0000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:44:54 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[], 0x38}}, 0x0) 01:44:54 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x410800, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000380)={r1, 0x0, 0xffffffffffffffff, 0x200}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000140)={r1, 0x1, 0xffffffffffffffff, 0x81, 0x80000}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001080)={{{@in=@rand_addr=0x64010102, @in=@remote, 0x4e23, 0x6, 0x4e21, 0xcfe, 0xa, 0x20, 0x0, 0x2c, 0x0, 0xee00}, {0x4, 0x8, 0xf1ff, 0x400, 0x1, 0xf0b, 0xffffffffffffff03, 0x80000000}, {0x0, 0x0, 0xfffffffffffffff7, 0x5}, 0x9, 0x6e6bb4, 0x2, 0x0, 0x0, 0x3}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4d5, 0x93}, 0xa, @in=@multicast2, 0x3500, 0x1, 0x0, 0x35, 0x8a46, 0x6, 0x7ce}}, 0xe8) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000340)={0xffff8001, 0x1}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:44:54 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:44:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:44:54 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80, 0x6}}, './file0\x00'}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x5, 0x40, 0x80, 0x8, 0x0, 0x62, 0xc0, 0xc, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_bp={&(0x7f0000000080), 0x9}, 0x20, 0x7b9a, 0x0, 0x0, 0x7, 0x5, 0xfff, 0x0, 0x7fffffff, 0x0, 0x2}, 0xffffffffffffffff, 0xb, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r3, 0x0, 0x0) readv(r3, 0x0, 0x0) pwrite64(r2, &(0x7f0000000180)="2d9a2fef0d965184bc92980d4f7ef17daed0bd3f10d267858db4200f121703b5880a9fa170d4395f7b69d9afd4b56eff7d0649b74a68279b332d3bad", 0x3c, 0x6) 01:44:54 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 632.533630] loop2: detected capacity change from 0 to 512 [ 632.538794] loop7: detected capacity change from 0 to 512 [ 632.552747] loop5: detected capacity change from 0 to 512 01:44:54 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:44:54 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 632.568060] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 632.569018] EXT4-fs (loop7): group descriptors corrupted! [ 632.577781] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 632.579650] EXT4-fs (loop2): group descriptors corrupted! [ 632.580859] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 632.582492] EXT4-fs (loop5): group descriptors corrupted! 01:44:54 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8913, &(0x7f0000000080)={'lo\x00', 0x0}) 01:44:54 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:44:54 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) 01:44:54 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:44:54 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x410800, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 632.770749] loop7: detected capacity change from 0 to 512 [ 632.774847] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 632.775703] EXT4-fs (loop7): group descriptors corrupted! 01:45:04 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) 01:45:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r1, 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x2, 0xe01) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r3, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f00000000c0)={0x3, 0x0, &(0x7f0000000080)=[r0, r1, 0xffffffffffffffff, r2, r3]}, 0x5) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @dev, @empty=0x4, @empty, @broadcast=0x4}}}}, 0x0) 01:45:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:45:04 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x410800, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000380)={r1, 0x0, 0xffffffffffffffff, 0x200}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000140)={r1, 0x1, 0xffffffffffffffff, 0x81, 0x80000}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001080)={{{@in=@rand_addr=0x64010102, @in=@remote, 0x4e23, 0x6, 0x4e21, 0xcfe, 0xa, 0x20, 0x0, 0x2c, 0x0, 0xee00}, {0x4, 0x8, 0xf1ff, 0x400, 0x1, 0xf0b, 0xffffffffffffff03, 0x80000000}, {0x0, 0x0, 0xfffffffffffffff7, 0x5}, 0x9, 0x6e6bb4, 0x2, 0x0, 0x0, 0x3}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4d5, 0x93}, 0xa, @in=@multicast2, 0x3500, 0x1, 0x0, 0x35, 0x8a46, 0x6, 0x7ce}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:04 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x0}) 01:45:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:45:04 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x410800, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 642.048529] loop7: detected capacity change from 0 to 512 [ 642.051004] loop5: detected capacity change from 0 to 512 [ 642.073848] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 642.075458] EXT4-fs (loop7): group descriptors corrupted! [ 642.085722] loop2: detected capacity change from 0 to 512 [ 642.110858] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 642.112610] EXT4-fs (loop2): group descriptors corrupted! 