166db8fad713bf366112e66ec8469f9053ee8355761c19c334a6f1e9ee9", 0x81, 0x4}, {&(0x7f0000000600)="c6179628941934b92aea6e5d8efda40b5c52742d6086b8ce9b3daa5b3dcefb98797a01f2a0c8577637fc7d0cd358dca47fa4f2d1663934993e99a90fe1f2c6eef98c4aefba553b9c0c06134bd71e6e91015fef31a4aa818a6d066472d97c41d958bf484f5e7b007e981eccc7e3aaed8aa826e7dd7acfe2b9b306cd8901c524afb5e40fe32b7bbeabdc68501454785d4fecd526122ac4ae914bddd4d768dd123a31bff65c98bc68d8a2576995759f13a06b645c8cd7b92b95f3f4ce6f1e67bd192e7906c9082160631e57ffa2bee241c9ab8ce459e2d32ef01b00a2848a1811036d6af2", 0xe3, 0x7}, {&(0x7f0000000900)="8d721eaf0e01bf30adc248de419f0b353357cd0a16c0b77ff76b27c2caa30c203bed0dbd3a13ac8da860cb89e1d5f0be0bf46da83b4c65208bbe5cf06c053579e2b79ed5899d232ed22215e300778c63e4e15b679490820ed98de607d3cdbce8ed6f55da291b6201945efc7fb15a79d40279e66c4fa3352eceb525f6c78c201160e3e2a4aa731fbbe5a9a9a5a2976b08bdf8231e1a586fef45af12dc8e41600f46f4d257ccff2bf09b11c14427cb8fcb7b8bb84d6a56c57a5d649bbac07225c33d553359c13c2ea880ba", 0xca, 0x4}], 0x8000, &(0x7f0000000780)=ANY=[@ANYRESOCT=r1, @ANYRESHEX=r0, @ANYRES32=r1, @ANYRESDEC, @ANYBLOB="2c7065726d69745f646972656374696f2c6673757569643d61613530329dada44dc8aa7162b8510db94e46ea632d670601322d663631612d653132632d65396362342955f60f34393202000100005f6d6561737572652c646f6e74606d654f7375726528726f6f74636f6e746578703d73797388adb7e0a27f676c17e91f858261646d5f752c7065726d690297978b6de6e6d483212a4a09a7b426a445c6f31aea89f73e6e780d4080289033cb8c851ac1828383f6731274fab0937e7bf70bbbe0e335fa49448a85a756bebc913c766a60748df94c3fda79b0d1a8fa24774d7b1df8b63b82d08f4b9cfc51b23dfa2df57072853ee179ebaa85cb13283598bc403d24ef2481bd72a60a97766297eda9907ab1a81de778bc220975"]) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r3, &(0x7f0000000300)=""/28, 0x1c) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r4, &(0x7f0000000300)=""/28, 0x1c) getdents(r4, &(0x7f0000000040)=""/97, 0x61) getdents(r4, &(0x7f0000000580)=""/97, 0x61) renameat2(r2, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00', 0x4) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r5, &(0x7f0000000300)=""/28, 0x1c) getdents(r5, &(0x7f0000000040)=""/97, 0x61) getdents64(r5, &(0x7f0000001580)=""/4096, 0x1000) [ 315.810755][T25709] EXT4-fs (loop3): unable to read superblock 04:59:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x300, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:52 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x80000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:52 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x700000000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:52 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x30050000, &(0x7f00000004c0), 0x0, 0x0) [ 315.930611][T25753] loop5: detected capacity change from 0 to 264192 [ 315.931268][T25716] loop2: detected capacity change from 0 to 264192 [ 315.942772][T25757] loop3: detected capacity change from 0 to 1 04:59:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 9) 04:59:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000004}, {&(0x7f0000000000)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x200e4fd, &(0x7f0000000180)=ANY=[]) [ 315.992178][T25757] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 316.022097][T25757] EXT4-fs (loop3): unable to read superblock [ 316.032731][T25775] FAULT_INJECTION: forcing a failure. [ 316.032731][T25775] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 316.045801][T25775] CPU: 0 PID: 25775 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 316.054646][T25775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.064704][T25775] Call Trace: [ 316.067977][T25775] dump_stack_lvl+0xd6/0x122 [ 316.072569][T25775] dump_stack+0x11/0x1b [ 316.076733][T25775] should_fail+0x23c/0x250 [ 316.081148][T25775] should_fail_usercopy+0x16/0x20 [ 316.086174][T25775] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 316.091895][T25775] ? shmem_write_begin+0x7e/0x100 [ 316.096947][T25775] generic_perform_write+0x201/0x3e0 [ 316.102264][T25775] __generic_file_write_iter+0x174/0x310 [ 316.108022][T25775] ? generic_write_checks+0x250/0x290 [ 316.113394][T25775] generic_file_write_iter+0x75/0x130 [ 316.118778][T25775] vfs_write+0x7bc/0x900 [ 316.123032][T25775] __x64_sys_pwrite64+0xf5/0x150 [ 316.128129][T25775] do_syscall_64+0x44/0xa0 [ 316.132553][T25775] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 316.138708][T25775] RIP: 0033:0x7f74516a98a7 [ 316.143146][T25775] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 316.162763][T25775] RSP: 002b:00007f744f46df20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 316.171211][T25775] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516a98a7 [ 316.179179][T25775] RDX: 0000000000000016 RSI: 00000000200002c0 RDI: 0000000000000004 [ 316.187154][T25775] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 316.195147][T25775] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 316.203122][T25775] R13: 0000000000000004 R14: 0000000020001540 R15: 0000000000000000 [ 316.230523][T25757] loop3: detected capacity change from 0 to 1 [ 316.233670][T25781] loop5: detected capacity change from 0 to 264192 04:59:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) mount(&(0x7f00000000c0)=@nullb, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='cifs\x00', 0x8, &(0x7f00000001c0)='vfat\x00') open(&(0x7f0000000080)='./file0\x00', 0x10040, 0x106) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x183) [ 316.243218][T25757] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 316.275235][T25757] EXT4-fs (loop3): unable to read superblock 04:59:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x3f0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 316.363966][T25791] loop5: detected capacity change from 0 to 264192 04:59:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x3014096, &(0x7f0000000180)=ANY=[]) creat(&(0x7f0000000000)='./file0\x00', 0x182) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) write$binfmt_elf32(r0, &(0x7f0000001dc0)=ANY=[@ANYBLOB="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"], 0x1878) [ 316.422743][T25802] loop3: detected capacity change from 0 to 1 [ 316.439973][T25791] loop5: detected capacity change from 0 to 264192 [ 316.454556][T25802] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 316.491337][T25802] EXT4-fs (loop3): unable to read superblock [ 316.544687][T25802] loop3: detected capacity change from 0 to 1 [ 316.550942][T25802] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 316.572236][T25818] loop5: detected capacity change from 0 to 264192 [ 316.579883][T25802] EXT4-fs (loop3): unable to read superblock 04:59:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x3f1, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 10) [ 316.604013][T25818] FAT-fs (loop5): invalid media value (0xd8) [ 316.610018][T25818] FAT-fs (loop5): Can't find a valid FAT filesystem [ 316.623530][T25775] loop2: detected capacity change from 0 to 264192 04:59:53 executing program 5: r0 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000080)={{r0}, {@val, @max}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r1, &(0x7f0000000300)=""/28, 0x1c) getdents(r1, &(0x7f0000000040)=""/97, 0x61) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0xe0002014}) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 316.701556][T25829] loop3: detected capacity change from 0 to 1 [ 316.729614][T25829] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 316.747025][T25840] loop5: detected capacity change from 0 to 264192 [ 316.756834][T25829] EXT4-fs (loop3): unable to read superblock [ 316.766173][T25842] FAULT_INJECTION: forcing a failure. [ 316.766173][T25842] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 316.779284][T25842] CPU: 1 PID: 25842 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 316.788159][T25842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.798296][T25842] Call Trace: [ 316.801573][T25842] dump_stack_lvl+0xd6/0x122 [ 316.806175][T25842] dump_stack+0x11/0x1b [ 316.810320][T25842] should_fail+0x23c/0x250 [ 316.814729][T25842] should_fail_usercopy+0x16/0x20 [ 316.819741][T25842] copy_page_from_iter_atomic+0x2c1/0xbb0 [ 316.825496][T25842] ? shmem_write_begin+0x7e/0x100 [ 316.830509][T25842] generic_perform_write+0x201/0x3e0 [ 316.836016][T25842] __generic_file_write_iter+0x174/0x310 [ 316.841649][T25842] ? generic_write_checks+0x250/0x290 [ 316.847013][T25842] generic_file_write_iter+0x75/0x130 [ 316.852373][T25842] vfs_write+0x7bc/0x900 [ 316.856614][T25842] __x64_sys_pwrite64+0xf5/0x150 [ 316.861548][T25842] do_syscall_64+0x44/0xa0 [ 316.866051][T25842] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 316.872042][T25842] RIP: 0033:0x7f74516a98a7 [ 316.876470][T25842] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 316.896073][T25842] RSP: 002b:00007f744f46df20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 316.904475][T25842] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516a98a7 [ 316.912434][T25842] RDX: 000000000000000b RSI: 00000000200004c0 RDI: 0000000000000004 [ 316.920464][T25842] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 316.928456][T25842] R10: 0000000000000001 R11: 0000000000000293 R12: 0000000000000004 [ 316.936416][T25842] R13: 0000000000000004 R14: 0000000020001570 R15: 0000000000000002 04:59:53 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x80040, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:53 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3f000000, &(0x7f00000004c0), 0x0, 0x0) [ 316.982042][T25829] loop3: detected capacity change from 0 to 1 [ 316.988566][T25829] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 317.011590][T25829] EXT4-fs (loop3): unable to read superblock [ 317.018194][T25842] loop2: detected capacity change from 0 to 264192 04:59:53 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x800000000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:53 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0), 0x9) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)=0x0) io_submit(r2, 0x2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r1, &(0x7f0000000000), 0x16000}]) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r3, &(0x7f0000000300)=""/28, 0x1c) getdents(r3, &(0x7f0000000040)=""/97, 0x61) recvmmsg$unix(r0, &(0x7f0000005840)=[{{&(0x7f0000000280), 0x6e, &(0x7f0000000440)=[{&(0x7f0000001580)=""/136, 0x88}], 0x1, &(0x7f0000001640)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf0}}, {{&(0x7f0000001740), 0x6e, &(0x7f0000000480)=[{&(0x7f00000017c0)=""/196, 0xc4}], 0x1, &(0x7f00000018c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x118}}, {{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001500)=""/59, 0x3b}, {&(0x7f0000001a00)=""/212, 0xd4}, {&(0x7f0000001b00)=""/26, 0x1a}], 0x3}}, {{&(0x7f0000001b80)=@abs, 0x6e, &(0x7f0000002f00)=[{&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/113, 0x71}, {&(0x7f0000002c80)=""/105, 0x69}, {&(0x7f0000002d00)=""/38, 0x26}, {&(0x7f0000002d40)=""/141, 0x8d}, {&(0x7f0000002e00)=""/122, 0x7a}, {&(0x7f0000002e80)=""/118, 0x76}], 0x7, &(0x7f0000002f80)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb0}}, {{&(0x7f0000003040), 0x6e, &(0x7f00000040c0)=[{&(0x7f00000030c0)=""/4096, 0x1000}], 0x1, &(0x7f0000004100)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb0}}, {{&(0x7f00000041c0)=@abs, 0x6e, &(0x7f0000004480)=[{&(0x7f0000004240)}, {&(0x7f0000004280)=""/229, 0xe5}, {&(0x7f0000004380)=""/217, 0xd9}], 0x3, &(0x7f00000044c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000004500), 0x6e, &(0x7f0000005780)=[{&(0x7f0000004580)=""/46, 0x2e}, {&(0x7f00000045c0)=""/4096, 0x1000}, {&(0x7f00000055c0)=""/13, 0xd}, {&(0x7f0000005600)=""/84, 0x54}, {&(0x7f0000005680)=""/237, 0xed}], 0x5, &(0x7f0000005800)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x7, 0x100, &(0x7f0000005a00)={0x77359400}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r5, &(0x7f0000000300)=""/28, 0x1c) getdents(r5, &(0x7f0000000040)=""/97, 0x61) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r6, &(0x7f0000000300)=""/28, 0x1c) getdents(r6, &(0x7f0000000040)=""/97, 0x61) io_submit(r2, 0x4, &(0x7f0000005b80)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x3, 0x3, r0, &(0x7f0000000180)="022e07a5a399cb841fdced90bdda55c7af5265687dde0c4692cbb74ad2e471e954dc5f24d26d4baf073f1d62430eb1b82b1e1a12e554e424b471fc90d5ff25fd4caaafd4aac83cd4bfa3a7435eeb6d5b344360187b1078", 0x57, 0x3ff, 0x0, 0x3, r0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x9, 0x1, r3, &(0x7f0000000340)="599a70a46c0875eb0f23ab2dd1b9c1f44c29d73051d7b42513a9a5c59975384df53a2c1da56cc909032bbcc942988f6eacd75ac06d7480f4223fc98cc28e473e417555e441639a33f3cae1625d0b69da5dec75273f5468f484e6f37e8cb1b4ffe381bd73a242964e73890ff54f0064a9caa76c560e2a6897ca291b2ff498cae98a1d087eba0db737c8039aa8a875c19a7cb45f0f3b4718afec3b6f7e6a6d6c7c7fc1c77f3a3e5027e4ed0b0296a9326903925c5421d0777c8733971e68ae7195d0badb1c2a2dc60cd07b146c912a6882038f0587fe06c5cff374654fde11fa1bc0", 0xe1, 0x4}, &(0x7f0000005a40)={0x0, 0x0, 0x0, 0x2, 0xfff7, r0, &(0x7f0000000500)="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", 0x1000, 0x4, 0x0, 0x2, r4}, &(0x7f0000005b40)={0x0, 0x0, 0x0, 0x5, 0x5, r5, &(0x7f0000005a80)="fd06d9e9ce27ad143fcd8a05279c55ee5bec2df468e12ce1be41b72cf4541982ca8432e5eaf1cc89d37d4b846897761726ea15eee95226be37aa4e278d4024032055d96326632b9fb91c57fbcaec9924a33f61b6df8a080cf442f73148b75711f07396ea097f419478b7236027dd85958cb250b5c71633d46455586660739e0b749dec465e7c", 0x86, 0x7ff, 0x0, 0x2, r6}]) getdents(r0, &(0x7f0000000040)=""/97, 0x61) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x280000, &(0x7f0000000000)=ANY=[@ANYRES16, @ANYRESHEX]) 04:59:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 11) 04:59:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x402, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 317.113551][T25874] loop3: detected capacity change from 0 to 2 [ 317.121744][T25871] loop5: detected capacity change from 0 to 264192 [ 317.138473][T25874] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 317.171625][T25874] EXT4-fs (loop3): unable to read superblock [ 317.182845][T25885] FAULT_INJECTION: forcing a failure. [ 317.182845][T25885] name failslab, interval 1, probability 0, space 0, times 0 [ 317.195536][T25885] CPU: 0 PID: 25885 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 317.204309][T25885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.214359][T25885] Call Trace: [ 317.217645][T25885] dump_stack_lvl+0xd6/0x122 [ 317.222242][T25885] dump_stack+0x11/0x1b [ 317.226389][T25885] should_fail+0x23c/0x250 [ 317.230878][T25885] ? getname_flags+0x84/0x3f0 [ 317.235552][T25885] __should_failslab+0x81/0x90 [ 317.240306][T25885] should_failslab+0x5/0x20 [ 317.244812][T25885] kmem_cache_alloc+0x4f/0x300 [ 317.249717][T25885] getname_flags+0x84/0x3f0 [ 317.254213][T25885] getname+0x15/0x20 [ 317.258103][T25885] do_sys_openat2+0x6d/0x2b0 [ 317.262694][T25885] __x64_sys_openat+0xef/0x110 [ 317.267459][T25885] do_syscall_64+0x44/0xa0 [ 317.271951][T25885] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 317.277851][T25885] RIP: 0033:0x7f74516a97f4 [ 317.282255][T25885] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 317.301864][T25885] RSP: 002b:00007f744f46ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 317.310274][T25885] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516a97f4 [ 317.318233][T25885] RDX: 0000000000000002 RSI: 00007f744f46e000 RDI: 00000000ffffff9c [ 317.326189][T25885] RBP: 00007f744f46e000 R08: 0000000000000000 R09: ffffffffffffffff [ 317.334187][T25885] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 317.342156][T25885] R13: 0000000000000004 R14: 0000000020001588 R15: 0000000000000003 04:59:53 executing program 5: ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 317.383069][T25874] loop3: detected capacity change from 0 to 2 [ 317.392058][T25874] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 317.421700][T25874] EXT4-fs (loop3): unable to read superblock 04:59:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x406, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 317.489050][T25899] loop5: detected capacity change from 0 to 264192 [ 317.502718][T25902] loop3: detected capacity change from 0 to 2 [ 317.521501][T25902] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 317.546938][T25902] EXT4-fs (loop3): unable to read superblock 04:59:54 executing program 5: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x10) rmdir(&(0x7f00000001c0)='./bus\x00') r1 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000003c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000440), 0x513d, 0x189901) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x703040, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f0000000340)={{'\x00', 0x1}, {0x1000}, 0x15c, 0x0, 0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)="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", 0x193, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/555], 0x22b}) unlink(&(0x7f0000000400)='./bus\x00') linkat(r2, &(0x7f0000000000)='./file0\x00', r3, &(0x7f0000000480)='.\x00', 0x1400) ioctl$EXT4_IOC_GETSTATE(r4, 0x40046629, &(0x7f00000004c0)) [ 317.613727][T25902] loop3: detected capacity change from 0 to 2 [ 317.620173][T25902] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 317.647741][T25902] EXT4-fs (loop3): unable to read superblock 04:59:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x500, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 317.692819][T25916] loop5: detected capacity change from 0 to 264192 04:59:54 executing program 5: sched_yield() sched_yield() syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 12) [ 317.760627][T25925] loop3: detected capacity change from 0 to 2 [ 317.786970][T25925] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 317.811943][T25925] EXT4-fs (loop3): unable to read superblock [ 317.821006][T25933] loop5: detected capacity change from 0 to 264192 [ 317.828890][T25935] FAULT_INJECTION: forcing a failure. [ 317.828890][T25935] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 317.842223][T25935] CPU: 0 PID: 25935 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 317.850980][T25935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.861085][T25935] Call Trace: [ 317.864356][T25935] dump_stack_lvl+0xd6/0x122 [ 317.868957][T25935] dump_stack+0x11/0x1b [ 317.873118][T25935] should_fail+0x23c/0x250 [ 317.877531][T25935] should_fail_usercopy+0x16/0x20 [ 317.882555][T25935] strncpy_from_user+0x21/0x250 [ 317.887437][T25935] getname_flags+0xb8/0x3f0 [ 317.891949][T25935] getname+0x15/0x20 [ 317.895845][T25935] do_sys_openat2+0x6d/0x2b0 [ 317.900433][T25935] __x64_sys_openat+0xef/0x110 [ 317.905204][T25935] do_syscall_64+0x44/0xa0 [ 317.909626][T25935] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 317.915526][T25935] RIP: 0033:0x7f74516a97f4 [ 317.920037][T25935] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 317.939647][T25935] RSP: 002b:00007f744f46ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 317.948150][T25935] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516a97f4 04:59:54 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x400000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 317.956120][T25935] RDX: 0000000000000002 RSI: 00007f744f46e000 RDI: 00000000ffffff9c [ 317.964082][T25935] RBP: 00007f744f46e000 R08: 0000000000000000 R09: ffffffffffffffff [ 317.972120][T25935] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 317.980110][T25935] R13: 0000000000000004 R14: 0000000020001588 R15: 0000000000000003 04:59:54 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x40000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:54 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1800000000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 13) [ 318.029478][T25925] loop3: detected capacity change from 0 to 2 [ 318.036210][T25925] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 318.062579][T25954] loop5: detected capacity change from 0 to 264192 [ 318.064385][T25925] EXT4-fs (loop3): unable to read superblock [ 318.092674][T25962] FAULT_INJECTION: forcing a failure. [ 318.092674][T25962] name failslab, interval 1, probability 0, space 0, times 0 [ 318.105319][T25962] CPU: 0 PID: 25962 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 318.114204][T25962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.124250][T25962] Call Trace: [ 318.127516][T25962] dump_stack_lvl+0xd6/0x122 [ 318.132130][T25962] dump_stack+0x11/0x1b [ 318.136272][T25962] should_fail+0x23c/0x250 [ 318.140724][T25962] ? __alloc_file+0x2e/0x1a0 [ 318.145835][T25962] __should_failslab+0x81/0x90 [ 318.150668][T25962] should_failslab+0x5/0x20 [ 318.155206][T25962] kmem_cache_alloc+0x4f/0x300 [ 318.159966][T25962] __alloc_file+0x2e/0x1a0 [ 318.164391][T25962] alloc_empty_file+0xcd/0x1c0 [ 318.169236][T25962] path_openat+0x6a/0x1ec0 [ 318.173681][T25962] ? copy_page_from_iter_atomic+0x44b/0xbb0 [ 318.179570][T25962] ? set_page_dirty+0xf4/0x1a0 [ 318.184328][T25962] ? shmem_write_end+0x37d/0x3d0 [ 318.189298][T25962] ? balance_dirty_pages_ratelimited+0xc4/0x2a0 [ 318.195536][T25962] ? generic_perform_write+0x377/0x3e0 [ 318.201063][T25962] do_filp_open+0x105/0x220 [ 318.205572][T25962] do_sys_openat2+0xb5/0x2b0 [ 318.210235][T25962] __x64_sys_openat+0xef/0x110 [ 318.214993][T25962] do_syscall_64+0x44/0xa0 [ 318.219424][T25962] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 318.225375][T25962] RIP: 0033:0x7f74516a97f4 [ 318.229784][T25962] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 318.249435][T25962] RSP: 002b:00007f744f46ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 318.257853][T25962] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516a97f4 [ 318.265822][T25962] RDX: 0000000000000002 RSI: 00007f744f46e000 RDI: 00000000ffffff9c [ 318.273810][T25962] RBP: 00007f744f46e000 R08: 0000000000000000 R09: ffffffffffffffff [ 318.281875][T25962] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 04:59:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 14) [ 318.289846][T25962] R13: 0000000000000004 R14: 0000000020001588 R15: 0000000000000003 04:59:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x600, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x2}, {&(0x7f0000000040)="d9cf6289cf3c701b8163eb5dfb9333f3429e1ebdfb1c9e0d5efa22b0e4c50230ac3f3b0d", 0x24, 0x8000008}], 0x381c054, &(0x7f0000000140)=ANY=[@ANYRESDEC=0x0, @ANYRES16, @ANYBLOB="98d66aa9139339b6a6bbb585a6e17c10d0afe11b6cb257f787d5d23c7fc7085a70206f6e0e962cc975d399a67c136bb99f260ba2d8c685621c"]) open(&(0x7f0000000200)='./file0\x00', 0x181400, 0x20) chdir(&(0x7f00000001c0)='./file0\x00') statfs(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/54) r0 = syz_io_uring_complete(0x0) recvmmsg(r0, &(0x7f0000007340)=[{{&(0x7f00000002c0)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000340)=""/38, 0x26}, {&(0x7f0000000380)=""/236, 0xec}, {&(0x7f0000000500)=""/155, 0x9b}], 0x3}, 0x3}, {{0x0, 0x0, &(0x7f0000002600)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f00000025c0)=""/19, 0x13}], 0x3, &(0x7f0000002640)=""/97, 0x61}, 0x6d}, {{&(0x7f00000026c0)=@can, 0x80, &(0x7f0000003a00)=[{&(0x7f0000002740)=""/16, 0x10}, {&(0x7f0000002780)=""/35, 0x23}, {&(0x7f00000027c0)=""/140, 0x8c}, {&(0x7f0000002880)=""/4096, 0x1000}, {&(0x7f0000003880)=""/174, 0xae}, {&(0x7f0000003940)=""/38, 0x26}, {&(0x7f0000003980)=""/51, 0x33}, {&(0x7f00000039c0)=""/18, 0x12}], 0x8, &(0x7f0000003a80)=""/170, 0xaa}, 0x133}, {{&(0x7f0000003b40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003bc0)=""/86, 0x56}, {&(0x7f0000003c40)=""/48, 0x30}, {&(0x7f0000003c80)=""/4096, 0x1000}, {&(0x7f0000004c80)=""/238, 0xee}], 0x4, &(0x7f0000004dc0)=""/252, 0xfc}, 0x8001}, {{&(0x7f0000004ec0)=@ax25={{0x3, @netrom}, [@bcast, @null, @netrom, @bcast, @null, @remote, @default, @netrom]}, 0x80, &(0x7f00000050c0)=[{&(0x7f0000004f40)=""/148, 0x94}, {&(0x7f0000005000)=""/41, 0x29}, {&(0x7f0000005040)=""/65, 0x41}], 0x3, &(0x7f0000005100)=""/32, 0x20}, 0x7fff}, {{&(0x7f0000005140)=@generic, 0x80, &(0x7f0000005280)=[{&(0x7f00000051c0)=""/151, 0x97}], 0x1, &(0x7f00000052c0)=""/4096, 0x1000}, 0x3}, {{&(0x7f00000062c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000006740)=[{&(0x7f0000006340)=""/182, 0xb6}, {&(0x7f0000006400)=""/132, 0x84}, {&(0x7f00000064c0)=""/156, 0x9c}, {&(0x7f0000006580)=""/131, 0x83}, {&(0x7f0000006640)=""/247, 0xf7}], 0x5, &(0x7f00000067c0)=""/179, 0xb3}, 0x7f}, {{&(0x7f0000006880)=@nfc, 0x80, &(0x7f0000006dc0)=[{&(0x7f0000006900)=""/155, 0x9b}, {&(0x7f00000069c0)=""/224, 0xe0}, {&(0x7f0000006ac0)=""/195, 0xc3}, {&(0x7f0000006bc0)=""/31, 0x1f}, {&(0x7f0000006c00)=""/98, 0x62}, {&(0x7f0000006c80)=""/236, 0xec}, {&(0x7f0000006d80)=""/4, 0x4}], 0x7, &(0x7f0000006e40)=""/192, 0xc0}, 0x9}, {{&(0x7f0000006f00)=@nl, 0x80, &(0x7f00000072c0)=[{&(0x7f0000006f80)=""/237, 0xed}, {&(0x7f0000007080)=""/240, 0xf0}, {&(0x7f0000007180)=""/151, 0x97}, {&(0x7f0000007240)=""/82, 0x52}], 0x4, &(0x7f0000007300)=""/29, 0x1d}, 0x8001}], 0x9, 0x62, &(0x7f0000007580)={0x0, 0x989680}) [ 318.357441][T25972] FAULT_INJECTION: forcing a failure. [ 318.357441][T25972] name failslab, interval 1, probability 0, space 0, times 0 [ 318.370160][T25972] CPU: 0 PID: 25972 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 318.378920][T25972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.389057][T25972] Call Trace: [ 318.392339][T25972] dump_stack_lvl+0xd6/0x122 [ 318.396936][T25972] dump_stack+0x11/0x1b [ 318.401085][T25972] should_fail+0x23c/0x250 [ 318.405517][T25972] ? security_file_alloc+0x30/0x190 [ 318.410709][T25972] __should_failslab+0x81/0x90 [ 318.415482][T25972] should_failslab+0x5/0x20 [ 318.420054][T25972] kmem_cache_alloc+0x4f/0x300 [ 318.424813][T25972] security_file_alloc+0x30/0x190 [ 318.429833][T25972] __alloc_file+0x83/0x1a0 [ 318.434249][T25972] alloc_empty_file+0xcd/0x1c0 [ 318.439014][T25972] path_openat+0x6a/0x1ec0 [ 318.443448][T25972] ? copy_page_from_iter_atomic+0x44b/0xbb0 [ 318.449331][T25972] ? set_page_dirty+0xf4/0x1a0 [ 318.454107][T25972] ? shmem_write_end+0x37d/0x3d0 [ 318.459054][T25972] ? balance_dirty_pages_ratelimited+0xc4/0x2a0 [ 318.465394][T25972] ? generic_perform_write+0x377/0x3e0 [ 318.470892][T25972] do_filp_open+0x105/0x220 [ 318.475441][T25972] do_sys_openat2+0xb5/0x2b0 [ 318.480102][T25972] __x64_sys_openat+0xef/0x110 [ 318.484900][T25972] do_syscall_64+0x44/0xa0 [ 318.489401][T25972] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 318.495337][T25972] RIP: 0033:0x7f74516a97f4 [ 318.499749][T25972] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 318.519456][T25972] RSP: 002b:00007f744f46ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 318.527877][T25972] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516a97f4 [ 318.535836][T25972] RDX: 0000000000000002 RSI: 00007f744f46e000 RDI: 00000000ffffff9c [ 318.543799][T25972] RBP: 00007f744f46e000 R08: 0000000000000000 R09: ffffffffffffffff 04:59:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 15) [ 318.551768][T25972] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 318.559741][T25972] R13: 0000000000000004 R14: 0000000020001588 R15: 0000000000000003 [ 318.575666][T25976] loop3: detected capacity change from 0 to 3 [ 318.589847][T25976] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 318.612431][T25980] loop5: detected capacity change from 0 to 264192 [ 318.621448][T25976] EXT4-fs (loop3): unable to read superblock [ 318.655641][T25987] FAULT_INJECTION: forcing a failure. [ 318.655641][T25987] name failslab, interval 1, probability 0, space 0, times 0 [ 318.668271][T25987] CPU: 0 PID: 25987 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 318.677151][T25987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.687218][T25987] Call Trace: [ 318.690494][T25987] dump_stack_lvl+0xd6/0x122 [ 318.695088][T25987] dump_stack+0x11/0x1b [ 318.699286][T25987] should_fail+0x23c/0x250 [ 318.703693][T25987] ? kzalloc+0x16/0x20 [ 318.707758][T25987] __should_failslab+0x81/0x90 [ 318.712522][T25987] should_failslab+0x5/0x20 [ 318.717018][T25987] __kmalloc+0x6f/0x350 [ 318.721181][T25987] ? _atomic_dec_and_lock+0x60/0xd0 [ 318.726377][T25987] kzalloc+0x16/0x20 [ 318.730267][T25987] alloc_workqueue+0x12f/0xad0 [ 318.735153][T25987] ? disk_unblock_events+0x35/0x40 [ 318.740259][T25987] ? bd_prepare_to_claim+0x1e6/0x270 [ 318.745568][T25987] ? loop_attr_do_show_dio+0x70/0x70 [ 318.750901][T25987] ? loop_set_status_from_info+0x35e/0x3a0 [ 318.756791][T25987] loop_configure+0x681/0xeb0 [ 318.761507][T25987] lo_ioctl+0x618/0x13e0 [ 318.765744][T25987] ? path_openat+0x18d4/0x1ec0 [ 318.770504][T25987] ? blkdev_common_ioctl+0x438/0x1110 [ 318.775868][T25987] ? selinux_file_ioctl+0x981/0xa10 [ 318.781181][T25987] ? lo_release+0x120/0x120 [ 318.785680][T25987] blkdev_ioctl+0x1d0/0x3f0 [ 318.790176][T25987] block_ioctl+0x6e/0x80 [ 318.794422][T25987] ? blkdev_iopoll+0x80/0x80 [ 318.799000][T25987] __se_sys_ioctl+0xcb/0x140 [ 318.803585][T25987] __x64_sys_ioctl+0x3f/0x50 [ 318.808171][T25987] do_syscall_64+0x44/0xa0 [ 318.812666][T25987] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 318.818562][T25987] RIP: 0033:0x7f74516f6697 [ 318.822967][T25987] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.842564][T25987] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 318.851023][T25987] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516f6697 [ 318.859076][T25987] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 318.867042][T25987] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 318.875060][T25987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 318.883020][T25987] R13: 0000000000000004 R14: 0000000020001588 R15: 0000000000000003 [ 318.895051][T25976] loop3: detected capacity change from 0 to 3 04:59:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) creat(&(0x7f0000000000)='./file0\x00', 0x80) 04:59:55 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 16) [ 318.907919][T25976] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 04:59:55 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2600000000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:55 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x48000000, &(0x7f00000004c0), 0x0, 0x0) [ 318.962089][T26002] loop5: detected capacity change from 0 to 264192 [ 318.976407][T25976] EXT4-fs (loop3): unable to read superblock 04:59:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x604, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 319.053210][T26016] FAULT_INJECTION: forcing a failure. [ 319.053210][T26016] name failslab, interval 1, probability 0, space 0, times 0 [ 319.065851][T26016] CPU: 0 PID: 26016 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 319.074611][T26016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.084669][T26016] Call Trace: [ 319.087945][T26016] dump_stack_lvl+0xd6/0x122 [ 319.092529][T26016] dump_stack+0x11/0x1b [ 319.096706][T26016] should_fail+0x23c/0x250 04:59:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file0\x00') [ 319.101117][T26016] __should_failslab+0x81/0x90 [ 319.105890][T26016] ? alloc_workqueue+0x15d/0xad0 [ 319.110832][T26016] should_failslab+0x5/0x20 [ 319.115332][T26016] kmem_cache_alloc_trace+0x52/0x320 [ 319.120630][T26016] alloc_workqueue+0x15d/0xad0 [ 319.125399][T26016] ? disk_unblock_events+0x35/0x40 [ 319.130507][T26016] ? bd_prepare_to_claim+0x1e6/0x270 [ 319.135969][T26016] ? loop_attr_do_show_dio+0x70/0x70 [ 319.141277][T26016] ? loop_set_status_from_info+0x35e/0x3a0 [ 319.147085][T26016] loop_configure+0x681/0xeb0 [ 319.151784][T26016] lo_ioctl+0x618/0x13e0 [ 319.156116][T26016] ? path_openat+0x18d4/0x1ec0 [ 319.160894][T26016] ? blkdev_common_ioctl+0x438/0x1110 [ 319.166261][T26016] ? selinux_file_ioctl+0x981/0xa10 [ 319.171461][T26016] ? lo_release+0x120/0x120 [ 319.175961][T26016] blkdev_ioctl+0x1d0/0x3f0 [ 319.180451][T26016] block_ioctl+0x6e/0x80 [ 319.184682][T26016] ? blkdev_iopoll+0x80/0x80 [ 319.189265][T26016] __se_sys_ioctl+0xcb/0x140 [ 319.193856][T26016] __x64_sys_ioctl+0x3f/0x50 [ 319.198438][T26016] do_syscall_64+0x44/0xa0 [ 319.202862][T26016] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 319.208747][T26016] RIP: 0033:0x7f74516f6697 [ 319.213145][T26016] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 319.232778][T26016] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 319.241259][T26016] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516f6697 [ 319.249227][T26016] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 319.257184][T26016] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 319.265160][T26016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 319.273132][T26016] R13: 0000000000000004 R14: 0000000020001588 R15: 0000000000000003 [ 319.289492][T26020] loop3: detected capacity change from 0 to 3 04:59:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 17) [ 319.299064][T26020] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 319.317183][T26020] EXT4-fs (loop3): unable to read superblock [ 319.336109][T26027] loop5: detected capacity change from 0 to 264192 [ 319.357582][T26020] loop3: detected capacity change from 0 to 3 [ 319.366255][T26020] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 319.409067][T26037] FAULT_INJECTION: forcing a failure. [ 319.409067][T26037] name failslab, interval 1, probability 0, space 0, times 0 [ 319.421715][T26037] CPU: 0 PID: 26037 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 319.430475][T26037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.440521][T26037] Call Trace: [ 319.443792][T26037] dump_stack_lvl+0xd6/0x122 [ 319.448386][T26037] dump_stack+0x11/0x1b [ 319.452541][T26037] should_fail+0x23c/0x250 [ 319.456954][T26037] ? kzalloc+0x16/0x20 [ 319.461015][T26037] __should_failslab+0x81/0x90 [ 319.465782][T26037] should_failslab+0x5/0x20 [ 319.470289][T26037] __kmalloc+0x6f/0x350 [ 319.474439][T26037] ? number+0xa13/0xb60 [ 319.478584][T26037] kzalloc+0x16/0x20 [ 319.482498][T26037] apply_wqattrs_prepare+0x3a/0x630 [ 319.487691][T26037] ? vsnprintf+0xe8f/0xed0 [ 319.492143][T26037] apply_workqueue_attrs+0x9e/0x100 [ 319.497357][T26037] alloc_workqueue+0x777/0xad0 [ 319.502144][T26037] ? disk_unblock_events+0x35/0x40 [ 319.507345][T26037] ? bd_prepare_to_claim+0x1e6/0x270 [ 319.512632][T26037] ? loop_attr_do_show_dio+0x70/0x70 [ 319.517327][T26020] EXT4-fs (loop3): unable to read superblock [ 319.517931][T26037] ? loop_set_status_from_info+0x35e/0x3a0 [ 319.517957][T26037] loop_configure+0x681/0xeb0 [ 319.534485][T26037] lo_ioctl+0x618/0x13e0 [ 319.538730][T26037] ? path_openat+0x18d4/0x1ec0 [ 319.543539][T26037] ? blkdev_common_ioctl+0x438/0x1110 [ 319.548902][T26037] ? selinux_file_ioctl+0x981/0xa10 [ 319.554089][T26037] ? lo_release+0x120/0x120 [ 319.558782][T26037] blkdev_ioctl+0x1d0/0x3f0 [ 319.563268][T26037] block_ioctl+0x6e/0x80 [ 319.567490][T26037] ? blkdev_iopoll+0x80/0x80 [ 319.572077][T26037] __se_sys_ioctl+0xcb/0x140 [ 319.576712][T26037] __x64_sys_ioctl+0x3f/0x50 [ 319.581288][T26037] do_syscall_64+0x44/0xa0 [ 319.585692][T26037] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 319.591575][T26037] RIP: 0033:0x7f74516f6697 [ 319.595998][T26037] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 319.615671][T26037] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 319.624084][T26037] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516f6697 [ 319.632038][T26037] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 319.639988][T26037] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 319.647940][T26037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 319.655906][T26037] R13: 0000000000000004 R14: 0000000020001588 R15: 0000000000000003 04:59:56 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4c000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:56 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:56 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3005000000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x700, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 18) [ 319.866538][T26027] loop5: detected capacity change from 0 to 264192 04:59:56 executing program 5: socket$inet6(0xa, 0x3, 0x400) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v3={0x3000000, [{0x3, 0xa0}, {0x20, 0x9}], r1}, 0x18, 0x1) [ 319.958788][T26060] FAULT_INJECTION: forcing a failure. [ 319.958788][T26060] name failslab, interval 1, probability 0, space 0, times 0 [ 319.971418][T26060] CPU: 0 PID: 26060 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 319.980187][T26060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.990240][T26060] Call Trace: [ 319.993546][T26060] dump_stack_lvl+0xd6/0x122 [ 319.998129][T26060] dump_stack+0x11/0x1b [ 320.002300][T26060] should_fail+0x23c/0x250 [ 320.006703][T26060] __should_failslab+0x81/0x90 [ 320.011476][T26060] ? apply_wqattrs_prepare+0x5f/0x630 [ 320.016831][T26060] should_failslab+0x5/0x20 [ 320.021325][T26060] kmem_cache_alloc_trace+0x52/0x320 [ 320.026614][T26060] apply_wqattrs_prepare+0x5f/0x630 [ 320.031813][T26060] ? vsnprintf+0xe8f/0xed0 [ 320.036251][T26060] apply_workqueue_attrs+0x9e/0x100 [ 320.041497][T26060] alloc_workqueue+0x777/0xad0 [ 320.046280][T26060] ? disk_unblock_events+0x35/0x40 [ 320.051384][T26060] ? bd_prepare_to_claim+0x1e6/0x270 [ 320.056706][T26060] ? loop_attr_do_show_dio+0x70/0x70 [ 320.061986][T26060] ? loop_set_status_from_info+0x35e/0x3a0 [ 320.067818][T26060] loop_configure+0x681/0xeb0 [ 320.072521][T26060] lo_ioctl+0x618/0x13e0 [ 320.076767][T26060] ? path_openat+0x18d4/0x1ec0 [ 320.081533][T26060] ? blkdev_common_ioctl+0x438/0x1110 [ 320.086895][T26060] ? selinux_file_ioctl+0x981/0xa10 [ 320.092189][T26060] ? lo_release+0x120/0x120 [ 320.096765][T26060] blkdev_ioctl+0x1d0/0x3f0 [ 320.101263][T26060] block_ioctl+0x6e/0x80 [ 320.105634][T26060] ? blkdev_iopoll+0x80/0x80 [ 320.110221][T26060] __se_sys_ioctl+0xcb/0x140 [ 320.114814][T26060] __x64_sys_ioctl+0x3f/0x50 [ 320.119392][T26060] do_syscall_64+0x44/0xa0 [ 320.123814][T26060] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 320.129765][T26060] RIP: 0033:0x7f74516f6697 [ 320.134260][T26060] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 320.153873][T26060] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 320.162346][T26060] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516f6697 [ 320.170316][T26060] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 320.178280][T26060] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 320.186248][T26060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 320.194217][T26060] R13: 0000000000000004 R14: 0000000020001588 R15: 0000000000000003 [ 320.454720][T26066] loop3: detected capacity change from 0 to 3 [ 320.460981][T26068] loop5: detected capacity change from 0 to 264192 04:59:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 19) [ 320.495288][T26066] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 320.520535][T26066] EXT4-fs (loop3): unable to read superblock [ 320.545406][T26067] loop5: detected capacity change from 0 to 264192 [ 320.553819][T26066] loop3: detected capacity change from 0 to 3 [ 320.560281][T26066] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 320.575311][T26080] FAULT_INJECTION: forcing a failure. [ 320.575311][T26080] name failslab, interval 1, probability 0, space 0, times 0 [ 320.587965][T26080] CPU: 1 PID: 26080 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 320.596786][T26080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.606830][T26080] Call Trace: [ 320.610097][T26080] dump_stack_lvl+0xd6/0x122 [ 320.614677][T26080] dump_stack+0x11/0x1b [ 320.618818][T26080] should_fail+0x23c/0x250 [ 320.623218][T26080] __should_failslab+0x81/0x90 [ 320.627966][T26080] ? apply_wqattrs_prepare+0xbe/0x630 [ 320.633327][T26080] should_failslab+0x5/0x20 [ 320.637821][T26080] kmem_cache_alloc_trace+0x52/0x320 [ 320.643089][T26080] ? apply_wqattrs_prepare+0x5f/0x630 [ 320.648521][T26080] apply_wqattrs_prepare+0xbe/0x630 [ 320.653734][T26080] ? vsnprintf+0xe8f/0xed0 [ 320.658137][T26080] apply_workqueue_attrs+0x9e/0x100 [ 320.663325][T26080] alloc_workqueue+0x777/0xad0 [ 320.668119][T26080] ? disk_unblock_events+0x35/0x40 [ 320.673287][T26080] ? bd_prepare_to_claim+0x1e6/0x270 [ 320.678620][T26080] ? loop_attr_do_show_dio+0x70/0x70 [ 320.683931][T26080] ? loop_set_status_from_info+0x35e/0x3a0 [ 320.689726][T26080] loop_configure+0x681/0xeb0 [ 320.694438][T26080] lo_ioctl+0x618/0x13e0 [ 320.698712][T26080] ? path_openat+0x18d4/0x1ec0 [ 320.703467][T26080] ? blkdev_common_ioctl+0x438/0x1110 [ 320.708821][T26080] ? selinux_file_ioctl+0x981/0xa10 [ 320.714017][T26080] ? lo_release+0x120/0x120 [ 320.718505][T26080] blkdev_ioctl+0x1d0/0x3f0 [ 320.722990][T26080] block_ioctl+0x6e/0x80 [ 320.727216][T26080] ? blkdev_iopoll+0x80/0x80 [ 320.731905][T26080] __se_sys_ioctl+0xcb/0x140 [ 320.736506][T26080] __x64_sys_ioctl+0x3f/0x50 [ 320.741077][T26080] do_syscall_64+0x44/0xa0 [ 320.745493][T26080] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 320.751377][T26080] RIP: 0033:0x7f74516f6697 [ 320.755842][T26080] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 320.775882][T26080] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 320.784430][T26080] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516f6697 [ 320.792384][T26080] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 320.800352][T26080] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 320.808305][T26080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 320.816259][T26080] R13: 0000000000000004 R14: 0000000020001588 R15: 0000000000000003 04:59:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b8321785f5db2e2d8", 0x15, 0x1}], 0x40009, &(0x7f0000000000)=ANY=[@ANYRESHEX]) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x7236f2487bbb4e43) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x1, 0x4, &(0x7f0000000340)=[{&(0x7f0000000180)="6748d19cfb7d35a27e399910a3a269c89b30c5279ad1a79bf1c697ed60955c5dae44bed1c97136cc3c", 0x29, 0x5}, {&(0x7f00000001c0)="85b13b299c9e2c36e5123e8f65659eb1b59759f4fd9f6aa8649566e7c327814e687443de2f4cefdc3698022d02ce779bc7bb75d9e10628c43258668a7987be2900395171548b4543f636b4b03ad9b42eb4aaaa54d80d7936a51c7693725b518a040710cd83cc0ec20da09a88e293cfe1a57413e366cd8a21b6d08e2b6a94f3f219efc9b72c76", 0x86, 0x40}, {&(0x7f0000000280)="2931bd413cd12dcd6a718c04dbc19738bf13948edef0524235a18b36fa5423528968068b44d1", 0x26, 0xad}, {&(0x7f00000002c0)="21e853d9943200cc654531cf96af0c0b72e8ba3d8c5286a667bde243dedb1138663964a71d69d9d22b8b330ac01ea765b69dc2891273c11bbe702b2e2a533a016ac40f1f4be55e93c86a8b20b81cd27c04bd5cc95bcc8584e9fca1ed90ac8dc04fefd81ed6afbddf2957deb7eb60ae58d07af347c48070", 0x77, 0x1}], 0x80, &(0x7f00000003c0)={[{@oldalloc}, {@barrier}], [{@permit_directio}]}) 04:59:57 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3f00000000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:57 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x68000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:57 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2040000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x900, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 20) [ 320.852325][T26066] EXT4-fs (loop3): unable to read superblock [ 320.938139][T26105] FAULT_INJECTION: forcing a failure. [ 320.938139][T26105] name failslab, interval 1, probability 0, space 0, times 0 [ 320.950761][T26105] CPU: 1 PID: 26105 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 320.959596][T26105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.969656][T26105] Call Trace: [ 320.972956][T26105] dump_stack_lvl+0xd6/0x122 [ 320.977560][T26105] dump_stack+0x11/0x1b [ 320.981702][T26105] should_fail+0x23c/0x250 [ 320.986108][T26105] __should_failslab+0x81/0x90 [ 320.990879][T26105] should_failslab+0x5/0x20 [ 320.995381][T26105] kmem_cache_alloc_node+0x61/0x2c0 [ 321.000590][T26105] ? alloc_unbound_pwq+0x3e6/0x780 [ 321.005706][T26105] alloc_unbound_pwq+0x3e6/0x780 [ 321.010639][T26105] apply_wqattrs_prepare+0x1ed/0x630 [ 321.015957][T26105] ? vsnprintf+0xe8f/0xed0 [ 321.020363][T26105] apply_workqueue_attrs+0x9e/0x100 [ 321.025638][T26105] alloc_workqueue+0x777/0xad0 [ 321.030416][T26105] ? disk_unblock_events+0x35/0x40 [ 321.035558][T26105] ? bd_prepare_to_claim+0x1e6/0x270 [ 321.041037][T26105] ? loop_attr_do_show_dio+0x70/0x70 [ 321.046405][T26105] ? loop_set_status_from_info+0x35e/0x3a0 [ 321.052374][T26105] loop_configure+0x681/0xeb0 [ 321.057126][T26105] lo_ioctl+0x618/0x13e0 [ 321.061554][T26105] ? path_openat+0x18d4/0x1ec0 [ 321.066330][T26105] ? blkdev_common_ioctl+0x438/0x1110 [ 321.071750][T26105] ? selinux_file_ioctl+0x981/0xa10 [ 321.076954][T26105] ? lo_release+0x120/0x120 [ 321.081459][T26105] blkdev_ioctl+0x1d0/0x3f0 [ 321.085957][T26105] block_ioctl+0x6e/0x80 [ 321.090204][T26105] ? blkdev_iopoll+0x80/0x80 [ 321.094787][T26105] __se_sys_ioctl+0xcb/0x140 [ 321.099380][T26105] __x64_sys_ioctl+0x3f/0x50 [ 321.104252][T26105] do_syscall_64+0x44/0xa0 [ 321.108661][T26105] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 321.114632][T26105] RIP: 0033:0x7f74516f6697 [ 321.119138][T26105] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 321.138900][T26105] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 321.147317][T26105] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516f6697 [ 321.155297][T26105] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 321.163267][T26105] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 321.171316][T26105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 321.179285][T26105] R13: 0000000000000004 R14: 0000000020001588 R15: 0000000000000003 [ 321.235742][T26113] loop3: detected capacity change from 0 to 4 [ 321.244529][T26114] loop5: detected capacity change from 0 to 264192 [ 321.270713][T26113] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 04:59:57 executing program 5: setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x4e24, 0x80, @empty, 0x6}, {0xa, 0x4e23, 0x4, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x4}, 0x32, [0x8, 0x2352, 0x8337780, 0xfff, 0x6, 0x7fffffff, 0xfffffffb, 0x31]}, 0x5c) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0xe080, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x72) [ 321.306416][T26113] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 321.382465][T26113] loop3: detected capacity change from 0 to 4 [ 321.393394][T26113] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 04:59:58 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000, 0x3, &(0x7f0000000140)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}, {&(0x7f0000000040)="6c913a9739d11a64baabb618ce1152ba755c25e62c3b2d6057be79487891dde34592a1ebf9bece3323a5d4d91a831a918931ce2632f824c8d820899355431d71f7e7a7bd7ac0042f8d38e3ab48e1a2e93b884efb02db5e2976cddcb419eedabc679d0c31e4b652031c06e457d2bf916aa55635bc02688fed2f21a5f709ff964cab133db54aed172f2d0c71d7907086f7fe9593119ba3d8c3e13f1c2feacfc91f", 0xa0, 0x4}], 0x301c014, &(0x7f0000000180)=ANY=[]) getdents64(r0, &(0x7f0000000500)=""/4096, 0x1000) getdents64(r0, &(0x7f00000001c0)=""/233, 0xe9) [ 321.426012][T26113] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xa00, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 321.507250][T26137] loop5: detected capacity change from 0 to 264192 [ 321.543337][T26141] loop3: detected capacity change from 0 to 5 04:59:58 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3a) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) fcntl$lock(r0, 0x26, &(0x7f00000000c0)={0x2, 0x1, 0x0, 0x7, r1}) ioctl$sock_netdev_private(r0, 0x89f3, &(0x7f0000000000)="253c1acb44f0c70c8ae0336ae9f764293f240262912b921f20e677a852d0aa2b13941f2f1b1c4c3b51c0259522136c768f47276b3487ca56e55ad4027f5a20b085b40ffac870c2809f31f9bee470967dba308c9edefc6ca35c711cff117532644e94757f7c6493811844f1b5de0c453344e51bd25c58eecc9fca2e451bdab2a8d3ca9a20f93444167df187e88652f80e554cab3b64872ff418ad52a1cd8f342b26a739e8b8d0650470960dae7376675ab75435c7642150dd18e4") [ 321.577216][T26141] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 321.604736][T26141] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:58 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x3, 0x4) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x301c014, &(0x7f0000000180)=ANY=[]) [ 321.652904][T26141] loop3: detected capacity change from 0 to 5 [ 321.666430][T26141] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 04:59:58 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4000080000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x6c000000, &(0x7f00000004c0), 0x0, 0x0) [ 321.713909][T26141] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:58 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 04:59:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 21) 04:59:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xb00, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 321.818556][T26188] FAULT_INJECTION: forcing a failure. [ 321.818556][T26188] name failslab, interval 1, probability 0, space 0, times 0 [ 321.824020][T26189] loop3: detected capacity change from 0 to 5 [ 321.831209][T26188] CPU: 1 PID: 26188 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 321.846021][T26188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.856310][T26188] Call Trace: [ 321.859595][T26188] dump_stack_lvl+0xd6/0x122 [ 321.864178][T26188] dump_stack+0x11/0x1b [ 321.868317][T26188] should_fail+0x23c/0x250 [ 321.872721][T26188] __should_failslab+0x81/0x90 [ 321.877477][T26188] ? kobject_uevent_env+0x1a7/0xc40 [ 321.882660][T26188] should_failslab+0x5/0x20 [ 321.887157][T26188] kmem_cache_alloc_trace+0x52/0x320 [ 321.892457][T26188] ? pwq_adjust_max_active+0x491/0x4b0 [ 321.898007][T26188] ? dev_uevent_filter+0x70/0x70 [ 321.903123][T26188] kobject_uevent_env+0x1a7/0xc40 [ 321.908309][T26188] ? __list_add_valid+0x28/0x90 [ 321.913144][T26188] ? alloc_workqueue+0xa18/0xad0 [ 321.918144][T26188] disk_force_media_change+0xe3/0x170 [ 321.923591][T26188] loop_configure+0x6c0/0xeb0 [ 321.928256][T26188] lo_ioctl+0x618/0x13e0 [ 321.932561][T26188] ? path_openat+0x18d4/0x1ec0 [ 321.937486][T26188] ? blkdev_common_ioctl+0x438/0x1110 [ 321.942864][T26188] ? selinux_file_ioctl+0x981/0xa10 [ 321.948105][T26188] ? lo_release+0x120/0x120 [ 321.952618][T26188] blkdev_ioctl+0x1d0/0x3f0 [ 321.957131][T26188] block_ioctl+0x6e/0x80 [ 321.961358][T26188] ? blkdev_iopoll+0x80/0x80 [ 321.965933][T26188] __se_sys_ioctl+0xcb/0x140 [ 321.970507][T26188] __x64_sys_ioctl+0x3f/0x50 [ 321.975083][T26188] do_syscall_64+0x44/0xa0 [ 321.979556][T26188] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 321.985542][T26188] RIP: 0033:0x7f74516f6697 [ 321.989947][T26188] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 322.009668][T26188] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 322.018069][T26188] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516f6697 [ 322.026025][T26188] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 322.034248][T26188] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 322.042204][T26188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 322.050185][T26188] R13: 0000000000000004 R14: 0000000020001588 R15: 0000000000000003 04:59:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) pipe2(&(0x7f0000002e00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) mkdirat(r0, &(0x7f0000004300)='./file0\x00', 0x8) r1 = socket(0x2b, 0x800, 0x3) recvmmsg(r1, &(0x7f0000004100)=[{{&(0x7f0000000080)=@generic, 0x80, &(0x7f0000000380)=[{&(0x7f0000000000)=""/32, 0x20}, {&(0x7f0000000140)=""/25, 0x19}, {&(0x7f0000000180)=""/252, 0xfc}, {&(0x7f0000000280)=""/170, 0xaa}, {&(0x7f0000000340)=""/35, 0x23}], 0x5}}, {{&(0x7f0000000400)=@sco, 0x80, &(0x7f0000000780)=[{&(0x7f0000000500)=""/230, 0xe6}, {&(0x7f0000000480)=""/36, 0x24}, {&(0x7f0000000600)=""/62, 0x3e}, {&(0x7f0000000640)=""/104, 0x68}, {&(0x7f00000006c0)=""/156, 0x9c}], 0x5, &(0x7f0000000800)=""/164, 0xa4}}, {{&(0x7f00000008c0), 0x80, &(0x7f0000000a00)=[{&(0x7f0000000940)=""/56, 0x38}, {&(0x7f0000000980)=""/110, 0x6e}], 0x2, &(0x7f0000000a40)=""/122, 0x7a}, 0x80000001}, {{&(0x7f0000000ac0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000b40)=""/59, 0x3b}, {&(0x7f0000000b80)=""/234, 0xea}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/53, 0x35}, {&(0x7f0000000cc0)=""/194, 0xc2}, {&(0x7f0000000dc0)=""/163, 0xa3}], 0x6, &(0x7f0000000f00)=""/166, 0xa6}, 0x9}, {{&(0x7f0000000fc0)=@nfc, 0x80, &(0x7f0000001440)=[{&(0x7f0000001040)=""/25, 0x19}, {&(0x7f0000001080)=""/193, 0xc1}, {&(0x7f0000001180)=""/40, 0x28}, {&(0x7f00000011c0)=""/176, 0xb0}, {&(0x7f0000001280)=""/99, 0x63}, {&(0x7f0000001300)=""/185, 0xb9}, {&(0x7f00000013c0)=""/76, 0x4c}], 0x7, &(0x7f0000002580)=""/250, 0xfa}, 0x289e574b}, {{&(0x7f00000014c0)=@phonet, 0x80, &(0x7f0000002880)=[{&(0x7f0000002680)=""/195, 0xc3}, {&(0x7f0000002780)=""/73, 0x49}, {&(0x7f0000002800)=""/124, 0x7c}], 0x3, &(0x7f00000028c0)=""/255, 0xff}, 0x240}, {{&(0x7f00000029c0)=@sco={0x1f, @none}, 0x80, &(0x7f0000002d80)=[{&(0x7f0000002a40)=""/140, 0x8c}, {&(0x7f0000002b00)=""/158, 0x9e}, {&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/25, 0x19}, {&(0x7f0000002cc0)=""/19, 0x13}, {&(0x7f0000002d00)=""/76, 0x4c}], 0x6, &(0x7f0000002e00)}, 0x4}, {{&(0x7f0000002e40)=@ipx, 0x80, &(0x7f0000004080)=[{&(0x7f0000002ec0)=""/4096, 0x1000}, {&(0x7f0000003ec0)=""/180, 0xb4}, {&(0x7f0000003f80)=""/185, 0xb9}, {&(0x7f0000004040)=""/1, 0x1}], 0x4, &(0x7f00000040c0)=""/46, 0x2e}}], 0x8, 0x0, 0x0) [ 322.072008][T26189] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 322.090393][T26189] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 322.098629][T26188] loop2: detected capacity change from 0 to 264192 04:59:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xc00, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 04:59:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 22) [ 322.189061][T26205] loop5: detected capacity change from 0 to 264192 [ 322.197624][T26207] loop3: detected capacity change from 0 to 6 [ 322.219093][T26207] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 322.274801][T26207] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 322.276952][T26216] FAULT_INJECTION: forcing a failure. [ 322.276952][T26216] name failslab, interval 1, probability 0, space 0, times 0 [ 322.293939][T26216] CPU: 0 PID: 26216 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 322.302727][T26216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.312772][T26216] Call Trace: [ 322.316050][T26216] dump_stack_lvl+0xd6/0x122 [ 322.320646][T26216] dump_stack+0x11/0x1b [ 322.324809][T26216] should_fail+0x23c/0x250 [ 322.329231][T26216] ? kzalloc+0x1d/0x30 [ 322.333305][T26216] __should_failslab+0x81/0x90 [ 322.338161][T26216] should_failslab+0x5/0x20 [ 322.341988][T26205] loop5: detected capacity change from 0 to 264192 [ 322.342659][T26216] __kmalloc+0x6f/0x350 [ 322.353285][T26216] kzalloc+0x1d/0x30 [ 322.357192][T26216] kobject_get_path+0x7c/0x110 [ 322.361966][T26216] kobject_uevent_env+0x1be/0xc40 [ 322.367003][T26216] ? __list_add_valid+0x28/0x90 [ 322.371845][T26216] ? alloc_workqueue+0xa18/0xad0 [ 322.376827][T26216] disk_force_media_change+0xe3/0x170 [ 322.382228][T26216] loop_configure+0x6c0/0xeb0 [ 322.386930][T26216] lo_ioctl+0x618/0x13e0 [ 322.391237][T26216] ? path_openat+0x18d4/0x1ec0 [ 322.396018][T26216] ? blkdev_common_ioctl+0x438/0x1110 [ 322.401458][T26216] ? selinux_file_ioctl+0x981/0xa10 [ 322.406651][T26216] ? lo_release+0x120/0x120 [ 322.411327][T26216] blkdev_ioctl+0x1d0/0x3f0 [ 322.415835][T26216] block_ioctl+0x6e/0x80 [ 322.420208][T26216] ? blkdev_iopoll+0x80/0x80 [ 322.424796][T26216] __se_sys_ioctl+0xcb/0x140 [ 322.429448][T26216] __x64_sys_ioctl+0x3f/0x50 [ 322.434029][T26216] do_syscall_64+0x44/0xa0 [ 322.438513][T26216] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 322.444461][T26216] RIP: 0033:0x7f74516f6697 [ 322.448870][T26216] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 322.468476][T26216] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 322.476890][T26216] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516f6697 [ 322.484864][T26216] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 322.492844][T26216] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 322.500817][T26216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 322.508781][T26216] R13: 0000000000000004 R14: 0000000020001588 R15: 0000000000000003 04:59:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 23) [ 322.521546][T26216] loop2: detected capacity change from 0 to 264192 04:59:59 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r0, &(0x7f0000000300)=""/28, 0x1c) getdents(r0, &(0x7f0000000040)=""/97, 0x61) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x3}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r2, &(0x7f0000000300)=""/28, 0x1c) getdents(r2, &(0x7f0000000040)=""/97, 0x61) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000000)={0x36, 0x2b, 0x8, 0x1b, 0x5, 0x3, 0x8000006, 0xf0}) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 322.564511][T26207] loop3: detected capacity change from 0 to 6 [ 322.584440][T26207] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 322.600555][T26207] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 322.618579][T26237] FAULT_INJECTION: forcing a failure. [ 322.618579][T26237] name failslab, interval 1, probability 0, space 0, times 0 [ 322.631206][T26237] CPU: 0 PID: 26237 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 322.640046][T26237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.650101][T26237] Call Trace: [ 322.653378][T26237] dump_stack_lvl+0xd6/0x122 [ 322.657969][T26237] dump_stack+0x11/0x1b [ 322.662166][T26237] should_fail+0x23c/0x250 04:59:59 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x8004000000000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 322.666624][T26237] __should_failslab+0x81/0x90 [ 322.671427][T26237] should_failslab+0x5/0x20 [ 322.675935][T26237] kmem_cache_alloc_node+0x61/0x2c0 [ 322.681193][T26237] ? __alloc_skb+0xed/0x420 [ 322.685727][T26237] __alloc_skb+0xed/0x420 [ 322.690086][T26237] alloc_uevent_skb+0x5b/0x120 [ 322.694931][T26237] kobject_uevent_env+0x863/0xc40 [ 322.699995][T26237] disk_force_media_change+0xe3/0x170 [ 322.705384][T26237] loop_configure+0x6c0/0xeb0 [ 322.710160][T26237] lo_ioctl+0x618/0x13e0 [ 322.714450][T26237] ? path_openat+0x18d4/0x1ec0 [ 322.719245][T26237] ? blkdev_common_ioctl+0x438/0x1110 [ 322.724623][T26237] ? selinux_file_ioctl+0x981/0xa10 [ 322.729818][T26237] ? lo_release+0x120/0x120 [ 322.734334][T26237] blkdev_ioctl+0x1d0/0x3f0 [ 322.738837][T26237] block_ioctl+0x6e/0x80 [ 322.743069][T26237] ? blkdev_iopoll+0x80/0x80 [ 322.747692][T26237] __se_sys_ioctl+0xcb/0x140 [ 322.752274][T26237] __x64_sys_ioctl+0x3f/0x50 [ 322.756863][T26237] do_syscall_64+0x44/0xa0 [ 322.761329][T26237] entry_SYSCALL_64_after_hwframe+0x44/0xae 04:59:59 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 322.767270][T26237] RIP: 0033:0x7f74516f6697 [ 322.771676][T26237] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 322.791285][T26237] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 322.799705][T26237] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516f6697 [ 322.807670][T26237] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 04:59:59 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x74000000, &(0x7f00000004c0), 0x0, 0x0) 04:59:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xd00, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 322.815638][T26237] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 322.823627][T26237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 322.831628][T26237] R13: 0000000000000004 R14: 0000000020001588 R15: 0000000000000003 [ 322.854845][T26237] loop2: detected capacity change from 0 to 264192 [ 322.861873][T26247] loop5: detected capacity change from 0 to 264192 04:59:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0xffff}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 04:59:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 24) [ 322.943226][T26268] loop3: detected capacity change from 0 to 6 [ 322.954446][T26268] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 322.980815][T26268] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 323.000924][T26279] loop5: detected capacity change from 0 to 255 [ 323.013550][T26268] loop3: detected capacity change from 0 to 6 [ 323.022181][T26268] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 323.040106][T26282] FAULT_INJECTION: forcing a failure. [ 323.040106][T26282] name failslab, interval 1, probability 0, space 0, times 0 [ 323.052770][T26282] CPU: 1 PID: 26282 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 323.061531][T26282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.071584][T26282] Call Trace: [ 323.074863][T26282] dump_stack_lvl+0xd6/0x122 [ 323.079444][T26282] dump_stack+0x11/0x1b [ 323.083611][T26282] should_fail+0x23c/0x250 [ 323.088036][T26282] __should_failslab+0x81/0x90 [ 323.092787][T26282] should_failslab+0x5/0x20 [ 323.097278][T26282] kmem_cache_alloc_node_trace+0x61/0x2e0 [ 323.103029][T26282] ? __kmalloc_node_track_caller+0x30/0x40 [ 323.108827][T26282] __kmalloc_node_track_caller+0x30/0x40 [ 323.114463][T26282] ? alloc_uevent_skb+0x5b/0x120 [ 323.119395][T26282] __alloc_skb+0x187/0x420 [ 323.123800][T26282] alloc_uevent_skb+0x5b/0x120 [ 323.128567][T26282] kobject_uevent_env+0x863/0xc40 [ 323.133665][T26282] disk_force_media_change+0xe3/0x170 [ 323.139055][T26282] loop_configure+0x6c0/0xeb0 [ 323.143725][T26282] lo_ioctl+0x618/0x13e0 [ 323.147974][T26282] ? path_openat+0x18d4/0x1ec0 [ 323.152733][T26282] ? blkdev_common_ioctl+0x438/0x1110 [ 323.158124][T26282] ? selinux_file_ioctl+0x981/0xa10 [ 323.163493][T26282] ? lo_release+0x120/0x120 [ 323.167997][T26282] blkdev_ioctl+0x1d0/0x3f0 [ 323.172506][T26282] block_ioctl+0x6e/0x80 [ 323.176749][T26282] ? blkdev_iopoll+0x80/0x80 [ 323.181336][T26282] __se_sys_ioctl+0xcb/0x140 [ 323.185934][T26282] __x64_sys_ioctl+0x3f/0x50 [ 323.190533][T26282] do_syscall_64+0x44/0xa0 [ 323.194996][T26282] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 323.200929][T26282] RIP: 0033:0x7f74516f6697 [ 323.205334][T26282] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 323.225029][T26282] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 323.233445][T26282] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516f6697 [ 323.241509][T26282] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 323.249480][T26282] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 323.257524][T26282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 323.265497][T26282] R13: 0000000000000004 R14: 0000000020001588 R15: 0000000000000003 [ 323.292589][T26268] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:59:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xe00, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:00 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf6ffffff00000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 323.649939][T26279] loop5: detected capacity change from 0 to 255 [ 323.656293][T26282] loop2: detected capacity change from 0 to 264192 05:00:00 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) (fail_nth: 25) 05:00:00 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7a000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:00 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x141) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) getdents64(r1, &(0x7f0000000300)=""/28, 0x1c) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000500)={0x0, 0x0, "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", "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"}) getdents(r1, &(0x7f0000000040)=""/97, 0x61) dup(r1) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000140)=""/222) r2 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d6c2b7921785f5db2e2d8", 0x15, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000240)='.\x00', &(0x7f0000000280), 0x12030, &(0x7f0000000340)={'trans=tcp,', {'port', 0x3d, 0x100000000004e23}, 0x2c, {[{@loose}]}}) openat(r2, &(0x7f0000000000)='./file0\x00', 0x84400, 0x21) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x101000, 0x0) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f00000003c0)=0x54000000) [ 323.709289][T26306] loop3: detected capacity change from 0 to 7 [ 323.746076][T26306] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 323.785588][T26306] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 323.803578][T26323] FAULT_INJECTION: forcing a failure. [ 323.803578][T26323] name failslab, interval 1, probability 0, space 0, times 0 [ 323.816262][T26323] CPU: 0 PID: 26323 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 323.825032][T26323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.835222][T26323] Call Trace: [ 323.838523][T26323] dump_stack_lvl+0xd6/0x122 [ 323.843142][T26323] dump_stack+0x11/0x1b [ 323.847308][T26323] should_fail+0x23c/0x250 [ 323.851722][T26323] ? skb_clone+0x12c/0x1f0 [ 323.856258][T26323] __should_failslab+0x81/0x90 [ 323.861031][T26323] should_failslab+0x5/0x20 [ 323.865546][T26323] kmem_cache_alloc+0x4f/0x300 [ 323.870342][T26323] skb_clone+0x12c/0x1f0 [ 323.874688][T26323] netlink_broadcast_filtered+0x4fd/0xb60 [ 323.880483][T26323] ? skb_put+0xb9/0xf0 [ 323.884602][T26323] netlink_broadcast+0x35/0x50 [ 323.889414][T26323] kobject_uevent_env+0x8c9/0xc40 [ 323.894447][T26323] disk_force_media_change+0xe3/0x170 [ 323.899904][T26323] loop_configure+0x6c0/0xeb0 [ 323.904580][T26323] lo_ioctl+0x618/0x13e0 [ 323.908811][T26323] ? path_openat+0x18d4/0x1ec0 [ 323.913583][T26323] ? blkdev_common_ioctl+0x438/0x1110 [ 323.918955][T26323] ? selinux_file_ioctl+0x981/0xa10 [ 323.924151][T26323] ? lo_release+0x120/0x120 [ 323.928644][T26323] blkdev_ioctl+0x1d0/0x3f0 [ 323.933136][T26323] block_ioctl+0x6e/0x80 [ 323.937378][T26323] ? blkdev_iopoll+0x80/0x80 [ 323.941960][T26323] __se_sys_ioctl+0xcb/0x140 [ 323.946600][T26323] __x64_sys_ioctl+0x3f/0x50 [ 323.951184][T26323] do_syscall_64+0x44/0xa0 [ 323.955688][T26323] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 323.961615][T26323] RIP: 0033:0x7f74516f6697 [ 323.966048][T26323] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 94 53 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 323.985692][T26323] RSP: 002b:00007f744f46df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 323.994109][T26323] RAX: ffffffffffffffda RBX: 00007f7451740cc0 RCX: 00007f74516f6697 [ 324.002077][T26323] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 324.010137][T26323] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 324.018115][T26323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 324.026172][T26323] R13: 0000000000000004 R14: 0000000020001588 R15: 0000000000000003 [ 324.034309][T26328] loop5: detected capacity change from 0 to 264192 [ 324.043296][T26306] loop3: detected capacity change from 0 to 7 [ 324.057610][T26306] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) pwrite64(r1, &(0x7f00000002c0)='_', 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r5, @ANYBLOB="14002c80080000009909"], 0x30}}, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="c5840c85b206aa89acf500a0b872bb73461693bdb1c0584781d288631780066a1035d31a07f4cd6356096ab522550cdd270b894170dff99bb572d4425e21e013fc470116b735f71ff387c78cda9fffada7a71820463b4e2e85e6e3d02c8d733b28d26b370ccccdf1ad5da77a4a55e59e41873a41b276aa6c3746e96118c22f4568fcb536a50d39da1a0f606e501bb2e4da644d4c4175aeb1ebab0da1dd29463769b19c42b212581c94a7f60ee3bfd55bf22bbc91d992f690e3cf", @ANYRES16=r4, @ANYBLOB="000628bd7000fedbdf25060000000c00990061000000380000000800050008000000"], 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x10) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) write$cgroup_int(r6, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r6, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000480)=ANY=[@ANYBLOB="0400000000000000000200000000000005"]) [ 324.094476][T26306] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xf00, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 324.186166][T26348] loop3: detected capacity change from 0 to 7 [ 324.223999][T26348] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 324.244751][T26348] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 324.321208][T26348] loop3: detected capacity change from 0 to 7 [ 324.338282][T26348] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 324.372926][T26348] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x1020, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:01 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfeffffff00000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:01 executing program 5: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000001240), 0x0, 0x5129db04, 0x0, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000080)={0x4000000c}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x1}) [ 324.488561][T26365] loop3: detected capacity change from 0 to 8 [ 324.523628][T26365] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 324.548519][T26365] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:01 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 324.607093][T26323] loop2: detected capacity change from 0 to 264192 [ 324.618526][T26365] loop3: detected capacity change from 0 to 8 05:00:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:01 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7f000000, &(0x7f00000004c0), 0x0, 0x0) [ 324.652359][T26365] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 324.681184][T26365] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x1100, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 324.775435][T26397] loop3: detected capacity change from 0 to 8 [ 324.806585][T26401] loop2: detected capacity change from 0 to 264192 [ 324.817646][T26397] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 324.845945][T26397] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 324.920653][T26397] loop3: detected capacity change from 0 to 8 [ 324.928269][T26397] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 324.958771][T26415] loop2: detected capacity change from 0 to 264192 [ 324.966633][T26397] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x1200, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 325.081569][T26423] loop3: detected capacity change from 0 to 9 [ 325.118691][T26423] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 325.125807][T26428] loop2: detected capacity change from 0 to 264192 [ 325.147457][T26423] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x4, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 325.208911][T26423] loop3: detected capacity change from 0 to 9 [ 325.222997][T26423] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 325.260240][T26423] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 325.263896][T26444] loop2: detected capacity change from 0 to 264192 05:00:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x2000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x5, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:01 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfeffffffffffffff, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 325.370879][T26454] loop3: detected capacity change from 0 to 16 [ 325.387141][T26454] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 325.417957][T26461] loop2: detected capacity change from 0 to 264192 [ 325.426790][T26454] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 325.489476][T26454] loop3: detected capacity change from 0 to 16 [ 325.498037][T26454] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 325.521949][T26454] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:02 executing program 5: set_mempolicy(0x1, &(0x7f0000000000)=0xb, 0x7fff) r0 = syz_io_uring_setup(0x3881, &(0x7f00000002c0), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000080), &(0x7f0000000340)) fcntl$lock(r0, 0x26, &(0x7f0000000040)={0x0, 0x3}) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r0, 0x0) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r5, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff33}}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000100)=@IORING_OP_WRITE_FIXED={0x5, 0x2, 0x2007, @fd=r0, 0x0, 0x8000, 0x7fff, 0x0, 0x0, {0x1}}, 0x1f) set_mempolicy(0x4000, &(0x7f00000000c0)=0x6, 0x80000001) recvfrom$unix(r4, &(0x7f0000000380)=""/207, 0xcf, 0x12040, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) r6 = socket$inet6_icmp(0xa, 0x2, 0x3a) msync(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2) dup2(r6, r0) 05:00:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:02 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x80040000, &(0x7f00000004c0), 0x0, 0x0) 05:00:02 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6040000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x2010, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 325.595068][T26484] loop2: detected capacity change from 0 to 264192 [ 325.634450][T26494] loop3: detected capacity change from 0 to 16 05:00:02 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x0, 0x0, 0x2, 0x8, 0x0, 0xbec, 0x20, 0x5, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000440)}, 0x8124, 0x40, 0x800, 0x4, 0x0, 0x4, 0x3, 0x0, 0x3, 0x0, 0x7}, 0x0, 0x9, r5, 0x11244aff860102b8) timerfd_create(0x0, 0x0) 05:00:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x7, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 325.693566][T26494] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 325.715543][T26494] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 325.739426][ C1] sd 0:0:1:0: tag#2204 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 325.749302][ C1] sd 0:0:1:0: tag#2204 CDB: opcode=0xe5 (vendor) [ 325.755662][ C1] sd 0:0:1:0: tag#2204 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 325.764731][ C1] sd 0:0:1:0: tag#2204 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 325.773770][ C1] sd 0:0:1:0: tag#2204 CDB[20]: ba [ 325.789416][ T22] kauditd_printk_skb: 47 callbacks suppressed [ 325.789426][ T22] audit: type=1326 audit(1633064402.320:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26508 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 325.848748][T26510] loop2: detected capacity change from 0 to 264192 [ 325.862940][T26494] loop3: detected capacity change from 0 to 16 [ 325.871214][T26494] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x2200, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 325.910068][T26494] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 325.982272][T26521] loop2: detected capacity change from 0 to 264192 05:00:02 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x0, 0x0, 0x2, 0x8, 0x0, 0xbec, 0x20, 0x5, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000440)}, 0x8124, 0x40, 0x800, 0x4, 0x0, 0x4, 0x3, 0x0, 0x3, 0x0, 0x7}, 0x0, 0x9, r5, 0x11244aff860102b8) timerfd_create(0x0, 0x0) [ 326.036226][T26530] loop3: detected capacity change from 0 to 17 [ 326.059577][T26537] loop2: detected capacity change from 0 to 264192 [ 326.075579][T26530] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 326.107667][ C1] sd 0:0:1:0: tag#2213 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 326.117537][ C1] sd 0:0:1:0: tag#2213 CDB: opcode=0xe5 (vendor) [ 326.123890][ C1] sd 0:0:1:0: tag#2213 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 326.132926][ C1] sd 0:0:1:0: tag#2213 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 326.142067][ C1] sd 0:0:1:0: tag#2213 CDB[20]: ba [ 326.160347][ T22] audit: type=1326 audit(1633064402.690:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26534 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 326.209404][T26530] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 326.244459][T26530] loop3: detected capacity change from 0 to 17 [ 326.250809][T26530] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:02 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff7f00000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xa, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 326.295960][T26530] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x2500, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 326.339982][T26559] loop2: detected capacity change from 0 to 264192 05:00:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x85ffffff, &(0x7f00000004c0), 0x0, 0x0) [ 326.411812][T26570] loop3: detected capacity change from 0 to 18 [ 326.443996][T26570] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:03 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xb, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 326.467375][T26570] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 326.503727][T26583] loop2: detected capacity change from 0 to 264192 [ 326.522845][T26570] loop3: detected capacity change from 0 to 18 [ 326.534412][T26570] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 326.556559][T26583] loop2: detected capacity change from 0 to 264192 [ 326.563890][T26570] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x3f00, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xc, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 326.660648][T26607] loop3: detected capacity change from 0 to 31 [ 326.681275][T26610] loop2: detected capacity change from 0 to 264192 [ 326.693652][T26607] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xd, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 326.733807][T26607] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 326.799959][T26618] loop2: detected capacity change from 0 to 264192 [ 326.808258][T26607] loop3: detected capacity change from 0 to 31 [ 326.816025][T26607] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xe, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 326.841076][T26607] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x4000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:03 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x0, 0x0, 0x2, 0x8, 0x0, 0xbec, 0x20, 0x5, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000440)}, 0x8124, 0x40, 0x800, 0x4, 0x0, 0x4, 0x3, 0x0, 0x3, 0x0, 0x7}, 0x0, 0x9, r5, 0x11244aff860102b8) timerfd_create(0x0, 0x0) [ 326.958196][T26635] loop2: detected capacity change from 0 to 264192 [ 326.969334][T26638] loop3: detected capacity change from 0 to 32 [ 326.980367][T26638] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 327.000147][T26638] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 327.015146][ C0] sd 0:0:1:0: tag#2223 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 327.024987][ C0] sd 0:0:1:0: tag#2223 CDB: opcode=0xe5 (vendor) [ 327.031316][ C0] sd 0:0:1:0: tag#2223 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 327.040352][ C0] sd 0:0:1:0: tag#2223 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 327.049382][ C0] sd 0:0:1:0: tag#2223 CDB[20]: ba [ 327.063943][ T22] audit: type=1326 audit(1633064403.600:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26646 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 327.108865][T26635] loop2: detected capacity change from 0 to 264192 [ 327.115849][T26638] loop3: detected capacity change from 0 to 32 [ 327.125076][T26638] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:03 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffffff00000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:03 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x0, 0x0, 0x2, 0x8, 0x0, 0xbec, 0x20, 0x5, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000440)}, 0x8124, 0x40, 0x800, 0x4, 0x0, 0x4, 0x3, 0x0, 0x3, 0x0, 0x7}, 0x0, 0x9, r5, 0x11244aff860102b8) timerfd_create(0x0, 0x0) 05:00:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xf, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 327.152902][T26638] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 327.241050][T26667] loop2: detected capacity change from 0 to 264192 [ 327.258082][ C0] sd 0:0:1:0: tag#2196 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 327.267944][ C0] sd 0:0:1:0: tag#2196 CDB: opcode=0xe5 (vendor) [ 327.274303][ C0] sd 0:0:1:0: tag#2196 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 05:00:03 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x97ffffff, &(0x7f00000004c0), 0x0, 0x0) [ 327.283349][ C0] sd 0:0:1:0: tag#2196 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 327.292583][ C0] sd 0:0:1:0: tag#2196 CDB[20]: ba [ 327.311385][ T22] audit: type=1326 audit(1633064403.840:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26664 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x4800, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x10, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:03 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x8000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 327.397920][T26686] loop3: detected capacity change from 0 to 36 [ 327.418908][T26686] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 327.440446][T26690] loop2: detected capacity change from 0 to 264192 [ 327.449283][T26686] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 327.515501][T26686] loop3: detected capacity change from 0 to 36 [ 327.525206][T26686] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x11, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 327.561659][T26686] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 327.601776][T26705] loop2: detected capacity change from 0 to 264192 05:00:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x4c00, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x12, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 327.680515][T26714] loop3: detected capacity change from 0 to 38 [ 327.708373][T26714] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 327.728881][T26714] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 327.755553][T26721] loop2: detected capacity change from 0 to 264192 [ 327.763075][T26714] loop3: detected capacity change from 0 to 38 [ 327.772850][T26714] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x13, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 327.807444][T26714] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x6000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 327.922694][T26738] loop2: detected capacity change from 0 to 264192 [ 327.938658][T26743] loop3: detected capacity change from 0 to 48 [ 327.977105][T26743] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 328.016115][T26743] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:04 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x14, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:04 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x0, 0x0, 0x2, 0x8, 0x0, 0xbec, 0x20, 0x5, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000440)}, 0x8124, 0x40, 0x800, 0x4, 0x0, 0x4, 0x3, 0x0, 0x3, 0x0, 0x7}, 0x0, 0x9, r5, 0x11244aff860102b8) [ 328.090738][T26743] loop3: detected capacity change from 0 to 48 [ 328.100997][T26743] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 328.126843][T26743] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 328.170701][ C0] sd 0:0:1:0: tag#2177 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 328.180578][ C0] sd 0:0:1:0: tag#2177 CDB: opcode=0xe5 (vendor) [ 328.186926][ C0] sd 0:0:1:0: tag#2177 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 328.187496][T26765] loop2: detected capacity change from 0 to 264192 [ 328.195984][ C0] sd 0:0:1:0: tag#2177 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 328.196004][ C0] sd 0:0:1:0: tag#2177 CDB[20]: ba 05:00:04 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x9cb23cf4, &(0x7f00000004c0), 0x0, 0x0) 05:00:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x6800, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 328.229963][ T22] audit: type=1326 audit(1633064404.760:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26774 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:04 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x9000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:04 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x0, 0x0, 0x2, 0x8, 0x0, 0xbec, 0x20, 0x5, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000440)}, 0x8124, 0x40, 0x800, 0x4, 0x0, 0x4, 0x3, 0x0, 0x3, 0x0, 0x7}, 0x0, 0x9, r5, 0x11244aff860102b8) 05:00:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x15, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 328.299032][T26783] loop3: detected capacity change from 0 to 52 [ 328.329085][T26783] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 328.350028][T26783] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 328.365405][ C0] sd 0:0:1:0: tag#2218 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 328.375254][ C0] sd 0:0:1:0: tag#2218 CDB: opcode=0xe5 (vendor) [ 328.381602][ C0] sd 0:0:1:0: tag#2218 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 328.390619][ C0] sd 0:0:1:0: tag#2218 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 05:00:04 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x0, 0x0, 0x2, 0x8, 0x0, 0xbec, 0x20, 0x5, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000440)}, 0x8124, 0x40, 0x800, 0x4, 0x0, 0x4, 0x3, 0x0, 0x3, 0x0, 0x7}, 0x0, 0x9, r5, 0x11244aff860102b8) [ 328.399656][ C0] sd 0:0:1:0: tag#2218 CDB[20]: ba [ 328.417654][ T22] audit: type=1326 audit(1633064404.950:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26789 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=231 compat=0 ip=0x7efc94e228d9 code=0x0 [ 328.486763][ C0] sd 0:0:1:0: tag#2198 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 328.496612][ C0] sd 0:0:1:0: tag#2198 CDB: opcode=0xe5 (vendor) [ 328.502951][ C0] sd 0:0:1:0: tag#2198 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 328.511981][ C0] sd 0:0:1:0: tag#2198 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 328.521000][ C0] sd 0:0:1:0: tag#2198 CDB[20]: ba [ 328.547351][T26783] loop3: detected capacity change from 0 to 52 [ 328.568757][T26783] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:05 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 328.590794][ T22] audit: type=1326 audit(1633064405.120:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26810 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 328.608654][T26812] loop2: detected capacity change from 0 to 264192 [ 328.629329][T26783] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 328.669290][ C0] sd 0:0:1:0: tag#2196 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 328.679152][ C0] sd 0:0:1:0: tag#2196 CDB: opcode=0xe5 (vendor) [ 328.685508][ C0] sd 0:0:1:0: tag#2196 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 328.694538][ C0] sd 0:0:1:0: tag#2196 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 328.703574][ C0] sd 0:0:1:0: tag#2196 CDB[20]: ba 05:00:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x6c00, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 328.720366][ T22] audit: type=1326 audit(1633064405.250:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26819 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 328.789292][T26812] loop2: detected capacity change from 0 to 264192 05:00:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x16, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 328.845878][T26830] loop3: detected capacity change from 0 to 54 [ 328.903106][T26830] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 328.904122][T26837] loop2: detected capacity change from 0 to 264192 [ 328.949217][T26830] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:05 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:05 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) timerfd_create(0x0, 0x0) 05:00:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x17, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 329.022078][T26830] loop3: detected capacity change from 0 to 54 [ 329.043983][T26830] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 329.087292][T26830] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 329.092698][T26855] loop2: detected capacity change from 0 to 264192 [ 329.100941][ C0] sd 0:0:1:0: tag#2198 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 329.110782][ C0] sd 0:0:1:0: tag#2198 CDB: opcode=0xe5 (vendor) [ 329.117127][ C0] sd 0:0:1:0: tag#2198 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 329.126594][ C0] sd 0:0:1:0: tag#2198 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 05:00:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xf43cb29c, &(0x7f00000004c0), 0x0, 0x0) 05:00:05 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) timerfd_create(0x0, 0x0) [ 329.135744][ C0] sd 0:0:1:0: tag#2198 CDB[20]: ba 05:00:05 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) [ 329.201234][ C1] sd 0:0:1:0: tag#2178 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 329.211097][ C1] sd 0:0:1:0: tag#2178 CDB: opcode=0xe5 (vendor) [ 329.217467][ C1] sd 0:0:1:0: tag#2178 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 329.226509][ C1] sd 0:0:1:0: tag#2178 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 329.235558][ C1] sd 0:0:1:0: tag#2178 CDB[20]: ba 05:00:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x7400, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:05 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) timerfd_create(0x0, 0x0) [ 329.263018][T26855] loop2: detected capacity change from 0 to 264192 05:00:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x18, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:05 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 329.349266][T26884] loop3: detected capacity change from 0 to 58 [ 329.384022][T26890] loop2: detected capacity change from 0 to 264192 [ 329.407762][T26884] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 329.427882][ T22] audit: type=1326 audit(1633064405.960:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26894 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=231 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:06 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 329.455584][T26884] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 329.515140][T26890] loop2: detected capacity change from 0 to 264192 [ 329.533681][ T22] audit: type=1326 audit(1633064406.070:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26900 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x19, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 329.604384][T26884] loop3: detected capacity change from 0 to 58 [ 329.639055][T26884] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 329.667947][T26917] loop2: detected capacity change from 0 to 264192 [ 329.686640][T26884] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1a, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:06 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x2, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x7a00, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 329.980954][T26931] loop3: detected capacity change from 0 to 61 [ 329.992549][T26934] loop2: detected capacity change from 0 to 264192 [ 330.009437][T26931] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:06 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f00000004c0), 0x0, 0x0) 05:00:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1b, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 330.041621][T26931] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 330.117966][T26931] loop3: detected capacity change from 0 to 61 [ 330.128715][T26931] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 330.156613][T26955] loop2: detected capacity change from 0 to 264192 05:00:06 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:06 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x3, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xedc0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1c, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 330.163482][T26931] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:06 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x4, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 330.243582][T26972] loop3: detected capacity change from 0 to 118 [ 330.258336][T26974] loop2: detected capacity change from 0 to 264192 [ 330.268247][T26972] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 330.292731][T26972] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:06 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:06 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x5, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1d, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 330.363387][T26972] loop3: detected capacity change from 0 to 118 [ 330.375335][T26972] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:06 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x6, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xf003, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 330.416076][T26972] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 330.437586][T26995] loop2: detected capacity change from 0 to 264192 [ 330.524067][T27009] loop3: detected capacity change from 0 to 120 [ 330.548377][T27009] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 330.572683][T27009] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 330.608991][T27009] loop3: detected capacity change from 0 to 120 [ 330.617776][T27009] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 330.645785][T27009] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfdfdffff, &(0x7f00000004c0), 0x0, 0x0) 05:00:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1e, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 330.973257][T27029] loop2: detected capacity change from 0 to 264192 05:00:07 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xc000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:07 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x7, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xf103, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x21, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:07 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x8, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 331.106052][T27048] loop2: detected capacity change from 0 to 264192 [ 331.110358][T27044] loop3: detected capacity change from 0 to 120 [ 331.150262][T27044] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 331.179379][T27044] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 331.194610][T27048] loop2: detected capacity change from 0 to 264192 05:00:07 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:07 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x18, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x22, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 331.244633][T27044] loop3: detected capacity change from 0 to 120 [ 331.271630][T27044] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 331.301651][T27044] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 331.316388][ C0] scsi_io_completion_action: 4 callbacks suppressed [ 331.316412][ C0] sd 0:0:1:0: tag#2217 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 331.332856][ C0] sd 0:0:1:0: tag#2217 CDB: opcode=0xe5 (vendor) [ 331.333229][T27080] loop2: detected capacity change from 0 to 264192 [ 331.339184][ C0] sd 0:0:1:0: tag#2217 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 331.339205][ C0] sd 0:0:1:0: tag#2217 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 331.363812][ C0] sd 0:0:1:0: tag#2217 CDB[20]: ba [ 331.386862][ T22] kauditd_printk_skb: 1 callbacks suppressed 05:00:07 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x26, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x23, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 331.386873][ T22] audit: type=1326 audit(1633064407.920:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27072 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 331.495806][T27096] loop2: detected capacity change from 0 to 264192 05:00:08 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfdffffff, &(0x7f00000004c0), 0x0, 0x0) 05:00:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xff0f, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 331.851562][T27104] loop3: detected capacity change from 0 to 127 [ 331.884529][T27104] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:08 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xd000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:08 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0xfe, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x24, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 331.903680][T27104] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 331.972928][T27104] loop3: detected capacity change from 0 to 127 [ 331.986589][T27118] loop2: detected capacity change from 0 to 264192 [ 331.994460][T27104] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:08 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x204, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 332.028588][T27104] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x25, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:08 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:08 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x300, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x20000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x26, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 332.110856][T27141] loop2: detected capacity change from 0 to 264192 [ 332.177343][T27150] loop3: detected capacity change from 0 to 256 [ 332.191852][ C0] sd 0:0:1:0: tag#2205 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 332.201703][ C0] sd 0:0:1:0: tag#2205 CDB: opcode=0xe5 (vendor) [ 332.208035][ C0] sd 0:0:1:0: tag#2205 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 332.217078][ C0] sd 0:0:1:0: tag#2205 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 05:00:08 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x402, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 332.226145][ C0] sd 0:0:1:0: tag#2205 CDB[20]: ba [ 332.235833][T27150] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 332.250055][T27150] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 332.266545][ T22] audit: type=1326 audit(1633064408.800:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27148 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 332.292523][T27150] loop3: detected capacity change from 0 to 256 [ 332.299397][T27150] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 332.309063][T27150] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 332.316820][T27161] loop2: detected capacity change from 0 to 264192 05:00:09 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfeffffff, &(0x7f00000004c0), 0x0, 0x0) 05:00:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x400000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 332.753238][T27184] loop3: detected capacity change from 0 to 8192 [ 332.778999][T27184] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 332.796948][T27184] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:09 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xe000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x27, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:09 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x406, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 332.844919][T27184] loop3: detected capacity change from 0 to 8192 [ 332.857569][T27184] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 332.864302][T27199] loop2: detected capacity change from 0 to 264192 [ 332.888218][T27184] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:09 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x480, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x28, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:09 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:09 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x500, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 333.012039][T27217] loop2: detected capacity change from 0 to 264192 05:00:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x29, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:09 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x530, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 333.083688][T27226] loop3: detected capacity change from 0 to 32768 [ 333.094043][ C1] sd 0:0:1:0: tag#2194 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 333.103920][ C1] sd 0:0:1:0: tag#2194 CDB: opcode=0xe5 (vendor) [ 333.110259][ C1] sd 0:0:1:0: tag#2194 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 333.119304][ C1] sd 0:0:1:0: tag#2194 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 333.128450][ C1] sd 0:0:1:0: tag#2194 CDB[20]: ba [ 333.140086][ T22] audit: type=1326 audit(1633064409.670:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 333.188549][T27226] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 333.208503][T27239] loop2: detected capacity change from 0 to 264192 [ 333.225044][T27226] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 333.299650][T27226] loop3: detected capacity change from 0 to 32768 [ 333.309902][T27226] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 333.337933][T27226] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:10 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xff600000, &(0x7f00000004c0), 0x0, 0x0) 05:00:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2a, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 333.641072][T27260] loop2: detected capacity change from 0 to 264192 05:00:10 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:10 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x600, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2b, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:10 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x604, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 333.766311][T27277] loop2: detected capacity change from 0 to 264192 [ 333.767788][T27280] loop3: detected capacity change from 0 to 65536 [ 333.793790][T27280] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 333.821242][T27280] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2c, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:10 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x700, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:10 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 333.865841][T27280] loop3: detected capacity change from 0 to 65536 [ 333.875531][T27280] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 333.902161][T27280] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x2040000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 333.955010][T27300] loop2: detected capacity change from 0 to 264192 05:00:10 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x1800, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 333.998721][ C1] sd 0:0:1:0: tag#2192 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 334.008603][ C1] sd 0:0:1:0: tag#2192 CDB: opcode=0xe5 (vendor) [ 334.014970][ C1] sd 0:0:1:0: tag#2192 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 334.017351][T27311] loop3: detected capacity change from 0 to 66048 [ 334.024005][ C1] sd 0:0:1:0: tag#2192 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 334.039442][ C1] sd 0:0:1:0: tag#2192 CDB[20]: ba [ 334.071767][ T22] audit: type=1326 audit(1633064410.610:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27301 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 334.133558][T27311] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 334.151855][T27311] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 334.202255][T27300] loop2: detected capacity change from 0 to 264192 [ 334.214209][T27311] loop3: detected capacity change from 0 to 66048 [ 334.232938][T27311] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 334.260052][T27311] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfffffdfd, &(0x7f00000004c0), 0x0, 0x0) 05:00:11 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x2000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:11 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x10000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2d, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x3000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:11 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x2600, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:11 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x3005, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2e, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 334.672567][T27355] loop3: detected capacity change from 0 to 98304 [ 334.679543][T27359] loop2: detected capacity change from 0 to 264192 [ 334.721559][T27355] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:11 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x3f00, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 334.766253][T27355] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 334.791672][T27369] loop2: detected capacity change from 0 to 264192 05:00:11 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2f, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 334.819496][T27355] loop3: detected capacity change from 0 to 98304 [ 334.855800][T27355] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:11 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x8004, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 334.902501][T27355] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 334.910894][T27389] loop2: detected capacity change from 0 to 264192 [ 334.922113][ C0] sd 0:0:1:0: tag#2198 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 334.931960][ C0] sd 0:0:1:0: tag#2198 CDB: opcode=0xe5 (vendor) [ 334.938290][ C0] sd 0:0:1:0: tag#2198 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 334.947330][ C0] sd 0:0:1:0: tag#2198 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 334.956359][ C0] sd 0:0:1:0: tag#2198 CDB[20]: ba [ 334.987700][ T22] audit: type=1326 audit(1633064411.520:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27386 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:11 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xffffff7f, &(0x7f00000004c0), 0x0, 0x0) 05:00:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x30, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 335.408099][T27407] loop2: detected capacity change from 0 to 264192 05:00:12 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x11000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:12 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0xfeff, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x4000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x31, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:12 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0xfffe, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x32, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 335.583002][T27424] loop3: detected capacity change from 0 to 131072 [ 335.586291][T27422] loop2: detected capacity change from 0 to 264192 [ 335.616308][T27424] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:12 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x80000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 335.665051][T27424] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x5000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:12 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 335.716144][T27436] loop2: detected capacity change from 0 to 264192 05:00:12 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x80040, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 335.812967][T27450] loop3: detected capacity change from 0 to 163840 [ 335.825858][ C1] sd 0:0:1:0: tag#2233 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 335.835738][ C1] sd 0:0:1:0: tag#2233 CDB: opcode=0xe5 (vendor) [ 335.842111][ C1] sd 0:0:1:0: tag#2233 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 335.851157][ C1] sd 0:0:1:0: tag#2233 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 335.860178][ C1] sd 0:0:1:0: tag#2233 CDB[20]: ba [ 335.875189][ T22] audit: type=1326 audit(1633064412.410:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27448 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 335.904694][T27450] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 335.920105][T27450] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 335.969126][T27450] loop3: detected capacity change from 0 to 163840 [ 335.977032][T27450] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 336.009664][T27450] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:12 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xffffff85, &(0x7f00000004c0), 0x0, 0x0) 05:00:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x33, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 336.311323][T27475] loop2: detected capacity change from 0 to 264192 05:00:12 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x12000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:12 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x200000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x6000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x34, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x35, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 336.478237][T27488] loop3: detected capacity change from 0 to 196608 [ 336.485978][T27494] loop2: detected capacity change from 0 to 264192 [ 336.506527][T27488] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 336.517096][T27488] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x6040000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:13 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x1000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 336.592196][T27502] loop2: detected capacity change from 0 to 264192 [ 336.632083][T27513] loop3: detected capacity change from 0 to 197120 05:00:13 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:13 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x2000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 336.662265][T27502] loop2: detected capacity change from 0 to 264192 [ 336.717411][T27513] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 336.748148][ C1] sd 0:0:1:0: tag#2208 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 336.758052][ C1] sd 0:0:1:0: tag#2208 CDB: opcode=0xe5 (vendor) 05:00:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x36, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 336.764444][ C1] sd 0:0:1:0: tag#2208 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 336.773515][ C1] sd 0:0:1:0: tag#2208 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 336.773677][T27513] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 336.782606][ C1] sd 0:0:1:0: tag#2208 CDB[20]: ba [ 336.799210][ T22] audit: type=1326 audit(1633064413.330:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27530 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 336.877716][T27513] loop3: detected capacity change from 0 to 197120 [ 336.880091][T27537] loop2: detected capacity change from 0 to 264192 [ 336.892212][T27513] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 336.917668][T27513] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:13 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xffffff97, &(0x7f00000004c0), 0x0, 0x0) 05:00:13 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 337.172478][ C1] sd 0:0:1:0: tag#2176 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 337.182358][ C1] sd 0:0:1:0: tag#2176 CDB: opcode=0xe5 (vendor) [ 337.188674][ C1] sd 0:0:1:0: tag#2176 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 337.197713][ C1] sd 0:0:1:0: tag#2176 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 337.206768][ C1] sd 0:0:1:0: tag#2176 CDB[20]: ba [ 337.215558][ T22] audit: type=1326 audit(1633064413.750:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27553 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:13 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x20000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:13 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x2040000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x7000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x37, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:13 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x3000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 337.394888][T27568] loop3: detected capacity change from 0 to 229376 [ 337.395943][T27570] loop2: detected capacity change from 0 to 264192 [ 337.419033][T27568] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x38, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 337.452614][T27568] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x8000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:14 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x4000000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x39, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 337.554079][T27590] loop2: detected capacity change from 0 to 264192 [ 337.592616][T27593] loop3: detected capacity change from 0 to 262144 05:00:14 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x5000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 337.634679][T27593] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 337.669000][T27593] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 337.700618][T27604] loop2: detected capacity change from 0 to 264192 [ 337.737625][T27593] loop3: detected capacity change from 0 to 262144 [ 337.759604][T27593] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 337.800167][T27593] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:14 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfffffff6, &(0x7f00000004c0), 0x0, 0x0) 05:00:14 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x6000000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:14 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x20100000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x9000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3a, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:14 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x6040000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:14 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:14 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x7000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 338.286693][T27638] loop2: detected capacity change from 0 to 264192 [ 338.306664][T27641] loop3: detected capacity change from 0 to 264192 [ 338.314580][ C0] sd 0:0:1:0: tag#2207 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 338.324454][ C0] sd 0:0:1:0: tag#2207 CDB: opcode=0xe5 (vendor) 05:00:14 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 338.330793][ C0] sd 0:0:1:0: tag#2207 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 338.339864][ C0] sd 0:0:1:0: tag#2207 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 338.348904][ C0] sd 0:0:1:0: tag#2207 CDB[20]: ba [ 338.370390][ T22] audit: type=1326 audit(1633064414.900:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27650 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 338.397020][T27641] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:15 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x8000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 338.444692][ C1] sd 0:0:1:0: tag#2207 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 338.454016][T27641] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 338.454572][ C1] sd 0:0:1:0: tag#2207 CDB: opcode=0xe5 (vendor) [ 338.467325][ C1] sd 0:0:1:0: tag#2207 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 338.476385][ C1] sd 0:0:1:0: tag#2207 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 338.485438][ C1] sd 0:0:1:0: tag#2207 CDB[20]: ba 05:00:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3b, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 338.501120][T27638] loop2: detected capacity change from 0 to 264192 [ 338.514107][ T22] audit: type=1326 audit(1633064415.050:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27657 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 338.544210][T27641] loop3: detected capacity change from 0 to 264192 05:00:15 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x18000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 338.580904][T27641] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 338.608524][T27641] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 338.656336][T27677] loop2: detected capacity change from 0 to 264192 05:00:15 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfffffffd, &(0x7f00000004c0), 0x0, 0x0) 05:00:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xa000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 339.029741][T27693] loop3: detected capacity change from 0 to 264192 [ 339.054784][T27693] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 339.080123][T27693] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:15 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x22000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3c, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:15 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x26000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 339.160003][T27693] loop3: detected capacity change from 0 to 264192 [ 339.179136][T27693] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 339.204522][T27712] loop2: detected capacity change from 0 to 264192 05:00:15 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x30050000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:15 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 339.232168][T27693] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3d, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xb000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 339.382569][T27729] loop2: detected capacity change from 0 to 264192 [ 339.399062][ C1] sd 0:0:1:0: tag#2204 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 339.408969][ C1] sd 0:0:1:0: tag#2204 CDB: opcode=0xe5 (vendor) [ 339.415317][ C1] sd 0:0:1:0: tag#2204 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 05:00:15 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x3f000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 339.424361][ C1] sd 0:0:1:0: tag#2204 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 339.433415][ C1] sd 0:0:1:0: tag#2204 CDB[20]: ba [ 339.451956][ T22] audit: type=1326 audit(1633064415.990:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27722 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3e, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:16 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x40000800, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 339.504343][T27736] loop3: detected capacity change from 0 to 264192 [ 339.541505][T27736] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 339.594063][T27748] loop2: detected capacity change from 0 to 264192 [ 339.597403][T27736] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 339.676777][T27736] loop3: detected capacity change from 0 to 264192 [ 339.685780][T27736] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 339.708816][T27736] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:16 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfffffffe, &(0x7f00000004c0), 0x0, 0x0) 05:00:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xa5, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 339.910345][T27766] loop2: detected capacity change from 0 to 264192 05:00:16 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x25000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:16 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x80040000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xc000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfe, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 340.059138][T27782] loop3: detected capacity change from 0 to 264192 [ 340.067812][T27786] loop2: detected capacity change from 0 to 264192 [ 340.087344][T27782] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 340.115700][T27782] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 340.170052][T27782] loop3: detected capacity change from 0 to 264192 [ 340.184608][T27782] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:16 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0xf6ffffff, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:16 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x10e, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 340.215584][T27782] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xd000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 340.263485][ C0] sd 0:0:1:0: tag#2203 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 340.266956][T27810] loop2: detected capacity change from 0 to 264192 [ 340.273336][ C0] sd 0:0:1:0: tag#2203 CDB: opcode=0xe5 (vendor) [ 340.273356][ C0] sd 0:0:1:0: tag#2203 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 340.295526][ C0] sd 0:0:1:0: tag#2203 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 340.304580][ C0] sd 0:0:1:0: tag#2203 CDB[20]: ba 05:00:16 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:16 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0xfeffffff, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 340.333442][ T22] audit: type=1326 audit(1633064416.870:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27814 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 340.410437][ C0] sd 0:0:1:0: tag#2200 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 340.420292][ C0] sd 0:0:1:0: tag#2200 CDB: opcode=0xe5 (vendor) [ 340.426655][ C0] sd 0:0:1:0: tag#2200 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 340.435675][ C0] sd 0:0:1:0: tag#2200 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 340.444705][ C0] sd 0:0:1:0: tag#2200 CDB[20]: ba [ 340.459916][ T22] audit: type=1326 audit(1633064416.990:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27816 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 340.519232][T27829] loop3: detected capacity change from 0 to 264192 [ 340.560515][T27829] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 340.584921][T27829] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 340.640620][T27829] loop3: detected capacity change from 0 to 264192 [ 340.653058][T27829] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 340.691846][T27829] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x204, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 340.794286][T27848] loop2: detected capacity change from 0 to 264192 05:00:17 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3f000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:17 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0xffffff7f, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xe000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x300, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:17 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0xfffffff6, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 340.952057][T27864] loop2: detected capacity change from 0 to 264192 [ 340.966795][T27861] loop3: detected capacity change from 0 to 264192 05:00:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x35a, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 340.999867][T27861] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 341.029757][T27861] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xf000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:17 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0xfffffffe, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 341.062653][T27882] loop2: detected capacity change from 0 to 264192 [ 341.126188][T27891] loop3: detected capacity change from 0 to 264192 [ 341.136552][T27891] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 341.146944][T27891] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:17 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x402, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 341.244952][T27901] loop2: detected capacity change from 0 to 264192 [ 341.264277][ C1] sd 0:0:1:0: tag#2181 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 341.274171][ C1] sd 0:0:1:0: tag#2181 CDB: opcode=0xe5 (vendor) [ 341.280498][ C1] sd 0:0:1:0: tag#2181 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 341.289539][ C1] sd 0:0:1:0: tag#2181 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 341.299025][ C1] sd 0:0:1:0: tag#2181 CDB[20]: ba [ 341.324085][ T22] audit: type=1326 audit(1633064417.860:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27903 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x10000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 341.682262][T27919] loop3: detected capacity change from 0 to 264192 [ 341.706773][T27919] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 341.746039][T27919] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:18 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x40000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:18 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x80000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x406, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 341.801088][T27919] loop3: detected capacity change from 0 to 264192 [ 341.813667][T27919] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 341.834869][T27919] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x11000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:18 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x1000000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x500, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 341.869469][T27936] loop2: detected capacity change from 0 to 264192 05:00:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x12000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:18 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x20000000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 341.928757][T27950] loop3: detected capacity change from 0 to 264192 [ 341.942002][T27950] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 341.955527][T27950] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 341.994550][T27953] loop2: detected capacity change from 0 to 264192 [ 342.041858][T27966] loop3: detected capacity change from 0 to 264192 [ 342.059166][T27966] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:18 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x600, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 342.085908][T27966] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 342.128836][T27975] loop2: detected capacity change from 0 to 264192 [ 342.145325][ C0] sd 0:0:1:0: tag#2191 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 342.155176][ C0] sd 0:0:1:0: tag#2191 CDB: opcode=0xe5 (vendor) [ 342.161535][ C0] sd 0:0:1:0: tag#2191 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 342.170618][ C0] sd 0:0:1:0: tag#2191 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 342.179674][ C0] sd 0:0:1:0: tag#2191 CDB[20]: ba [ 342.200617][ T22] audit: type=1326 audit(1633064418.730:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27973 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2100000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:19 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x100000000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:19 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x40000800, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x20000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x604, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:19 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x200000000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:19 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x204000000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 342.758600][T28003] loop2: detected capacity change from 0 to 264192 [ 342.761922][T28000] loop3: detected capacity change from 0 to 264192 [ 342.804696][T28000] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 342.827984][T28003] loop2: detected capacity change from 0 to 264192 05:00:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x700, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:19 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x300000000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 342.852334][T28000] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 342.907509][T28000] loop3: detected capacity change from 0 to 264192 [ 342.916622][T28000] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 342.941690][T28031] loop2: detected capacity change from 0 to 264192 05:00:19 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x400000000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 342.955442][T28000] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:19 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x20100000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 343.041205][ C0] sd 0:0:1:0: tag#2225 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 343.051063][ C0] sd 0:0:1:0: tag#2225 CDB: opcode=0xe5 (vendor) [ 343.057404][ C0] sd 0:0:1:0: tag#2225 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 343.066452][ C0] sd 0:0:1:0: tag#2225 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 343.075496][ C0] sd 0:0:1:0: tag#2225 CDB[20]: ba [ 343.091162][ T22] audit: type=1326 audit(1633064419.630:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28042 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 343.131693][T28039] loop3: detected capacity change from 0 to 264192 [ 343.157705][T28039] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 343.179080][T28039] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:19 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x60ffffffffff, &(0x7f00000004c0), 0x0, 0x0) 05:00:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x900, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 343.438860][T28060] loop2: detected capacity change from 0 to 264192 05:00:20 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x48000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:20 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x500000000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:20 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x22000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xa00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:20 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 343.634762][ C1] sd 0:0:1:0: tag#2220 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 343.642237][T28075] loop2: detected capacity change from 0 to 264192 [ 343.644657][ C1] sd 0:0:1:0: tag#2220 CDB: opcode=0xe5 (vendor) [ 343.657467][ C1] sd 0:0:1:0: tag#2220 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 343.666506][ C1] sd 0:0:1:0: tag#2220 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 343.675567][ C1] sd 0:0:1:0: tag#2220 CDB[20]: ba [ 343.709542][ T22] audit: type=1326 audit(1633064420.241:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28083 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=231 compat=0 ip=0x7efc94e228d9 code=0x0 [ 343.734462][ C1] sd 0:0:1:0: tag#2189 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 343.742423][T28086] loop3: detected capacity change from 0 to 264192 [ 343.744335][ C1] sd 0:0:1:0: tag#2189 CDB: opcode=0xe5 (vendor) 05:00:20 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x600000000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 343.757234][ C1] sd 0:0:1:0: tag#2189 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 343.767993][ C1] sd 0:0:1:0: tag#2189 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 343.777105][ C1] sd 0:0:1:0: tag#2189 CDB[20]: ba [ 343.802782][ T22] audit: type=1326 audit(1633064420.341:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28088 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xb00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:20 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x604000000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 343.845371][T28086] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 343.885112][T28086] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xc00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 343.946356][T28105] loop2: detected capacity change from 0 to 264192 [ 343.952396][T28086] loop3: detected capacity change from 0 to 264192 [ 343.984318][T28086] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 344.023678][T28086] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 344.059450][T28118] loop2: detected capacity change from 0 to 264192 05:00:20 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x700000000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:20 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7f65aa697000, &(0x7f00000004c0), 0x0, 0x0) 05:00:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x25000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:21 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x800000000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:21 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4c000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xd00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:21 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:21 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x1800000000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 344.586270][T28141] loop3: detected capacity change from 0 to 264192 [ 344.606195][T28147] loop2: detected capacity change from 0 to 264192 [ 344.627349][T28141] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xe00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 344.639603][ C0] sd 0:0:1:0: tag#2219 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 344.649571][ C0] sd 0:0:1:0: tag#2219 CDB: opcode=0xe5 (vendor) [ 344.655917][ C0] sd 0:0:1:0: tag#2219 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 344.664975][ C0] sd 0:0:1:0: tag#2219 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 344.674046][ C0] sd 0:0:1:0: tag#2219 CDB[20]: ba 05:00:21 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x2600000000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 344.686886][T28141] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 344.696763][ T22] audit: type=1326 audit(1633064421.231:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28146 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:21 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x3005000000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xe01, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 344.789103][T28141] loop3: detected capacity change from 0 to 264192 [ 344.810786][T28169] loop2: detected capacity change from 0 to 264192 [ 344.821742][T28141] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:21 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x3f00000000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 344.872609][T28141] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 344.946042][T28183] loop2: detected capacity change from 0 to 264192 05:00:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7f65aaab7000, &(0x7f00000004c0), 0x0, 0x0) 05:00:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x3f000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 345.174395][T28195] loop3: detected capacity change from 0 to 264192 [ 345.185178][T28195] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 345.194621][T28195] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:21 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x53efffff, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:21 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x4000080000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xf00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:22 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x40000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:22 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x8004000000000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 345.503520][T28219] loop3: detected capacity change from 0 to 264192 [ 345.511704][T28218] loop2: detected capacity change from 0 to 264192 [ 345.524234][ C0] sd 0:0:1:0: tag#2202 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 345.534092][ C0] sd 0:0:1:0: tag#2202 CDB: opcode=0xe5 (vendor) [ 345.540426][ C0] sd 0:0:1:0: tag#2202 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 05:00:22 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 345.549473][ C0] sd 0:0:1:0: tag#2202 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 345.558607][ C0] sd 0:0:1:0: tag#2202 CDB[20]: ba [ 345.572312][ T22] audit: type=1326 audit(1633064422.111:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28226 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:22 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0xf6ffffff00000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 345.609860][T28219] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1020, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x48000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 345.651668][T28219] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 345.655058][ C1] sd 0:0:1:0: tag#2215 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 345.668313][ C1] sd 0:0:1:0: tag#2215 CDB: opcode=0xe5 (vendor) [ 345.674714][ C1] sd 0:0:1:0: tag#2215 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 345.683788][ C1] sd 0:0:1:0: tag#2215 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 345.692863][ C1] sd 0:0:1:0: tag#2215 CDB[20]: ba [ 345.704958][ T22] audit: type=1326 audit(1633064422.241:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28235 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 345.839615][T28249] loop2: detected capacity change from 0 to 264192 [ 345.849217][T28248] loop3: detected capacity change from 0 to 264192 [ 345.888714][T28248] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 345.914334][T28248] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 345.955214][T28248] loop3: detected capacity change from 0 to 264192 [ 345.964299][T28248] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 345.987504][T28248] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:22 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7f65aacb7000, &(0x7f00000004c0), 0x0, 0x0) 05:00:22 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 346.092585][ C0] sd 0:0:1:0: tag#2221 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 346.102582][ C0] sd 0:0:1:0: tag#2221 CDB: opcode=0xe5 (vendor) [ 346.108916][ C0] sd 0:0:1:0: tag#2221 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 346.117968][ C0] sd 0:0:1:0: tag#2221 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 346.127003][ C0] sd 0:0:1:0: tag#2221 CDB[20]: ba [ 346.146263][ T22] audit: type=1326 audit(1633064422.681:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28271 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:22 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x60000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:22 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0xfeffffff00000000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1100, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x4c000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:22 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:22 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0xfeffffffffffffff, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 346.371845][T28284] loop3: detected capacity change from 0 to 264192 [ 346.379631][ C1] sd 0:0:1:0: tag#2205 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 346.389522][ C1] sd 0:0:1:0: tag#2205 CDB: opcode=0xe5 (vendor) [ 346.395879][ C1] sd 0:0:1:0: tag#2205 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 346.405040][ C1] sd 0:0:1:0: tag#2205 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 346.414067][ C1] sd 0:0:1:0: tag#2205 CDB[20]: ba [ 346.425916][ T22] audit: type=1326 audit(1633064422.961:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28276 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 346.450218][T28289] loop2: detected capacity change from 0 to 264192 05:00:23 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0xffffff7f00000000, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1200, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 346.530801][T28284] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 346.566062][T28284] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 346.573031][T28301] loop2: detected capacity change from 0 to 264192 05:00:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1300, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:23 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0xffffffff00000000, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 346.653275][T28284] loop3: detected capacity change from 0 to 264192 [ 346.695371][T28284] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 346.714640][T28320] loop2: detected capacity change from 0 to 264192 [ 346.725225][T28284] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7f65aca27000, &(0x7f00000004c0), 0x0, 0x0) 05:00:23 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0xfffffffffffffffe, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:23 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x68000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x53efffff, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1400, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:23 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0xffffffffffffffff, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:23 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 347.335381][T28346] loop2: detected capacity change from 0 to 264192 [ 347.352322][T28348] loop3: detected capacity change from 0 to 264192 [ 347.362350][ C0] sd 0:0:1:0: tag#2235 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 347.372216][ C0] sd 0:0:1:0: tag#2235 CDB: opcode=0xe5 (vendor) 05:00:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1500, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 347.378550][ C0] sd 0:0:1:0: tag#2235 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 347.387605][ C0] sd 0:0:1:0: tag#2235 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 347.396668][ C0] sd 0:0:1:0: tag#2235 CDB[20]: ba [ 347.418721][T28348] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:23 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:23 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x2}, 0x22}]}) [ 347.429701][ T22] audit: type=1326 audit(1633064423.961:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28357 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x60000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 347.477139][T28348] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:24 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x3}, 0x22}]}) [ 347.520768][ C0] sd 0:0:1:0: tag#2189 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 347.530623][ C0] sd 0:0:1:0: tag#2189 CDB: opcode=0xe5 (vendor) [ 347.536957][ C0] sd 0:0:1:0: tag#2189 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 347.546000][ C0] sd 0:0:1:0: tag#2189 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 347.555053][ C0] sd 0:0:1:0: tag#2189 CDB[20]: ba [ 347.570188][ T22] audit: type=1326 audit(1633064424.101:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28368 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 347.670127][T28381] loop3: detected capacity change from 0 to 264192 [ 347.693871][T28384] loop2: detected capacity change from 0 to 264192 [ 347.709088][T28381] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 347.741308][T28381] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:24 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7fffffffefff, &(0x7f00000004c0), 0x0, 0x0) 05:00:24 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 347.830230][ C1] sd 0:0:1:0: tag#2187 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 347.840241][ C1] sd 0:0:1:0: tag#2187 CDB: opcode=0xe5 (vendor) [ 347.846592][ C1] sd 0:0:1:0: tag#2187 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 347.855731][ C1] sd 0:0:1:0: tag#2187 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 347.864816][ C1] sd 0:0:1:0: tag#2187 CDB[20]: ba [ 347.874355][ T22] audit: type=1326 audit(1633064424.411:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28395 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:24 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6c000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:24 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x4}, 0x22}]}) 05:00:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1600, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x68000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:24 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x5}, 0x22}]}) 05:00:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1700, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 348.252123][T28411] loop3: detected capacity change from 0 to 264192 [ 348.253036][T28409] loop2: detected capacity change from 0 to 264192 [ 348.276402][T28411] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 348.286040][T28411] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x6c000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:24 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x6}, 0x22}]}) [ 348.374213][T28427] loop2: detected capacity change from 0 to 264192 [ 348.389640][T28432] loop3: detected capacity change from 0 to 264192 05:00:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1800, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 348.427888][T28432] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:25 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x7}, 0x22}]}) [ 348.473204][T28432] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 348.512411][T28442] loop2: detected capacity change from 0 to 264192 [ 348.540531][T28432] loop3: detected capacity change from 0 to 264192 [ 348.562147][T28432] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 348.599623][T28432] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:25 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1900, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 348.748851][T28463] loop2: detected capacity change from 0 to 264192 05:00:25 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x74000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:25 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x8}, 0x22}]}) 05:00:25 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x74000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:25 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1a00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 349.157381][T28482] loop3: detected capacity change from 0 to 264192 [ 349.169762][T28486] loop2: detected capacity change from 0 to 264192 [ 349.176103][ C0] sd 0:0:1:0: tag#2205 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 349.178288][T28482] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 349.186109][ C0] sd 0:0:1:0: tag#2205 CDB: opcode=0xe5 (vendor) 05:00:25 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x18}, 0x22}]}) [ 349.186127][ C0] sd 0:0:1:0: tag#2205 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 349.186144][ C0] sd 0:0:1:0: tag#2205 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 349.219292][ C0] sd 0:0:1:0: tag#2205 CDB[20]: ba 05:00:25 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 349.235969][ T22] audit: type=1326 audit(1633064425.771:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28492 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:25 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x26}, 0x22}]}) [ 349.335531][ C0] sd 0:0:1:0: tag#2204 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 349.345387][ C0] sd 0:0:1:0: tag#2204 CDB: opcode=0xe5 (vendor) [ 349.352342][ C0] sd 0:0:1:0: tag#2204 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 349.361757][ C0] sd 0:0:1:0: tag#2204 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 349.371140][ C0] sd 0:0:1:0: tag#2204 CDB[20]: ba [ 349.376889][T28482] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x7a000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:26 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0xfe}, 0x22}]}) [ 349.401940][ T22] audit: type=1326 audit(1633064425.941:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28496 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 349.502159][T28510] loop3: detected capacity change from 0 to 264192 [ 349.540328][T28510] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:26 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1b00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 349.573008][T28510] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 349.653042][T28526] loop2: detected capacity change from 0 to 264192 05:00:26 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x204}, 0x22}]}) 05:00:26 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7a000000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x85ffffff, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1c00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:26 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x300}, 0x22}]}) [ 350.039209][T28541] loop3: detected capacity change from 0 to 264192 [ 350.042811][T28542] loop2: detected capacity change from 0 to 264192 05:00:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1d00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:26 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:26 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x402}, 0x22}]}) [ 350.091632][T28541] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 350.130337][T28541] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 350.179948][T28541] loop3: detected capacity change from 0 to 264192 [ 350.194675][T28541] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 350.215956][T28568] loop2: detected capacity change from 0 to 264192 05:00:26 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x406}, 0x22}]}) [ 350.225016][ C1] sd 0:0:1:0: tag#2192 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 350.235000][ C1] sd 0:0:1:0: tag#2192 CDB: opcode=0xe5 (vendor) [ 350.241364][ C1] sd 0:0:1:0: tag#2192 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 350.250410][ C1] sd 0:0:1:0: tag#2192 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 350.259491][ C1] sd 0:0:1:0: tag#2192 CDB[20]: ba [ 350.268394][T28541] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:26 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 350.296787][ T22] audit: type=1326 audit(1633064426.831:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28560 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=231 compat=0 ip=0x7efc94e228d9 code=0x0 [ 350.376781][T28568] loop2: detected capacity change from 0 to 264192 [ 350.388967][ C0] sd 0:0:1:0: tag#2239 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 350.398824][ C0] sd 0:0:1:0: tag#2239 CDB: opcode=0xe5 (vendor) [ 350.405186][ C0] sd 0:0:1:0: tag#2239 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 350.414203][ C0] sd 0:0:1:0: tag#2239 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 350.423232][ C0] sd 0:0:1:0: tag#2239 CDB[20]: ba [ 350.442160][ T22] audit: type=1326 audit(1633064426.981:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28586 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x20000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x8cffffff, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:27 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x480}, 0x22}]}) [ 350.549043][T28600] loop3: detected capacity change from 0 to 264192 [ 350.568653][T28600] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 350.593718][T28600] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:27 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x85ffffff, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:27 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1e00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:27 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x500}, 0x22}]}) 05:00:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xc0ed0000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 350.971198][T28616] loop2: detected capacity change from 0 to 264192 [ 350.983327][ C1] sd 0:0:1:0: tag#2176 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 350.986071][T28622] loop3: detected capacity change from 0 to 264192 [ 350.993245][ C1] sd 0:0:1:0: tag#2176 CDB: opcode=0xe5 (vendor) [ 351.006077][ C1] sd 0:0:1:0: tag#2176 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 05:00:27 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x530}, 0x22}]}) [ 351.015151][ C1] sd 0:0:1:0: tag#2176 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 351.024211][ C1] sd 0:0:1:0: tag#2176 CDB[20]: ba [ 351.062131][ T22] audit: type=1326 audit(1633064427.601:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28612 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 351.111535][T28622] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:27 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x600}, 0x22}]}) [ 351.161444][T28622] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 351.200268][T28616] loop2: detected capacity change from 0 to 264192 05:00:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1f00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 351.224643][T28622] loop3: detected capacity change from 0 to 264192 [ 351.255572][T28622] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:27 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x604}, 0x22}]}) [ 351.280041][T28622] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 351.312759][T28650] loop2: detected capacity change from 0 to 264192 05:00:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xdaffffff, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:27 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7069aa657f0000, &(0x7f00000004c0), 0x0, 0x0) 05:00:27 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x700}, 0x22}]}) [ 351.376908][T28650] loop2: detected capacity change from 0 to 264192 [ 351.463021][T28675] loop3: detected capacity change from 0 to 264192 [ 351.513453][T28675] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 351.546346][T28675] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 351.600268][T28675] loop3: detected capacity change from 0 to 264192 [ 351.621035][T28675] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 351.646073][T28675] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:28 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x8cffffff, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:28 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:28 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x1800}, 0x22}]}) 05:00:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xf0030000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:28 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x2000}, 0x22}]}) [ 351.883747][T28696] loop3: detected capacity change from 0 to 264192 [ 351.898052][T28703] loop2: detected capacity change from 0 to 264192 [ 351.910033][ C0] sd 0:0:1:0: tag#2193 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 351.919894][ C0] sd 0:0:1:0: tag#2193 CDB: opcode=0xe5 (vendor) 05:00:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2010, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 351.926272][ C0] sd 0:0:1:0: tag#2193 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 351.935322][ C0] sd 0:0:1:0: tag#2193 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 351.944614][ C0] sd 0:0:1:0: tag#2193 CDB[20]: ba [ 351.949783][T28696] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:28 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r1, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 351.983565][ T22] audit: type=1326 audit(1633064428.521:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28701 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=231 compat=0 ip=0x7efc94e228d9 code=0x0 [ 352.052455][T28696] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 352.077479][ C1] sd 0:0:1:0: tag#2187 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 352.087476][ C1] sd 0:0:1:0: tag#2187 CDB: opcode=0xe5 (vendor) 05:00:28 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x2600}, 0x22}]}) [ 352.093874][ C1] sd 0:0:1:0: tag#2187 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 352.103329][ C1] sd 0:0:1:0: tag#2187 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 352.112839][ C1] sd 0:0:1:0: tag#2187 CDB[20]: ba [ 352.113870][T28719] loop2: detected capacity change from 0 to 264192 [ 352.129945][ T22] audit: type=1326 audit(1633064428.661:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28724 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2100, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 352.198292][T28696] loop3: detected capacity change from 0 to 264192 [ 352.215297][T28696] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 352.259787][T28696] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 352.270847][T28736] loop2: detected capacity change from 0 to 264192 05:00:28 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x70a2ac657f0000, &(0x7f00000004c0), 0x0, 0x0) 05:00:28 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x3005}, 0x22}]}) 05:00:29 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x97ffffff, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:29 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xf1030000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2200, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:29 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x3f00}, 0x22}]}) 05:00:29 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 352.719700][ T22] audit: type=1326 audit(1633064429.251:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28767 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 352.721925][T28768] loop2: detected capacity change from 0 to 264192 [ 352.746274][T28770] loop3: detected capacity change from 0 to 264192 05:00:29 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x8004}, 0x22}]}) [ 352.809792][T28770] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2300, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 352.852193][ T22] audit: type=1326 audit(1633064429.341:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28783 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:29 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0xfeff}, 0x22}]}) [ 352.900169][T28770] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:29 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 352.941455][T28789] loop2: detected capacity change from 0 to 264192 [ 352.961676][T28770] loop3: detected capacity change from 0 to 264192 [ 352.996344][T28770] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 353.012750][ T22] audit: type=1326 audit(1633064429.551:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28804 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 353.085353][T28770] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x70abaa657f0000, &(0x7f00000004c0), 0x0, 0x0) 05:00:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2400, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 353.271140][T28819] loop2: detected capacity change from 0 to 264192 05:00:30 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x9cb23cf4, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r3, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:30 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0xfffe}, 0x22}]}) 05:00:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xf6ffffff, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2500, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:30 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x80000}, 0x22}]}) [ 353.678104][T28837] loop2: detected capacity change from 0 to 264192 [ 353.687669][T28840] loop3: detected capacity change from 0 to 264192 [ 353.695262][ T22] audit: type=1326 audit(1633064430.231:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28843 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2600, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 353.741340][T28840] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:30 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x80040}, 0x22}]}) [ 353.792494][T28840] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r3, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 353.855999][T28856] loop2: detected capacity change from 0 to 264192 [ 353.866850][T28840] loop3: detected capacity change from 0 to 264192 [ 353.875908][T28840] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r3, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 353.942533][ T22] audit: type=1326 audit(1633064430.481:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28872 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 353.972015][T28840] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 354.031078][ T22] audit: type=1326 audit(1633064430.571:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28879 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x70cbaa657f0000, &(0x7f00000004c0), 0x0, 0x0) 05:00:30 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x200000}, 0x22}]}) 05:00:31 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xc0ed0000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2700, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xf9fdffff, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:31 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x1000000}, 0x22}]}) [ 354.562581][T28901] loop3: detected capacity change from 0 to 264192 [ 354.572479][T28905] loop2: detected capacity change from 0 to 264192 [ 354.584665][ C0] sd 0:0:1:0: tag#2185 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 354.592422][T28901] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 354.594547][ C0] sd 0:0:1:0: tag#2185 CDB: opcode=0xe5 (vendor) 05:00:31 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x2000000}, 0x22}]}) [ 354.594567][ C0] sd 0:0:1:0: tag#2185 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 354.618588][ C0] sd 0:0:1:0: tag#2185 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 354.627704][ C0] sd 0:0:1:0: tag#2185 CDB[20]: ba 05:00:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2800, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 354.653909][T28901] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 354.661347][ T22] audit: type=1326 audit(1633064431.201:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28914 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xfdfdffff, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:31 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x2040000}, 0x22}]}) [ 354.757705][ C0] sd 0:0:1:0: tag#2184 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 354.758056][T28921] loop2: detected capacity change from 0 to 264192 [ 354.767562][ C0] sd 0:0:1:0: tag#2184 CDB: opcode=0xe5 (vendor) [ 354.767580][ C0] sd 0:0:1:0: tag#2184 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 354.789424][ C0] sd 0:0:1:0: tag#2184 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 354.798591][ C0] sd 0:0:1:0: tag#2184 CDB[20]: ba [ 354.828336][ T22] audit: type=1326 audit(1633064431.361:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28919 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 354.954251][T28938] loop3: detected capacity change from 0 to 264192 [ 354.979865][T28938] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 354.997824][T28938] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:31 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xf0ff1f00000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2900, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 355.068162][T28947] loop2: detected capacity change from 0 to 264192 05:00:31 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x3000000}, 0x22}]}) 05:00:31 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xdaffffff, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xfeffffff, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2a00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:32 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x4000000}, 0x22}]}) [ 355.493537][T28964] loop2: detected capacity change from 0 to 264192 [ 355.512254][T28968] loop3: detected capacity change from 0 to 264192 05:00:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2b00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:32 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 355.547987][T28968] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:32 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x5000000}, 0x22}]}) 05:00:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2c00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 355.614401][T28968] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 355.653299][T28984] loop2: detected capacity change from 0 to 264192 [ 355.690669][T28968] loop3: detected capacity change from 0 to 264192 [ 355.705159][ C1] sd 0:0:1:0: tag#2180 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 355.715026][ C1] sd 0:0:1:0: tag#2180 CDB: opcode=0xe5 (vendor) [ 355.721376][ C1] sd 0:0:1:0: tag#2180 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 355.730401][ C1] sd 0:0:1:0: tag#2180 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 05:00:32 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x6000000}, 0x22}]}) [ 355.739410][ C1] sd 0:0:1:0: tag#2180 CDB[20]: ba [ 355.745605][T28968] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 355.779855][ T22] audit: type=1326 audit(1633064432.311:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28994 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 355.802480][T29001] loop2: detected capacity change from 0 to 264192 [ 355.806562][T28968] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:32 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x100000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xff0f0000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:32 