01:45:04 executing program 3: syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @multicast, @void, {@canfd={0xd, {{0x3, 0x0, 0x1, 0x1}, 0x2d, 0x3, 0x0, 0x0, "d70103fbe633c0c6999058986df290b613754d8dce9b66ba5263f3663baec5a6e5d33d9b4fc4fa359bfe3ccb53cf114d4e46edf98284dcf528dc120aebfea6d6"}}}}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) sendmmsg$sock(r1, &(0x7f0000006140)=[{{&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x4, 0x401, 0x2, 0x0, {0xa, 0x4e22, 0xf6, @local, 0x6}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000240)="3681d3fc9f6ad8f7c052133953d3ac4b372261fadba1b5c3b08b394c1395b52cb8e9139d2afd4503388dcdcddb2e0e83086a50306c42d0fa0db8f2269eae01ad713b5d7345c46cd8a499def1aa207cfbeab8364e845f47a8be8dc3976208592b8b46699b11fce0b863b92eea30ff4a135bce7002b6d8a55905091afc1a220ae259ad0444e852f3a9", 0x88}, {&(0x7f0000000300)="9c590c2404297c6bc55986aa845fd00a68a4c08a44bb669d02c713b45c3c20b2b588852692793bf3", 0x28}, {&(0x7f0000000340)="616758cd9d1defb45b96d56b3e6e5f690c932c56b20ce72fd9a98e724684580bc49a95e97451de71b82df44b8fd535c31d65a639165b89f278d781a8f4244c8c2eaba6b5b81c0b303579bfcd8ad39b11ffc964c293fc48bd344c23e20a5f7a68786985ca48a8495ab74fd381a330d30d953037fa3a42df8803300449a222330311db016e3d1991", 0x87}, {&(0x7f0000000400)="10b09e5ef3f4f984a545940293ac87a548444b74d1f5710a6d6f5c03c0ec59", 0x1f}, {&(0x7f0000000440)="6cdd10e354b20886d67b82bfc22b3089ac4c9635d14fa46aa991a4e3801e0579d1ff65ed7351c89a0945674cf09071c3cb775f8199a6ec846aac57198f910d632bafabe1320e26b406567000f37821a75cd09fbf90f10afa6eab02a5ca9d53444a1c90244af43e7ffca819e0defb70", 0x6f}], 0x5, &(0x7f0000000540)=[@mark={{0x14, 0x1, 0x24, 0x5}}, @mark={{0x14, 0x1, 0x24, 0xb19}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x7fff}}, @mark={{0x14, 0x1, 0x24, 0x9}}], 0xc0}}, {{&(0x7f0000000600)=@nfc={0x27, 0x1, 0x0, 0x6}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000680)="37d347b07c9b34101a00a07667e578bd70a042d7b5bc357fc6dd7e39750e3b882b3445a8f57d8a12b95047470f6e05ada660520f0300382bd7518ef1ce697047ca3634be271c41eadeaaec325d81a8b0d66d389017a06a477ec6a7", 0x5b}, {&(0x7f0000000700)="d2e91037ec7a154327d64adc390adc713785bfb266888956a93d4135e88109bbc0a7f469f962ccce36113ccb5a3e3fcb7614cdd415794a44b1af0ff38af09be94b69", 0x42}, {&(0x7f0000000780)="7ebf8a436ecd7f78f4aa39e59faa4cb8256bc34701f4357d50fe587b17ca24c338a974f0916dd562c22d57", 0x2b}, {&(0x7f00000007c0)="718d28f7", 0x4}, {&(0x7f0000000800)="7ebcfc5532546a9661f96432c3d20c47bedd4187a66c73d7af326ea13b92c1be8c663de3ace4a8a1a8e849e89897fac840381b67811306bf8a107cd523c31f8d1bde9b3560db37572e29cd362244916b42e44225738c69c57aa40bc650eaa2d69ee7fcedfdc78a11dedcda12dd8ed4d33cd61bf3b46266b905ff8258a1327bbb53571471fca52af20a8ebc0c12bbd03d5513f7de007884b1721468f1c4b7665ada5bb73b791a8ac86275d1773927b49d323bb98ec79ebd54537b0f41a617430806add6c8ad9bce370126c954e9b621c29264", 0xd2}], 0x5, &(0x7f0000000980)=[@timestamping={{0x14, 0x1, 0x25, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x80000000}}], 0x30}}, {{0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f00000009c0)="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", 0x1000}], 0x1, &(0x7f0000001a00)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x1f78a21a}}, @mark={{0x14, 0x1, 0x24, 0x18}}, @txtime={{0x18, 0x1, 0x3d, 0x8000}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x78}}, {{&(0x7f0000001a80)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha256-ce\x00'}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001b00)="7782", 0x2}, {&(0x7f0000001b40)="9c554c4573f68de5728744", 0xb}, {&(0x7f0000001b80)="a71e7fa296219512049f39a68eb4858de965163aff0eb5751803513af5831a96970dca5413e7022174772a8347b3f302def11e7eb1031d72c6aa9c7ef35cd3b17e8a4299af2127c5b832673c6ec137d68abffd7d610fbd74fced1dc1af535fc5c87a1c3e4d10fad8f6f53055b59060c7af6990168d333658a86eff5d00f2dfc33b8e8d99edbd58e8ac67dda841b9e8228bf688ea03a241f7a3b55e61f2ca9eedc3fd392664cb0058593eb5bb2d04ea8b1576b3d183d9f7b95eb1051ba90d0636d084f46e5e3dbb1d76f3b38a957ed3ee89487ca4aefd260421d40696a7265dcbdb45748f0d0073cd0a8611776da919161c9b", 0xf2}, {&(0x7f0000001c80)="a9dd4706cc3c0b3aae440c9c4b50965f9b483f", 0x13}], 0x4, &(0x7f0000001d00)=[@timestamping={{0x14, 0x1, 0x25, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x10e}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}], 0x48}}, {{0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000001d80)="aefc9267a333c2d9b997e5169ce4aa85f6a38924dc294ecb2a25589df73d798400cf9be6cc772d9d1247b3b146a6666f803e8668f4b2be801a5203a0786ff8fb00e0c3522e267d5f66bee5fd3bd12ef564d15434b251f94ce9496887bbdcc8ed01b0ca1bd37733950ad9a9f4591e34e66c34b2aaaadf1983f5081a", 0x7b}, {&(0x7f0000001e00)="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", 0x1000}, {&(0x7f0000002e00)="6425c88827b7ce252269ffc22d14ebfa16c8647a91d8ae497840a23bc7c6d7fa9178a947786394b59ed4db7362d159791a189eba4ad10791fb561c692e4382b0fbac405b0166a34447b30121db1f6ae47a12bd6adaf3301adc8f0b8d2a68a1fc9ae0fd5da3684d59d65809ba6fd2105364b08347b9473f1276c786d31fb499bbbca060ca07191f10a91f02c6ecdec57423b01be4ff4a84ed78e6cc35e9222307a21403fa0112bce928028dd9af297667aa0dd2e330db9ba756fffbc1ecd86c6b121c7b0a9af7e1f9157b6ba880eb", 0xce}, {&(0x7f0000002f00)="df625b2baf1a36993af57787483bf654e2800f1887675f40a4456d07aad456b06ab61ba9c27c919c503add3a511a21a3968e38bf262a2f8c1ef90a2940a1fbed69aa812ecc2007b6236dee24251adacb45fdfb04d6fa1e6a3e724d99b864b7047b70b98cae764f2a77666e9cb82802016b10", 0x72}, {&(0x7f0000002f80)="0de5468c6375f606bf6e316c6c62af485e73ae7adc9ba8a138b7bbaf3d177e7941ee19298aa7cc737ac96713c03b95e91975cd922c76d2a40c62b067ddc5f2fe47f890a2a8103655247945b676506db0de7a142597fc5513fa684cdcdd139892d5d39e6c0409a72a539cde73bca77882972a5d3d3d3b3ef0e02686c37fbc1cd5f1004a726b7aad3fc0151ae66d8a4534d03eb142b49dcccbfdb921c1bdf5bb9673f5fccb543b8abd553d49e5e3942995a541603409234fc017b0f8d385367e1b04", 0xc1}, {&(0x7f0000003080)="15de46ce113ee71cd9d5a9a87d662473d4be19686d6b258e7a8a57ad1742b0e4c1239e86c024381816ba5bde118560f6e58a57940090bc0142aecfeb478beaea04c1da25fce4f64d573ef78d3580173450085f44d42493faf4931a7e6d81dcae3d09af949b4e7f2029cfef2cc3b92fbc64516da46e0c41105a399f299fb84aa8068e482c1d267b4f212796f98f424fad0bd754b8", 0x94}], 0x6, &(0x7f00000031c0)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x40}}], 0xc0}}, {{&(0x7f0000003280)=@nfc={0x27, 0x0, 0x1, 0x1}, 0x80, &(0x7f0000003640)=[{&(0x7f0000003300)="a17c9240206a3ca6bc", 0x9}, {&(0x7f0000003340)="ebdbc8003d5eadc4f7514de0e4a6e57fce43ee0eb84cc528c2bdcbb7b61119c25baf495501b7b339245b622774cc8ba193e18f1b55aa22dde04b88e9a63a72e3b07da55c496cd97c1507b9272f41c23e522aa664ed342cebb1fa721deb714c7de4db24c83f13f546a07b8585176522bdc29f113e7a490140c28d3d7b235f3a8524a44a", 0x83}, {&(0x7f0000003400)="c96e67937c1c2ea5ea4a2ef8a109fe09d25c7387b1c9e7e71579c930b016a247712f1f918c9c07e9a3ded6ceb22202", 0x2f}, {&(0x7f0000003440)="378b92e8c1c01684a3a00ab1ef145477b324b821c53248b8c5dbec50c5a2ec128d003d176549", 0x26}, {&(0x7f0000003480)="00afdeca501ab2f4acb3cffc374c54770a70e27ce053c040332ccb1d2581df599ef5b15fb477fa8cfd48503e4f15122157e0d1a867b149a36a0df458663d10dd0b802a4ca92debaf853d88d38b03190cce1bc3034177c9540ac8ec6ca89dca53d5962de821a7dbffa2087ea53dad67e07cd1e1e606c116c6faea4d51c4e7039f8633c9b3ae4cdce38480a89b0676fcca78f1030f0d24332ebd545a2fbfe288e13573d057e3b66c6551", 0xa9}, {&(0x7f0000003540)="d0777d3508656e3be7efeea77faa37770db76fab24de2b60930a631875ca6099d32fa163b43472f1c84456266ce9ca94951e24f60a1fbb8247b237ba318025033f2d976152dd136183b0a2f7d34e8710f2f502e782403ebe6a11f9539d5b76b78fe8e18551063d27f76e402d43cedb66f6c78ea32516483634e673e6c645a4832e1aa80d70e568cd1facec749645005608fbc775cb500f43f18e9ec67f3b6d041e42ab9344032d389cec72c2ba8f778c2f726be1de14a6f24a3cf47fceba3d90d2ed162808de38a97a61c8463c48c4bee4c198", 0xd3}], 0x6}}, {{0x0, 0x0, &(0x7f00000049c0)=[{&(0x7f00000036c0)="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", 0x1000}, {&(0x7f00000046c0)="411bd747f36ff5f90b5f6b96aa413ae2872fe483a8ddb6eb486e0d1bc42b9c9c42c86cc1fcc93605bdacef7a3502f5c04e549ae03d6cebd48a491e15155e27d574505842e074f02b089efce2aa55f3abe3e2ce7020d01898402ceb20ad10e34e92507b262676f3732f5f10990fea00fc11457f299ec1246cc964221dab402a52fefe87ffd779d1fc74e3f07a7d1e3f5ee61ff61612bd3fb72c13", 0x9a}, {&(0x7f0000004780)="68a7a2e40f48e069005083a536b5aabfb31838e3b28e63e4bf6d81f9f3565a18e8536523c55474adb906644d932bd61948b1ae315dcac8098228914688c66b0b8821b000d2a929d8e72d7f66e5025378fd25d8a0a802ab9f6c8f64b3cef9f4205fddc98228e4d63099d6329dbaec786cce105374f502f2190919a6e51e132fad52855d07390fd45cef17e5096f6636", 0x8f}, {&(0x7f0000004840)="6171c1e2478db1694a192d44d0b850aa7512097be904ed948301e52b6847f4897fa1cb92274b8569f3d6c20810dc7da8064842fe052a3a702d", 0x39}, {&(0x7f0000004880)="0ff5e75a895f63c39b1e73478815145ea815365724eef804b76dc593050d6982d153ce9b7f819fd3ba7061629077823954cbd27f7493ae4f76a1d7fb6f0287ac63ba0c1d7d48166b3ff9916792fc2808bd4b365b1d0cc3314ae97f67590b92c83dccb046864372b38312dff4861876df346a84df20a903b6346edcc2c120f09504853a43", 0x84}, {&(0x7f0000004940)="378912345f7038677959e463e6385e8de6be9382e6bb1a52daad210121b631b93d80accec7d0ab131d4ea863e3d78b1d1588256ce5261935d1c956babccb30d72c3c5b898e698863acc6e1cf925c89739c062a1c77cb9af35a72b2fc73cb73fbab6890", 0x63}], 0x6, &(0x7f0000004a40)=[@mark={{0x14, 