executing program 5: syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 355.984277][ C1] sd 0:0:1:0: tag#2204 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 355.987539][T29018] loop3: detected capacity change from 0 to 264192 [ 355.994146][ C1] sd 0:0:1:0: tag#2204 CDB: opcode=0xe5 (vendor) [ 356.007038][ C1] sd 0:0:1:0: tag#2204 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 356.016092][ C1] sd 0:0:1:0: tag#2204 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 356.025247][ C1] sd 0:0:1:0: tag#2204 CDB[20]: ba [ 356.035694][T29018] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 356.045396][ T22] audit: type=1326 audit(1633064432.581:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29011 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 356.077324][T29018] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:32 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf43cb29c, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:32 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x6040000}, 0x22}]}) 05:00:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2d00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xfffbffff, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:32 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x7000000}, 0x22}]}) [ 356.381643][T29035] loop3: detected capacity change from 0 to 264192 [ 356.401704][T29042] loop2: detected capacity change from 0 to 264192 [ 356.411855][T29035] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2e00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:33 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x8000000}, 0x22}]}) [ 356.455152][T29035] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 356.519022][T29035] loop3: detected capacity change from 0 to 264192 [ 356.535335][T29035] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:33 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x18000000}, 0x22}]}) 05:00:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xffffef53, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 356.572817][T29035] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 356.573019][T29060] loop2: detected capacity change from 0 to 264192 [ 356.689219][T29070] loop3: detected capacity change from 0 to 264192 [ 356.712585][T29070] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 356.745474][T29070] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 356.805006][T29070] loop3: detected capacity change from 0 to 264192 [ 356.821333][T29070] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 356.831887][T29070] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:33 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x200000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2f00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:33 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x26000000}, 0x22}]}) [ 356.936815][T29093] loop2: detected capacity change from 0 to 264192 [ 356.984983][T29093] loop2: detected capacity change from 0 to 264192 05:00:33 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf6ffffff, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:33 executing program 5: syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xfffffbff, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:33 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x30050000}, 0x22}]}) 05:00:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 357.270430][T29114] loop3: detected capacity change from 0 to 264192 [ 357.280864][ C1] sd 0:0:1:0: tag#2216 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 357.284456][T29118] loop2: detected capacity change from 0 to 264192 [ 357.290803][ C1] sd 0:0:1:0: tag#2216 CDB: opcode=0xe5 (vendor) [ 357.303645][ C1] sd 0:0:1:0: tag#2216 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 05:00:33 executing program 5: syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:33 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x3f000000}, 0x22}]}) [ 357.312679][ C1] sd 0:0:1:0: tag#2216 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 357.321729][ C1] sd 0:0:1:0: tag#2216 CDB[20]: ba [ 357.372914][T29114] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 357.420564][T29114] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 357.438326][T29118] loop2: detected capacity change from 0 to 264192 [ 357.456886][ C0] sd 0:0:1:0: tag#2214 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s 05:00:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3100, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:34 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x40000800}, 0x22}]}) [ 357.466737][ C0] sd 0:0:1:0: tag#2214 CDB: opcode=0xe5 (vendor) [ 357.473084][ C0] sd 0:0:1:0: tag#2214 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 357.482132][ C0] sd 0:0:1:0: tag#2214 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 357.491203][ C0] sd 0:0:1:0: tag#2214 CDB[20]: ba [ 357.570401][T29114] loop3: detected capacity change from 0 to 264192 [ 357.585158][T29114] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 357.654231][T29114] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 357.661587][T29156] loop2: detected capacity change from 0 to 264192 05:00:34 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x300000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:34 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x80040000}, 0x22}]}) 05:00:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 357.839650][ C1] sd 0:0:1:0: tag#2192 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 357.849544][ C1] sd 0:0:1:0: tag#2192 CDB: opcode=0xe5 (vendor) [ 357.855911][ C1] sd 0:0:1:0: tag#2192 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 357.865001][ C1] sd 0:0:1:0: tag#2192 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 357.874048][ C1] sd 0:0:1:0: tag#2192 CDB[20]: ba [ 357.888368][ T22] kauditd_printk_skb: 2 callbacks suppressed [ 357.888381][ T22] audit: type=1326 audit(1633064434.421:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29168 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xfffffdf9, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:34 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf9fdffff, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:34 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0xf6ffffff}, 0x22}]}) 05:00:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3200, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:34 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0xfeffffff}, 0x22}]}) [ 358.260160][T29184] loop2: detected capacity change from 0 to 264192 [ 358.278269][T29189] loop3: detected capacity change from 0 to 264192 05:00:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3300, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 358.325606][T29189] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 358.357601][T29189] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:34 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0xffffff7f}, 0x22}]}) [ 358.386743][T29189] loop3: detected capacity change from 0 to 264192 [ 358.403780][T29189] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 358.418047][T29206] loop2: detected capacity change from 0 to 264192 05:00:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3400, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 358.442383][T29189] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 358.553721][T29219] loop2: detected capacity change from 0 to 264192 [ 358.560951][T29220] loop3: detected capacity change from 0 to 264192 [ 358.591272][T29220] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:35 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x400000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:35 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0xfffffff6}, 0x22}]}) 05:00:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3500, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 358.636957][T29220] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 358.709406][T29220] loop3: detected capacity change from 0 to 264192 [ 358.738285][T29220] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 358.742373][T29243] loop2: detected capacity change from 0 to 264192 [ 358.765638][ C0] sd 0:0:1:0: tag#2197 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 358.775496][ C0] sd 0:0:1:0: tag#2197 CDB: opcode=0xe5 (vendor) [ 358.780022][T29220] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 358.782735][ C0] sd 0:0:1:0: tag#2197 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 358.782756][ C0] sd 0:0:1:0: tag#2197 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 358.807289][ C0] sd 0:0:1:0: tag#2197 CDB[20]: ba 05:00:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3600, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 358.841658][ T22] audit: type=1326 audit(1633064435.371:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29253 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 359.087036][T29257] loop2: detected capacity change from 0 to 264192 05:00:35 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfdfdffff, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:35 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0xfffffffe}, 0x22}]}) 05:00:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xffffff7f, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3700, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 359.199399][ C0] sd 0:0:1:0: tag#2227 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 359.209252][ C0] sd 0:0:1:0: tag#2227 CDB: opcode=0xe5 (vendor) [ 359.215602][ C0] sd 0:0:1:0: tag#2227 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 359.224686][ C0] sd 0:0:1:0: tag#2227 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 359.233816][ C0] sd 0:0:1:0: tag#2227 CDB[20]: ba [ 359.246689][T29274] loop3: detected capacity change from 0 to 264192 [ 359.259576][ T22] audit: type=1326 audit(1633064435.781:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29279 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 359.288572][T29278] loop2: detected capacity change from 0 to 264192 05:00:35 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x80000000000}, 0x22}]}) [ 359.308167][T29274] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3800, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 359.364479][T29274] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 359.410571][T29274] loop3: detected capacity change from 0 to 264192 [ 359.431167][T29274] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 359.469990][T29300] loop2: detected capacity change from 0 to 264192 [ 359.481955][T29274] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x500000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3900, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xffffff85, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:36 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x1000000000000}, 0x22}]}) 05:00:36 executing program 5: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 359.652399][T29318] loop3: detected capacity change from 0 to 264192 [ 359.677670][T29324] loop2: detected capacity change from 0 to 264192 [ 359.680954][ C1] sd 0:0:1:0: tag#2223 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 359.694031][ C1] sd 0:0:1:0: tag#2223 CDB: opcode=0xe5 (vendor) [ 359.700490][ C1] sd 0:0:1:0: tag#2223 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 359.709706][ C1] sd 0:0:1:0: tag#2223 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 359.718855][ C1] sd 0:0:1:0: tag#2223 CDB[20]: ba [ 359.741960][T29318] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 359.753396][ T22] audit: type=1326 audit(1633064436.291:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29327 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 359.776366][T29318] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 359.836751][T29318] loop3: detected capacity change from 0 to 264192 [ 359.843914][T29324] loop2: detected capacity change from 0 to 264192 [ 359.859030][T29318] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 359.901242][T29318] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:36 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfdffffff, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:36 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x20000000000000}, 0x22}]}) 05:00:36 executing program 5: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3a00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xffffff8c, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 360.107408][ C1] sd 0:0:1:0: tag#2196 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 360.117275][ C1] sd 0:0:1:0: tag#2196 CDB: opcode=0xe5 (vendor) [ 360.123625][ C1] sd 0:0:1:0: tag#2196 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 360.132642][ C1] sd 0:0:1:0: tag#2196 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 360.141677][ C1] sd 0:0:1:0: tag#2196 CDB[20]: ba [ 360.153460][ T22] audit: type=1326 audit(1633064436.681:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29352 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 360.178685][T29362] loop3: detected capacity change from 0 to 264192 [ 360.186942][T29365] loop2: detected capacity change from 0 to 264192 05:00:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3b00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xffffffda, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:36 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x100000000000000}, 0x22}]}) [ 360.202566][T29362] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 360.213507][T29362] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 360.299075][T29374] loop2: detected capacity change from 0 to 264192 [ 360.347543][T29385] loop3: detected capacity change from 0 to 264192 [ 360.375303][T29385] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 360.399169][T29385] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 360.434287][T29385] loop3: detected capacity change from 0 to 264192 05:00:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x600000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3c00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:37 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x200000000000000}, 0x22}]}) 05:00:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xfffffff6, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 360.444533][T29385] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 360.466695][T29385] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 360.551603][T29407] loop2: detected capacity change from 0 to 264192 [ 360.599411][T29413] loop3: detected capacity change from 0 to 264192 [ 360.628750][T29413] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 360.656946][T29413] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:37 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfeffffff, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3d00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:37 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x204000000000000}, 0x22}]}) 05:00:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffe, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 361.022948][ C1] sd 0:0:1:0: tag#2194 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 361.022965][T29436] loop2: detected capacity change from 0 to 264192 [ 361.022988][ C1] sd 0:0:1:0: tag#2194 CDB: opcode=0xe5 (vendor) [ 361.044461][T29438] loop3: detected capacity change from 0 to 264192 [ 361.045624][ C1] sd 0:0:1:0: tag#2194 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 361.061155][ C1] sd 0:0:1:0: tag#2194 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 05:00:37 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x300000000000000}, 0x22}]}) 05:00:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 361.070217][ C1] sd 0:0:1:0: tag#2194 CDB[20]: ba [ 361.081627][ T22] audit: type=1326 audit(1633064437.611:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29444 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 361.117195][T29438] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3e00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 361.151186][T29438] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 361.216671][ C1] sd 0:0:1:0: tag#2197 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 361.226547][ C1] sd 0:0:1:0: tag#2197 CDB: opcode=0xe5 (vendor) [ 361.232899][ C1] sd 0:0:1:0: tag#2197 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 361.241960][ C1] sd 0:0:1:0: tag#2197 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 361.251021][ C1] sd 0:0:1:0: tag#2197 CDB[20]: ba [ 361.261304][ T22] audit: type=1326 audit(1633064437.791:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29454 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 361.372370][T29456] loop2: detected capacity change from 0 to 264192 05:00:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x700000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:37 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x400000000000000}, 0x22}]}) 05:00:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x8000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 361.478593][T29476] loop3: detected capacity change from 0 to 264192 [ 361.485836][ C1] sd 0:0:1:0: tag#2215 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 361.495708][ C1] sd 0:0:1:0: tag#2215 CDB: opcode=0xe5 (vendor) [ 361.502057][ C1] sd 0:0:1:0: tag#2215 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 361.511098][ C1] sd 0:0:1:0: tag#2215 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 361.520156][ C1] sd 0:0:1:0: tag#2215 CDB[20]: ba [ 361.534773][ T22] audit: type=1326 audit(1633064438.061:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29478 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 361.576548][T29476] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 361.596098][T29476] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 361.653719][T29476] loop3: detected capacity change from 0 to 264192 [ 361.664295][T29476] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 361.697844][T29476] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:38 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x500000000000000}, 0x22}]}) 05:00:38 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xff0f0000, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xedc000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:38 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 361.890532][ C0] sd 0:0:1:0: tag#2237 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 361.900383][ C0] sd 0:0:1:0: tag#2237 CDB: opcode=0xe5 (vendor) [ 361.906721][ C0] sd 0:0:1:0: tag#2237 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 361.915780][ C0] sd 0:0:1:0: tag#2237 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 361.924814][ C0] sd 0:0:1:0: tag#2237 CDB[20]: ba [ 361.933364][T29503] loop2: detected capacity change from 0 to 264192 05:00:38 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x600000000000000}, 0x22}]}) 05:00:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x4000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 361.940549][ T22] audit: type=1326 audit(1633064438.471:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29506 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 361.951338][T29505] loop3: detected capacity change from 0 to 264192 05:00:38 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x604000000000000}, 0x22}]}) [ 362.061744][T29517] loop2: detected capacity change from 0 to 264192 [ 362.070192][T29505] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 362.125897][T29505] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 362.147572][T29517] loop2: detected capacity change from 0 to 264192 [ 362.184654][T29505] loop3: detected capacity change from 0 to 264192 [ 362.206125][T29505] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 362.256547][T29505] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:38 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x800000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:38 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:38 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x700000000000000}, 0x22}]}) 05:00:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x5a03, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x1000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 362.464212][T29548] loop2: detected capacity change from 0 to 264192 [ 362.473472][T29554] loop3: detected capacity change from 0 to 264192 [ 362.476868][ C0] sd 0:0:1:0: tag#2232 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 362.490262][ C0] sd 0:0:1:0: tag#2232 CDB: opcode=0xe5 (vendor) [ 362.496593][ C0] sd 0:0:1:0: tag#2232 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 362.500045][T29554] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 362.505632][ C0] sd 0:0:1:0: tag#2232 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 362.523657][ C0] sd 0:0:1:0: tag#2232 CDB[20]: ba [ 362.525120][T29554] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 362.539260][ T22] audit: type=1326 audit(1633064439.071:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29541 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 362.602430][T29554] loop3: detected capacity change from 0 to 264192 [ 362.635019][T29554] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 362.663417][T29554] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:39 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffbffff, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:39 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x800000000000000}, 0x22}]}) 05:00:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xa500, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x2000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:39 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x1800000000000000}, 0x22}]}) [ 362.798531][T29580] loop2: detected capacity change from 0 to 264192 [ 362.828917][T29585] loop3: detected capacity change from 0 to 264192 05:00:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfeff, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 362.868589][T29585] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 362.886303][T29585] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:39 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x2600000000000000}, 0x22}]}) [ 362.936845][T29596] loop2: detected capacity change from 0 to 264192 [ 362.951575][T29585] loop3: detected capacity change from 0 to 264192 [ 362.968497][T29585] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 363.005738][T29585] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:39 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x900000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xff0f, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:39 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x3005000000000000}, 0x22}]}) 05:00:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x7ffffffffffff, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:39 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 363.465579][T29623] loop3: detected capacity change from 0 to 264192 [ 363.476630][ C1] sd 0:0:1:0: tag#2219 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 363.477748][T29627] loop2: detected capacity change from 0 to 264192 [ 363.486494][ C1] sd 0:0:1:0: tag#2219 CDB: opcode=0xe5 (vendor) [ 363.499302][ C1] sd 0:0:1:0: tag#2219 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 363.508344][ C1] sd 0:0:1:0: tag#2219 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 363.517411][ C1] sd 0:0:1:0: tag#2219 CDB[20]: ba [ 363.530755][T29623] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 363.542327][ T22] audit: type=1326 audit(1633064440.072:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29617 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 363.589466][T29623] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:40 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffef53, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:40 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x3f00000000000000}, 0x22}]}) 05:00:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfffe, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 363.653857][T29623] loop3: detected capacity change from 0 to 264192 [ 363.679334][T29623] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 363.707384][T29623] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x40000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:40 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x4000080000000000}, 0x22}]}) [ 363.750879][T29650] loop2: detected capacity change from 0 to 264192 05:00:40 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0x8004000000000000}, 0x22}]}) 05:00:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x20000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 363.832841][T29661] loop3: detected capacity change from 0 to 264192 [ 363.859449][T29661] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 363.880907][T29661] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 363.935384][T29671] loop2: detected capacity change from 0 to 264192 [ 364.000683][T29671] loop2: detected capacity change from 0 to 264192 05:00:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xa00000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x100000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:40 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0xf6ffffff00000000}, 0x22}]}) 05:00:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3ffff, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:40 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 364.422384][T29692] loop2: detected capacity change from 0 to 264192 [ 364.445343][T29699] loop3: detected capacity change from 0 to 264192 [ 364.453947][ C1] sd 0:0:1:0: tag#2230 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 364.463897][ C1] sd 0:0:1:0: tag#2230 CDB: opcode=0xe5 (vendor) [ 364.470285][ C1] sd 0:0:1:0: tag#2230 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 364.479307][ C1] sd 0:0:1:0: tag#2230 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 364.488368][ C1] sd 0:0:1:0: tag#2230 CDB[20]: ba [ 364.501982][T29699] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 364.516555][ T22] audit: type=1326 audit(1633064441.052:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29705 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=231 compat=0 ip=0x7efc94e228d9 code=0x0 [ 364.565090][T29699] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 364.581258][T29692] loop2: detected capacity change from 0 to 264192 05:00:41 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffbff, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:41 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0xfeffffff00000000}, 0x22}]}) 05:00:41 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 364.607738][T29699] loop3: detected capacity change from 0 to 264192 [ 364.619614][T29699] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:41 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0xfeffffffffffffff}, 0x22}]}) [ 364.691456][ T22] audit: type=1326 audit(1633064441.222:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29720 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 364.716245][T29699] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 364.729245][T29733] loop2: detected capacity change from 0 to 264192 05:00:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x200000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x407ff, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 364.882799][T29747] loop2: detected capacity change from 0 to 264192 [ 364.901304][T29750] loop3: detected capacity change from 0 to 264192 [ 364.930406][T29750] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 364.966847][T29750] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 365.029908][T29750] loop3: detected capacity change from 0 to 264192 [ 365.044965][T29750] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 365.068262][T29750] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:41 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xb00000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:41 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0xffffff7f00000000}, 0x22}]}) 05:00:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x40800, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x204000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x60000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 365.321128][T29773] loop2: detected capacity change from 0 to 264192 [ 365.335886][T29777] loop3: detected capacity change from 0 to 264192 [ 365.353177][T29777] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 365.396856][T29777] ================================================================== [ 365.404940][T29777] BUG: KCSAN: data-race in has_bh_in_lru / invalidate_bh_lru [ 365.412308][T29777] [ 365.414612][T29777] write to 0xffff888237d22f10 of 8 bytes by task 29775 on cpu 1: [ 365.422431][T29777] invalidate_bh_lru+0x8d/0xc0 [ 365.427284][T29777] smp_call_function_many_cond+0x496/0x620 [ 365.433078][T29777] on_each_cpu_cond_mask+0x31/0x40 [ 365.438185][T29777] invalidate_bh_lrus+0x26/0x30 [ 365.443027][T29777] blkdev_flush_mapping+0xd4/0x240 [ 365.448120][T29777] blkdev_put+0x3ab/0x4c0 [ 365.452448][T29777] blkdev_close+0x45/0x50 [ 365.456760][T29777] __fput+0x295/0x520 [ 365.460750][T29777] ____fput+0x11/0x20 [ 365.464717][T29777] task_work_run+0xae/0x130 [ 365.469218][T29777] exit_to_user_mode_prepare+0x156/0x190 [ 365.474840][T29777] syscall_exit_to_user_mode+0x20/0x40 [ 365.480285][T29777] do_syscall_64+0x50/0xa0 [ 365.484700][T29777] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 365.490596][T29777] [ 365.492909][T29777] read to 0xffff888237d22f10 of 8 bytes by task 29777 on cpu 0: [ 365.500526][T29777] has_bh_in_lru+0x31/0x1c0 [ 365.505026][T29777] smp_call_function_many_cond+0x236/0x620 [ 365.510821][T29777] on_each_cpu_cond_mask+0x31/0x40 [ 365.515917][T29777] invalidate_bh_lrus+0x26/0x30 [ 365.520753][T29777] set_blocksize+0x242/0x270 [ 365.525330][T29777] sb_min_blocksize+0x9d/0x120 [ 365.530081][T29777] ext4_fill_super+0x3a5/0x7840 [ 365.534916][T29777] mount_bdev+0x1e8/0x290 [ 365.539227][T29777] ext4_mount+0x2d/0x40 [ 365.543364][T29777] legacy_get_tree+0x70/0xc0 [ 365.548049][T29777] vfs_get_tree+0x4a/0x1a0 [ 365.552457][T29777] path_mount+0x11ec/0x1d20 [ 365.556952][T29777] __se_sys_mount+0x24b/0x2f0 [ 365.561624][T29777] __x64_sys_mount+0x63/0x70 [ 365.566212][T29777] do_syscall_64+0x44/0xa0 [ 365.570625][T29777] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 365.576516][T29777] [ 365.578829][T29777] value changed: 0xffff888105d02750 -> 0x0000000000000000 [ 365.585927][T29777] [ 365.588241][T29777] Reported by Kernel Concurrency Sanitizer on: [ 365.594371][T29777] CPU: 0 PID: 29777 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 365.603119][T29777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.613158][T29777] ================================================================== 05:00:42 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffdf9, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:42 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:42 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0xffffffff00000000}, 0x22}]}) 05:00:42 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:42 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0xfffffffffffffffe}, 0x22}]}) [ 365.704447][ T22] audit: type=1326 audit(1633064442.232:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29794 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:42 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 365.771247][ T22] audit: type=1326 audit(1633064442.292:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29801 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:42 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb={'sb', 0x3d, 0xffffffffffffffff}, 0x22}]}) [ 365.856614][ T22] audit: type=1326 audit(1633064442.382:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29810 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 366.023467][T29777] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 366.051549][T29787] loop2: detected capacity change from 0 to 264192 [ 366.076335][T29777] loop3: detected capacity change from 0 to 264192 [ 366.091695][T29777] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 366.134064][T29777] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:42 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xc00000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:42 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:42 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x300000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x80000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 366.273887][T29840] loop2: detected capacity change from 0 to 264192 [ 366.285581][ T22] audit: type=1326 audit(1633064442.812:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29832 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 366.295081][T29850] loop3: detected capacity change from 0 to 264192 [ 366.357602][T29850] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 366.393744][T29850] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 366.442781][T29850] loop3: detected capacity change from 0 to 264192 [ 366.453998][T29850] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 366.481259][T29850] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:43 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffdfd, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:43 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}], [], 0x2}) 05:00:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x80400, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x400000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:43 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}], [], 0x3}) [ 366.604380][T29876] loop2: detected capacity change from 0 to 264192 [ 366.620396][T29879] loop3: detected capacity change from 0 to 264192 05:00:43 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}], [], 0x4}) 05:00:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xa0000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 366.670440][T29879] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 366.716059][T29879] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 366.754940][T29879] loop3: detected capacity change from 0 to 264192 [ 366.780760][T29879] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 366.806364][T29898] loop2: detected capacity change from 0 to 264192 [ 366.826661][T29879] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:43 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:43 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xd00000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:43 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}], [], 0x5}) 05:00:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x500000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xc0000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 367.170842][ T22] audit: type=1326 audit(1633064443.702:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29923 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 367.211948][T29926] loop2: detected capacity change from 0 to 264192 [ 367.218928][T29925] loop3: detected capacity change from 0 to 264192 [ 367.290953][T29925] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 367.320828][T29925] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 367.356799][T29925] loop3: detected capacity change from 0 to 264192 [ 367.373119][T29925] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 367.402649][T29925] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:44 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff7f, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:44 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}], [], 0x6}) 05:00:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xe0000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:44 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x600000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 367.512278][T29954] loop3: detected capacity change from 0 to 264192 [ 367.528531][T29957] loop2: detected capacity change from 0 to 264192 [ 367.532647][T29954] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:44 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}], [], 0x7}) 05:00:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x604000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 367.567250][T29954] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 367.588862][ T22] audit: type=1326 audit(1633064444.112:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29951 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:44 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}], [], 0x8}) [ 367.669852][T29957] loop2: detected capacity change from 0 to 264192 [ 367.733826][T29980] loop3: detected capacity change from 0 to 264192 [ 367.761126][T29980] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 367.782807][T29980] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:44 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xe00000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x700000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:44 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}], [], 0x18}) [ 368.075139][T29997] loop2: detected capacity change from 0 to 264192 [ 368.088660][T30002] loop3: detected capacity change from 0 to 264192 [ 368.138199][T30002] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 368.167434][T30002] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 368.214283][T30002] loop3: detected capacity change from 0 to 264192 [ 368.233485][T30002] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 368.260797][T30002] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:44 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff85, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:44 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}], [], 0x26}) 05:00:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x10e0000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x800000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:44 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:45 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}], [], 0xfe}) [ 368.431757][T30027] loop2: detected capacity change from 0 to 264192 [ 368.445347][T30031] loop3: detected capacity change from 0 to 264192 [ 368.464150][T30031] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:45 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 368.488299][ T22] audit: type=1326 audit(1633064445.012:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30038 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 368.552959][T30027] loop2: detected capacity change from 0 to 264192 05:00:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 368.593962][T30031] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 368.601110][ T22] audit: type=1326 audit(1633064445.132:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30051 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 368.644447][T30031] loop3: detected capacity change from 0 to 264192 [ 368.660966][T30031] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 368.691714][T30063] loop2: detected capacity change from 0 to 264192 [ 368.701772][T30031] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:45 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1000000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:45 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:45 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}], [], 0xff}) 05:00:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x900000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 368.966652][ T22] audit: type=1326 audit(1633064445.492:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30080 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 368.979819][T30082] loop3: detected capacity change from 0 to 264192 [ 369.055662][T30082] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 369.077641][T30082] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 369.152783][T30082] loop3: detected capacity change from 0 to 264192 [ 369.164088][T30082] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 369.190530][T30082] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:45 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff8c, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2040000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:45 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:45 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/55, 0x37) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="73623d30783030303030303030303030303030303022008865cc0c49a0afb97e6c9493dc6f59c5a069f4ecfae65137988469b9e65cbc06135f0aee0360ad8a7709fabc001e7a99722fa0ec"]) 05:00:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xa00000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:45 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 369.345024][T30109] loop3: detected capacity change from 0 to 264192 [ 369.347575][T30110] loop2: detected capacity change from 0 to 264192 [ 369.371288][ T22] audit: type=1326 audit(1633064445.892:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30114 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:46 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x2800, 0x82) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000180)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="73623d3078303030303030303093303030303031302200786dd31c232ab975475bf476b55f96aa1884b6ef2c4a5aa9b26724f4e63b6f7425c1b5def4adc283e0af8d878ba53e5236510aed667185c129c252fcc0898f187220f5525104a90bb8ed76ddd3a45d01f52ab39a76bc9e38f006adaba27afc9b2e009fb1646bcc403f5e4606665011367b87720acbc0d40aab935e236505a5278aee47db926d5100f57553a4ac61b6aeebd7f534f866f1080d53d09b7b31a2c61b2f911381819fb0c351c08beb6a657a61766b938b04880684720fab60"]) set_mempolicy(0x0, &(0x7f0000000000)=0x1, 0x7ff) 05:00:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 369.449843][T30109] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 369.476739][ T22] audit: type=1326 audit(1633064445.952:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30121 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 369.503424][T30109] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 369.538600][T30136] loop2: detected capacity change from 0 to 264192 [ 369.567002][T30109] loop3: detected capacity change from 0 to 264192 [ 369.583485][T30109] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 369.621432][T30109] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:46 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1100000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:46 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="73623d307830303030303030302b303030303030302200638b13364afd0b95dcb22c0c42c30b6c50be3cb38426563818de2dd50938b910ccb6c4888ccf7de11b8ba9a965410722004eff8fee0e0dbe5f628c6470bf2f06ae55dd6238d792691f7eea4305a499e0f9de1103a2936fbf35ddf39d58f187d3e2642348505c724bcd6b4b7a06a9da704c8acd9975dcc1f5312edb21f532e1394d3ec60d761231d344"]) 05:00:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xb00000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 369.875897][T30162] loop2: detected capacity change from 0 to 264192 [ 369.884824][T30161] loop3: detected capacity change from 0 to 264192 [ 369.926115][T30161] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 369.956474][T30161] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 369.982731][T30162] loop2: detected capacity change from 0 to 264192 [ 370.003954][T30161] loop3: detected capacity change from 0 to 264192 [ 370.022767][T30161] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 370.060684][T30161] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:46 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff97, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:46 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB="73623d30783030303030300200"/23]) 05:00:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xc00000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:46 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:46 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000000)=0x1) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 370.306741][T30202] loop3: detected capacity change from 0 to 264192 [ 370.308276][T30200] loop2: detected capacity change from 0 to 264192 [ 370.325258][ T22] audit: type=1326 audit(1633064446.852:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30194 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xd00000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 370.377574][T30202] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 370.403870][T30202] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:47 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x7d5748350a198f42, &(0x7f0000001480)={[{@sb, 0x22}]}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x180842, 0x0) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000180)="9eeac05dd4d3260a6284e2919b7f8f5917d02b01032795c4047590be204b9be9612e4a2064c5f9601433575bba366479d21da595d0d4c64a7d7f4866d362fe88f2ca57e053f04abd677bbc51cb70803ecef348cd72c1e24b50383f6c7a16e893285fc22faf418588d041bcc5c0376aa79953cf0731a2565eff73a40124d4b4b4f4a11ee3073c6cd00b1d15a10e0cfca2d9de7fec6d7f762c0c4cd8141616e12b10f78ce12ac4754304aa703cc1191ba13bdde6294709ace0baedb9909e6abb1ecb2fe0f5f1e21144b333f3a7f874df50cc1d2744a9e36489e45e6a8541fc4d1184846caa94183131db9fabd0594d3bac8990dee80b72", 0xf6}, {&(0x7f0000000040)="ad21fa848a38ccff530c42e09327ff45c2b3c32048c1ba68ad9521ec71251594484336c75879bed3e079c7eb4bcbf83bece3c0fda881664c40", 0x39}, {&(0x7f0000000280)="f24794aa78316f0cd7e9b5fcbd3dec8b5238525db4ca4672693fb1b4fe0c1aebbf4009fa1b00e3a704885e6ca3fc8187838d980fd8c40fe95c32733dd1c40337d142d388602fcbd27f", 0x49}, {&(0x7f00000000c0)="fdc38e373750ac3b61ab7c938ef4339e37a7c37de7364be20fbfa911ce42da95763771734061db50559d358662e34c768afd36bc", 0x34}], 0x4) [ 370.450926][T30200] loop2: detected capacity change from 0 to 264192 [ 370.496309][T30224] loop3: detected capacity change from 0 to 264192 [ 370.529423][T30224] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 370.551584][T30224] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:47 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1200000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:47 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) set_mempolicy(0x0, &(0x7f0000000000)=0xae, 0x7eff66d2) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), 0xffffffffffffffff) 05:00:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xe00000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 370.743354][T30237] loop2: detected capacity change from 0 to 264192 [ 370.753076][T30240] loop3: detected capacity change from 0 to 264192 [ 370.789690][T30240] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 370.816938][T30240] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:47 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffffda, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:47 executing program 0: getdents64(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f0000000180)="f3dd1da9bfe7e821fa5398c58180bd4751d45eeb673ca4881cee83e467aa86d013dc4a314f757013e03ff39ddd42a9b81a138290fc62a2227b1cf815857b3753336c982a228f7196d08a01a75fde9b755ce1ee12caa38dddad9c62365e9f2e97a4ffa81d47920ea096e55b844593a288f229c831315607dfbcea0136f86aeada929363fe81ce", 0x86}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="9f5d22f5271e641225a0358c5d446f71e9b2b49a19c161ba04fd4dcce1770424e143fc417f063bc9c1755250e8700ad8eac16428879061e8ba6abfc8513d3c664340d1bcaf6f1b6c388cfe252367e1e876c627a6233d38d87ca535803fdcd8e2fddcf1cb9b8c6c65dd8a15c45461a1c58e191af529c46bdac7f078f006338c0c771bf868d9575401bf31682534deef18441c77ec480164f74822013286a9086fa7ee7437ddba4a5998951500", 0xac}, {&(0x7f00000000c0)="9fdf9f44ca73705340d63ea3e8e0edaaf46fa3eb2848b7741a128416f69d49048d48869e3735c22c20319cef19", 0x2d}], 0x4) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x2) getdents(r0, &(0x7f0000000040)=""/16, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) fspick(r0, &(0x7f0000001340)='./file1\x00', 0x1) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xf00000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x6040000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:47 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:47 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 371.181938][T30265] loop2: detected capacity change from 0 to 264192 [ 371.187958][T30266] loop3: detected capacity change from 0 to 264192 [ 371.211441][T30266] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:47 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) [ 371.267257][T30266] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 371.275335][ T22] audit: type=1326 audit(1633064447.802:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30282 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 371.346652][ T22] audit: type=1326 audit(1633064447.872:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30289 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 371.430711][T30285] loop2: detected capacity change from 0 to 264192 05:00:48 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1800000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) 05:00:48 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 371.640231][T30304] loop2: detected capacity change from 0 to 264192 [ 371.656480][T30310] loop3: detected capacity change from 0 to 264192 [ 371.667482][ T22] audit: type=1326 audit(1633064448.202:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30303 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 [ 371.709901][T30310] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 371.735057][T30310] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:48 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffff6, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x9000000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x1000000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 372.059539][T30328] loop3: detected capacity change from 0 to 264192 [ 372.076593][T30328] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 372.085591][T30334] loop2: detected capacity change from 0 to 264192 05:00:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xa000000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 372.113897][T30328] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x1100000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 372.216510][T30344] loop2: detected capacity change from 0 to 264192 [ 372.234394][T30352] loop3: detected capacity change from 0 to 264192 05:00:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xb000000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 372.271245][T30352] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 372.314720][T30352] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 372.374100][T30352] loop3: detected capacity change from 0 to 264192 [ 372.381223][T30363] loop2: detected capacity change from 0 to 264192 [ 372.389768][T30352] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 372.442397][T30352] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 372.453290][T30363] loop2: detected capacity change from 0 to 264192 05:00:49 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056300)={0x41e3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5dc0586eabafcf"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055980)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x2, "43c5a603372b69"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x3666548cfe99130a, 0x0, 0x0, 0x4, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100), &(0x7f0000000240)=""/168, 0x1c5e, 0x10022, 0x0, 0x0}) fsetxattr$security_ima(r4, &(0x7f0000000140), &(0x7f00000001c0)=@md5={0x1, "231e5d78ca107cf7d890d9b45ae9204c"}, 0x11, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0xed, 0x2, 0x7, 0x0, 0x5, 0x1e044, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000004c80), 0xa}, 0x9300, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfb85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x5, 0x0, 0x4, 0x1, 0x0, 0x4, 0x8601, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x4}, 0x0, 0x10000, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x7ff}, 0x0, 0xb, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x832d}]}) timerfd_create(0x0, 0x0) 05:00:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xc000000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:49 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f00000004c0), 0x0, 0x0) 05:00:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x1200000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 372.564215][T30382] loop2: detected capacity change from 0 to 264192 [ 372.589475][ T22] audit: type=1326 audit(1633064449.122:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30378 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7efc94e228d9 code=0x0 05:00:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xd000000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 372.630430][T30391] loop3: detected capacity change from 0 to 264192 [ 372.651003][T30391] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x2000000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 372.692157][T30391] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 372.719494][T30402] loop2: detected capacity change from 0 to 264192 [ 372.800357][T30408] loop3: detected capacity change from 0 to 264192 [ 372.829214][T30408] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue [ 372.868628][T30408] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:00:49 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffffd, &(0x7f00000004c0), 0x0, &(0x7f0000001480)) 05:00:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xe000000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) 05:00:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x2010000000000000, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001480)={[{@sb, 0x22}]}) [ 372.998138][T30425] loop3: detected capacity change from 0 to 264192 [ 373.009427][T30426] loop2: detected capacity change from 0 to 264192 [ 373.035891][T30425] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xf000000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}], 0x301c014, &(0x7f0000000180)=ANY=[]) [ 373.096808][T30425] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 373.146978][T30425] loop3: detected capacity change from 0 to 264192 [ 373.163321][T30437] loop2: detected capacity change from 0 to 264192 [ 373.175850][T30425] EXT4-fs: Invalid sb specification: sb=0x0000000000000000",errors=continue 05:00:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x3, &(0x7f0000001540)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x100000001}, {&(0x7f00000004c0)="7607aa8ea1ce4e8d835e5d", 0xb, 0x1}]