0x1, 0x24, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x101}}, @timestamping={{0x14, 0x1, 0x25, 0x7fff}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14}}], 0xa8}}, {{&(0x7f0000004b00)=@llc={0x1a, 0x335, 0x9, 0x5, 0x3f, 0xf1}, 0x80, &(0x7f0000006040)=[{&(0x7f0000004b80)="e2b32f608d6a2e7464e4aabe7e6257611f7046ba6f3b9ceea759749e5bafcdc33d92b5ec0496f10dc217a84c326d628beccf0b0eec30be2daf737ef7034584cb728bfde4db696909f15c53aae2c540a019c9f2ae94efd573a9246c2ddc27567644a08962b704a6ee12380cfc9cc9eaedf1cb7d0004dfae70adf2967567457c852eea39b2321464d6e936975a11153555e61f0a4efe2cafdfa1dd52776abd9ed90104238909f54f8ab624c306a833048c1f3b72ba812b9994e77ad190c6f6f457d1dc026744f07f2084177916dd03bf9d6b2b8fb0e76494667107", 0xda}, {&(0x7f0000004c80)="676945012296fbc530290143d21b74f2f45e3413b371cea0913278d547e5558009aff472dd2fb8dc9c037a94c58cb9fa46dc62012d399954642d3784406152c4c6a4556749abb7e76fed20fd9c40cf27bb13915f5c05fd7519ab50b5d74dff702165674359959f14f99941fe02421a7684e557", 0x73}, {&(0x7f0000004d00)="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", 0x1000}, {&(0x7f0000005d00)="67109f5686a324cbcca230d648c6100bd115be3d26b32401efc56b2c625753098ad8e1349fc4fdfa7932749feefaf3e3af7c2b30", 0x34}, {&(0x7f0000005d40)="88cadda16c7105a09f5f3aa75dbede8e732a8e889c69031c88a49a517ef8289dc76997365ce0d57dc57e6fb8dc5185addd8d686b6a1aa4b193bb4c51c5e277e06df22454b2fbd7f46b89f3fd72ec43220b831de459dab21fcde895c4f3138a2bfc38c69dd3e434fbd0a70e719cca3c27ae29903ffce20adf8a452765a976b487468a4870720e64fffcf685cfd884483bf9094013100fb7028f792f464e739566f9f4a33eb569be65a516cf70fd1971c807b191ce44488736b660db72f21b954f33884d95bd82dab675e7", 0xca}, {&(0x7f0000005e40)="9284cb6e99730d0d7908344d9da9b7160991b5ed0512947f581c4be3f6dca2596edb84a5709dd1d6fe651d8af52d8d41f04b5efd881456cac00c7332a5883c4ca3fe37414e05a1f9bf5a16acea0d7c9bea959ba372d0640e0942d1d89d29796106b3e432aab9487f3b714e6f7024435dcde4e32d730afe65190f09a5bbac9eed3cf1d748702b68b61cde0ac635d8c21aba97a593dada2fd95727a8fec683684838bf4c26d81438422a8b81ca143075f7e9b198c5441b9dbbfb26322caf806f075b2c33344776c99ae3c892", 0xcb}, {&(0x7f0000005f40)="288182dc71e95265d40efd92db7e36c09718fd7e9f6a4735834905327efa3e75c82446eb424a", 0x26}, {&(0x7f0000005f80)="6c2c7fa317737b96e62df44dd186e0446af44e88b63c440726c24b9b0d41c3a23dd58aabaefd5d188fd551f540d14e30aa1e9cc37711096de9173798b788b70063a1c850cf05ac7239c52379785046e9df1cf49bd9c6f66704c7ac650290913a", 0x60}, {&(0x7f0000006000)="8e7ebd8a63023e0f606845a3a6acd51a4ea3ee5c679f152ab4d4f816e5abd78f7bd8485258e222cbdf5c5fe8a9ec5f0df2b921e7dd", 0x35}], 0x9, &(0x7f0000006100)=[@txtime={{0x18, 0x1, 0x3d, 0x9}}, @txtime={{0x18}}], 0x30}}], 0x8, 0x2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r3, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000006340)={0x0, 0x1, 0x6, @remote}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) recvfrom(r0, &(0x7f0000000080)=""/145, 0x91, 0x60, &(0x7f0000000140)=@phonet={0x23, 0xfa, 0x4, 0x7}, 0x80) 01:45:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:04 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) 01:45:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:04 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x891d, &(0x7f0000000080)={'lo\x00', 0x0}) 01:45:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 642.270839] loop7: detected capacity change from 0 to 512 [ 642.283807] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 642.285334] EXT4-fs (loop7): group descriptors corrupted! [ 642.297556] loop5: detected capacity change from 0 to 512 01:45:15 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x891e, &(0x7f0000000080)={'lo\x00', 0x0}) 01:45:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:45:15 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a00e00000020000000000dfee541aa8"], 0x38}}, 0x0) 01:45:15 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:45:15 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x410800, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000380)={r1, 0x0, 0xffffffffffffffff, 0x200}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000140)={r1, 0x1, 0xffffffffffffffff, 0x81, 0x80000}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:15 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) writev(r1, &(0x7f0000001740)=[{&(0x7f00000000c0)="9dc0baee540b38d3b9541616c0f6f032cfaad53684c476031cd8fdf90fdf796bf963b98cb5acf2b6be124d457bc8ef010187633ae454e018096d1c38799f74b56865876a3ee8b843a211fa71123648aaf7a6df1caa16ee7a8ad9f3579eaa1d0d1d2c54f0e31062d4fb6dc2bd559e94b2623f7755cdb83d65a5b79b0e7cc07bd4290f4be9522ecba09a2bd0f4ddec89e3cc9da1befb9ec8da989d0d7e2005590714f838a5f270c43d5e18f3a8bf11253d89a492d2a48f0776c9cd3d6461af17350d97efcfacac5a0b92973581", 0xcc}, {&(0x7f0000000240)="36eee117c7ee37d6830a7f4314b0da1b351a133b4b3dce48349da7ee9e4b2f7d348dd2921c529e99bced57e67cd94bcb23a6493e1c9bb78425c64be2db201aa4bea08f9950fc6267986f564f", 0x4c}, {&(0x7f0000000500)="a21fba348ab42049c624e4a77cc922525250bf0fc8095d3ff329637d85ed4160a89725526cc55b722d42b1bedd2f2aca6f71a384d4b061a27b5f696b82214fa966c5cca41ecf5ad8f5dff28fa9631b2ecf9988048b2a862b6d0513b02d9675a3581d97e5353a114e5792a7ea2a0ac1d9c61aab7bfdb6da2719f9b7ce8d93d687f3339ccd68770fff859f285effd4c28a50537671fb51d02409368a65e3810ecc8f6fcb0d0ed87957e4e9a168fb202c8484dcd8f8258043b798afa157f00879a5723cc795278f0def99bff0935f75f943d320e15a07611f37b3263a7e732cd52d57b19583f973179136792cc22abcfe4c5616188e4096cb5c97eb536c622c8883585a19b8fadb1472dac83eb5e44d2684537f2691f4fdc73d42e869eb3a98305f6c5303b6e6917b591a5ed4f6f51f763a6fbb327be1bd5a2679d4f3877e2c5ad6960d315e7229bc9a7534b37f8142173fdb3570a1dba393d0db12b7ef88b8439599c9fc429140d779e22b1760f6a85f65a55aa4fb201a8ff26760ffc323a3a9358f2f7f33e53c9e926abc0ab2409fca1e31ebd97bea128efe7a10781bb59d7fdf976e7fca61df6233f804a34d233820a27ff2ae4362dc91b6bc89a03d7777e1a758aeeb23e178ae0e5833da724ccdf403893ed96853222ed6ca315cfe127f7a534be8181afff9d2e474113e2d26333dfb6be15628569e031f0800476a278c6b158164ae075dec4225682a8388edfe52d5b9473c317fe912ebf5e44882ca942741b96d9362dc32cc0f71e090578a85c7ae93f92596d3392f151608b5ba72ce6a425d160470987c75df4b4020d6629e46fe95379ccaae6f8b2432e58b02ca3c06ba5f966afb56fced5af5c0b934b9ab0a95e559d8c44bee80caa345a99d4e370907fccaac11c07b8dbc34191fddf34d6d19a733b354e447df1af1d4278dd38f4930e4fd8ff84a44eb84dd6c9f227fd0cc4e7820720bf5e70acf380bb5d1e498dc78bf17d7e37e742be9496374ca473851a8c2042ae9d9bb9fc7070f0267062255e837250b42e06221b375f28f5cd3d40acba6c159146cd01edb1aff7721af3400cc6b36ee6501cff6e709aa68428a5310f0f25a5cd487a1a4dbd40981749167a4c41281dd63c18dd9abaae678a8f7c3d8fb629bc89ac4fc6a7f35ac5e03835fb31f60297d1f09eaca668e43cae077711bc05975a4440764d90dcb9eac8202eb229f59aff097a6c3e165ed719b6f50f0c0593a86285ff81d3930425eacf3ccea0b76e8e80fbe55c7489a28773c9ebcc57178c32e468dcf1ba1069128a09d094d240426d891267da0e1554fa554a9d0ebcf2465559f6b9bde14c696955c28dac26566177562044bcc61edfb506cab7943fd81d26412f7fd0d66924a4927976ef06ee1d741371026784e0a8412c14207d04186d311a1f5556e619bc3ee0e44fa52b4a13a268bbaf4ce0316e0be4d9a5acfd77fbe197a51419386b271aae7dfba6bfb699fde7d3d4c36affc0faf7ccd41856b2d02ece93085ef64a3dc07e48b27721723e37ab5c79497e0de9174d98536c05b1e00b652d3bd0d0ad367d5adf16de3879d24077d02314a8a41374f27998054c1dce795e17080b9afd74a35f36504773279c7cde80591c42dab10d2b5367994999e700e7ee2f785dc5fa3de32af6d2607cf8ec79fde0944faed46b1fe023c4f4cb93cc2a2409608c4143adaa81ee6d6a62ebbcf50f567883809874fc916d3e4584bbff03aadf3cc960432a4edbae2834bf94c7e75d2738bca9bab69261be5dc0915148b951c57059240deac9f95d2510025846309eb3940f23e0863108d14c6a02dc1ac3180a2ff9e3c22958f31323747979796fcf8c56d7ccf16e6752e170c13be6dc9c757f9ebfeb70b111782f0976ea2530e2ec993a7a3da956c63b860313ebde43c8f2197b273fade089689ba368dc655ef1c54a3b3f5137ecf1838457dd37af780db05a3d5255f4bb9c3b8012519d35dc4f8a2fd596459bdc2ddeb29dd7394158f68ad01fb4463576fd639962cb3fac8ee2d88cdc2ec6ba26dbfaa2088e76045330ca643e251c68cf23401ed5eefa5692c594804786db286d64af80ea630e0b4e32e4913a1b87a6834429601de5b4034ceae8f743b67bf7c6e43aa7f54fb0e28920c45ee15915bc34c072f6809e030eda6b213bc395be1e532556f80a175667b24cfa5c94e0788d4648beb507a2cb8a324b07d4c04ec998d8e41097430b81afca98efa062cffc6193e7ee31f86edebffa5d9eecf47f582c9cd541f52311d42b3f4038438f44367c8a3b05e0a14d378e370f783f09bc953b92ca2f15891b64ce0cf405ee7296666bd65aed3a441e6735875be283b52d1350ec787053e6c531bbf46f47e9261fc4161a24d055d4001560fcb57fd44e1dad5d831f40dfaf24ab4b11bc1ea96d7965341505f2c8da8260c68c2353df0cd248816b48cb556ae3ad63a4a9cda01b34fb7e77a3b4f704020f8ae9de8c00e414cc94d1d6abb2a9a7dcc4eb3b1a615519b0a9dae1db1d186248ad6c7711589e903d80dc24e437fb5c31df290e7491b814d96bc8e503b4626cf3136cc1a372e01588fd89e7b5ed0a8c5eba9ddd1a349e3081e3e7a49248cc0290598727c0185d0c8ab30405963bf299c027795c131f46288d42e696226705357a2a6bde03dc52a334bcad931c524ab42952514f09a838ed8ece9485dd528a0294ee2ddc806cb64f97d4d3394c6dfb8ff543d20ccb713390add47264a779cac0ea62aee108826353b91aec55aae379bfee6939eecefafb7dcb9de6ebaae4487b89fa3cd6f659e8beb14235989a4aa61221d8d43c7d913162c6f41d96d8eda6f81989b33ed9a33660d0d7ac565652ce3d53587174aeabb52a5a338235701e8de9445ba7c3b7e6802bc3e785c583e39b8e769bee36db4f8daaf8fca41c33ca26f5a2c494cd9ecc18933d36c07865fe27707841465152ed8e77cc0c31a347c3d2be9f9ba576d46dfb1a2848d8225c87888ce5197a4b76b17172c8bf7376fc26ca05989a92aa87e6a4f446e0684d9e3c7e6b9d3c77562aa8cccb308b055c481405164e5b9d6913d9e6f28657a2a52d205e1ba25f770d7ce33ca2a13bbcb16b34dcda4fffa170e9bff09bbd3ab9c459ca9baefc29b2e72497c699c04355e2365c30a13e2568b22dd8a790b96e5805f1340fad4986fe42b578f04f2a979d12d2ee691d47a934b6c022be54b3b36c8dfabfa2d8b41df8fb17ffb2fa86eb0c8cbc2a62d3ae400df148fcb96287dd42c3151f3329245607b66d156fe55fd8ed788e6e660c44f2bf3215d821c63c54357f619eadd469577e527db9f10411b4da856f6a0026fb521fd25236f24b0cade2ed65f17baf738ac6bfe82977abb4033aa33f64f9d13a51809ba40541aef394d467bef7730bd4c1a9173c400b7e500fc57c0200a9717ef9fe1ac90ace55b8ba62bb4942a053d0dc28b7adb21a78e67e0c44ede922ee6539774725d9efb765b53152fd6dde9d01c95bc4802fe87deea3d0ec2b6ef015d957f7c6c3773b0b466de67244710059f38f74725a56c6365f4df435688b36948b67537eaf6bb88813fdc0d980de6e6e6119a5f037f3c36c3926181407b5809d4b52ff018d7b437c156340a76025ea413ce82edcec347a84f06ec8fdb75d8acd23613d0e1045d42127957187c3347097e5193f3cc3474af8ca59fb0e5d1886c75e1c8647f5a42ad1dbce1b30d83da7538f7cc6ce7e17615c7e9ed352fbe3dac00b1b4e8ea668554b9339c8ce86dae3706d18886beb31b03aaba7b11821d5fd25d0799f37d344e338b520882b7a297111b2c54b40f847828a51ea6dba8f2c013fff7652fd2598cc42c1be9058cc76761807df84fdf8974cb876e92c3d79b7636737a463e3ab35242f6e56e17f18a9da9d4240be126f80427b865bca2e9649974eb590e8985c41594c8e01f31155b696e8f40274d051ec1e69c3d0af3c1e6db8ae5e029a9fb0389f70a6e2ea71dea3647cb6fe3a2399441513cf7b55770390d72866a59a5cb593d533f34874ca21b70ad45411b3e2770094feb8c4a844662c41b84119dfff5f819bfeac36e7e5ce0fe13ad54717ae47b8aeb1ccd84ac75b4b1155a38d6e1fbb3779f939c151f8623f1d0f2612d1aba4065db51470a2572cfcd738731c5a9e440d07fc9ed11712a6dfba567d4ecc0cf1d45904fd9fa5f7958a507c73d297ad87fa928f2844d7d3ac0adb84bac6363b26ad448045fc51cfbdc647a069987b28f33a46404d5b50db24fcc34828d0cba033a6a3742f23c2f37fb22b4987306b772d2dd60b25e917137136ad682aee48864a66ba3fca8a46d10a78a4fc126b59aaba4193841ef5239c99ecfaba77b9d71acf98b67e2477df15e0deb93dd4aeb4fd9ad44f5b81a5fd99f803fadab7eb17f4b37bca2481e77ddd45685b963bb780634e3f98a8ec89ae3912d48aa2d1f70a07f312edd524c44affab5e9d3c9dc44895298b34c4150d8fbafd458c4e3dc26a5a4435cc6a57f2bf1945fcfc30605320e1f17827754a9608758b9d94bc51a2492de58ef5c24699ef743b3d971862f396c1b11cb624c308c08e254cdddfe94a9115b4f947111e0ba7c3c776cae6aff954dc938be8d7ba0ecae89aa136a4c8f1f4566ab374e1e7fe6372b1222293b1c8189ef516ef6894b74f4d1cf0d3de1ed27163ceafb837f593a3a64f82769cde7ddb6e2f16a97bee5ad313577080bcdb9759524206fa0a6d4b22ad540d54226eeb9d724fe3b814c515e6e7cfbb6bfb8e82c1248ded4fd5b75bd483d38f52a06ba07364360cc8482674f8d383dc414fa8b097e24f6c995c899bb5bca6db72e8a57c86ba40929384b81f4619931fdb442ad7f7e1e93e9f044f7a74835bc46df2e3d82f1ffe1969bfb2dccce0c040c15052244597f28666e049f2ea6e91dd55d5c631a1a8af818da1f93e8fbd841c787c6f8aa1de8a6fce730d1dd02bc93692716d575a5c4d3ee270d27ff40a02e485f0f981a508e2f1310d586c65e7d561e9a9c11390486362a013c30f110a426b789fe28dc50a734e1bdcf84aaee4c77d6d47a0b680095e513ee07ccd774fa11b17216304a9020b7396ff78401a90d99f20fa4546c05c9c88474755be1657aa27458d032a8bc128f357e738980966a9eb04f32bfa09ee5253e875cece6f45ca70e77d8ea426cddaf04c82d27d56034c38d863baf26b4223d2e0b841ad385fa99185fa928c875642f700c80c873526f84c5daff2efc592b6389a20aa3d047c97569f15de0bdcd28bb84deb9730aa02492bd70d07d28793c78b3f5379e83bfd332c7037dcd039a4cb9d56a276342e3b0c11590640a81fcb69cf23e3709cd8cd615584c043c7b1ae8219a93a7391994a070f14e6442a7396810a667b9350d1f1857a2e3b5c1a3175c75924f6bdb2834c47e973eb93795f86272972dee5c8c8c421a54d568241cc34f2a5625cfc14913ec67bf1b71ac7d14c8df45b510e3338b5321043f9ec49ad2b00016a3f45b930d779ccbb07452bc980e8186bfc9e87d526578db913d5ad5dc89e1a9bde096264aed8311dc5fb6a1255d4846c3aedb580ad73dce5b40b1444ad592ddd4df3645a9c5cfdc3f4d62ffed73a0b0bd5ddf37ef4d26447dc32b414537ff60e417c7ec0e80bfa070ab6516002ef5400746090043dee9a6b7fcdafc4c6f060d7b8ef3f94d2c8b60525a4638a8a376f221ec1bc5db14ae76573de389a08fa08c3735df5202491df4878a872e7afc7fbc95c073072598ad85f771a99b2662cf7fab06e7dcf73cedb4ff46d0", 0x1000}, {&(0x7f00000001c0)="7550b2e253d600768b055e3663557e9e", 0x10}, {&(0x7f00000003c0)="ffcb5e4820ab426babdec9e1963d52644dcf02e94134c6cfb48cfc0c43dcef1a3cd641b0e272bca050d7c82009db0252d3e66c38342f25cad851a263cdef3f564473d6cac93c4c569ca55b6ac29dd0b189b70b205c9ef6280daa47c2dd96b73d47b08466a4ca4c72afacb60d1259075330c19cbf4b3a27ad71f51e127da91e2346dd75a28dfd75773d63ca266b7587bcd0fdbc49b58f36795beed1f4af32be6e2e1b6935066c6fe167228e1f8a9d1191966178f3e645eb097a23bb9dd7148272ea5f6e3560d98876", 0xc8}, {&(0x7f00000002c0)="b403184297db06271b78b30e526747545736805e7609cb142cb8561e56749922d89e16c4b64989a7b02903f032cc4a6b28e7e5df7716243687c18b1b", 0x3c}, {&(0x7f0000001500)="5f0c1a919c92d1cc58355d78f846a727f8b20330d1f99d6663a35933832b115bc5641cea43a95049f5590884557261f4ef25969b2a6d2dfb1a30b6cc6ddf016d4904d6651d2db2d00018e41e12b57ab968aa9518c39f72d3cbf8871bb968d48bbe10a1224cc7207a3bd887a809ea374a7f670e28fcfbaec4ce135b17ea9bff2e8e2c940368e70bc42fdb1a698fb3d11240540714336852f748a9cdc76b962ffc142e3cf6f56c4986264172d4c7b092ac6c63b16872f0c8db", 0xb8}, {&(0x7f00000015c0)="c385386b7a102e3d87d2df52214fbb5ba4574ca1c87f73b463fd595ec814a7db1824bab87e48824c7787a47f0a0ff3165e0e1a3071e691deab9252a942d6d43c89564b7805f20f9eda06cc92db004b3538e3594df258efaca7c8d27223cfa25252ff82cdd5a1f431bfc6926da58cfc51df2af4d4ad8228339c954a902d413147bd849c423d22ff9ae64e0dc004fb91bcbc2aa44257ece763312d1cf9111921c42789bd93449bffe8e77d116f75bc0c2d4eeb6ef4d09702ec903c889e622b1e4a43485a", 0xc3}, {&(0x7f00000016c0)="8843117bd0e11bfc024281e1c3eda2925b1cd35aac5be28ff91867c02c582d7d02f2d7c5bd205e18a447c3ef784077bef1c5f4333d1cceecca0cbf47775c49ba7fbdb9bba3b1649b5679ea70f72e8a8d8ed75caa18bcc7c4dcb9d11b94af6ceeebe93b1fce571b11ca36", 0x6a}], 0x9) sendmmsg$inet6(r0, &(0x7f0000001b00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000200)="0f", 0x1}], 0x1}}], 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 01:45:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 653.846954] loop2: detected capacity change from 0 to 512 [ 653.864094] loop5: detected capacity change from 0 to 512 [ 653.872071] loop7: detected capacity change from 0 to 512 [ 653.876844] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 653.878293] EXT4-fs (loop2): group descriptors corrupted! [ 653.950072] Process accounting resumed 01:45:16 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x891f, &(0x7f0000000080)={'lo\x00', 0x0}) 01:45:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:45:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:45:16 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a00e00000020000000000dfee541aa8"], 0x38}}, 0x0) 01:45:16 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:16 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x410800, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000380)={r0, 0x0, 0xffffffffffffffff, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:16 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003400)='/sys/power/pm_async', 0x68301, 0x0) write$P9_RSTATu(r1, &(0x7f00000000c0)={0xa2, 0x7d, 0x0, {{0x0, 0x7b, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x12, '/dev/input/event#\x00', 0x12, '/dev/input/event#\x00', 0x12, '/dev/input/event#\x00', 0x12, '/dev/input/event#\x00'}, 0x12, '/dev/input/event#\x00', 0x0, 0xee01}}, 0xa2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000180)) [ 654.106462] loop2: detected capacity change from 0 to 512 [ 654.126460] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 654.127827] EXT4-fs (loop2): group descriptors corrupted! [ 654.131661] loop7: detected capacity change from 0 to 512 [ 654.138621] loop5: detected capacity change from 0 to 512 01:45:27 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:45:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:27 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a00e00000020000000000dfee541aa8"], 0x38}}, 0x0) 01:45:27 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x410800, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TCSETSF2(r0, 0x5423, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, "f2f3e2a9286b6a770ff8c2b978657df3480824"}) r1 = syz_io_uring_setup(0x2260, &(0x7f0000003a00), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000003a80), &(0x7f0000003ac0)) r2 = syz_io_uring_setup(0x2260, &(0x7f0000003a00), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000003a80), &(0x7f0000003ac0)) r3 = dup2(r1, r2) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000000)=0x6) read(r0, 0x0, 0x40004) 01:45:27 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8920, &(0x7f0000000080)={'lo\x00', 0x0}) 01:45:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 665.142118] loop5: detected capacity change from 0 to 512 [ 665.171493] loop2: detected capacity change from 0 to 512 [ 665.175028] loop7: detected capacity change from 0 to 512 [ 665.203508] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 665.205567] EXT4-fs (loop2): group descriptors corrupted! [ 665.216845] serio: Serial port ptm0 01:45:27 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a00e00000020000000000dfee541aa82ab44347a4ec00000000000000ffffffff"], 0x38}}, 0x0) 01:45:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:45:27 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:45:27 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8921, &(0x7f0000000080)={'lo\x00', 0x0}) 01:45:27 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:27 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x410800, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 665.373337] loop5: detected capacity change from 0 to 512 01:45:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 665.466755] loop7: detected capacity change from 0 to 512 [ 665.479350] loop2: detected capacity change from 0 to 512 [ 665.509202] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 665.510993] EXT4-fs (loop2): group descriptors corrupted! [ 665.992776] serio: Serial port ptm1 01:45:39 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a00e00000020000000000dfee541aa82ab44347a4ec00000000000000ffffffff"], 0x38}}, 0x0) 01:45:39 executing program 3: r0 = memfd_secret(0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000080)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2000005, 0x32, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000006370ea51f7c88692dc439285695c5fb25cc6dedb0d34b96769afbc13d52128aec111a22d584d1986e02111744dfc025b7abe"], 0x8, 0x0) 01:45:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:39 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8923, &(0x7f0000000080)={'lo\x00', 0x0}) 01:45:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:45:39 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 677.602361] loop7: detected capacity change from 0 to 512 [ 677.604730] loop2: detected capacity change from 0 to 512 [ 677.615072] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 677.615999] EXT4-fs (loop2): group descriptors corrupted! 01:45:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:45:39 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 677.666814] loop5: detected capacity change from 0 to 272 01:45:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 677.686821] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (68 blocks) [ 677.742051] loop7: detected capacity change from 0 to 512 [ 677.747018] loop2: detected capacity change from 0 to 512 01:45:39 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8924, &(0x7f0000000080)={'lo\x00', 0x0}) 01:45:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:45:39 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a00e00000020000000000dfee541aa82a"], 0x38}}, 0x0) 01:45:49 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:45:49 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:45:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:49 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:45:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:49 executing program 3: getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000000)=0xc000000, &(0x7f0000000040)=0x4) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0x8, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r0) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) 01:45:49 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8927, &(0x7f0000000080)={'lo\x00', 0x0}) 01:45:49 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 687.619539] loop2: detected capacity change from 0 to 512 01:45:49 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:45:49 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8929, &(0x7f0000000080)={'lo\x00', 0x0}) [ 687.658355] loop5: detected capacity change from 0 to 272 [ 687.666110] loop7: detected capacity change from 0 to 272 [ 687.679129] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (68 blocks) [ 687.686568] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (68 blocks) 01:45:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:49 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:45:49 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:45:49 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 687.807083] Process accounting paused [ 687.862778] loop7: detected capacity change from 0 to 272 01:45:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:45:49 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:45:49 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0, &(0x7f0000000380)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000680)={0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r3, 0x2, r2, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x2, 0x5, 0x81, 0x4, 0x0, 0x3340, 0x4022, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0xffff, 0xffffffffffffffe9}, 0x4400, 0xdd, 0x0, 0x7, 0x6, 0x200, 0x800, 0x0, 0x800, 0x0, 0x6}, r1, 0xf, r2, 0x2) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000080)='./file0/file0\x00', 0x2000000000000200, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000480)="b16afb0ca43bfdbeaf9f6a92a908de3d2df3b0959d631706d089c31e4ceab66f8154fcd70300ffa06fa3c45ee855d6be9289c8e4356a844369ad043b9f7905695dc85c17b0660036409563d69dfcb723df205cb99472206bfe2e32a8403d82e532a333162b4359d17c4c1ae0e143f66012236df1fc8ffd0151c606c5f5bde865de7cf55cf863ff0000006d168c65ceb72fa62db2b6eca6bd81b8cf5743d4fe028f38c5eaa2684984e7046819e37afd0831c4317177c2a5ebe3eea4aaef80a6309cc1de6368d7813e231c24662e09aacba54688de8fd46b33daca2d3088a7c70b5381dfd63ba2ac7917044c16b34217", 0xef, 0xfffffffffffffe01}, {&(0x7f0000000280)="034aa4252987eb288cc32137f8012a8e452ea4ec0c29c7088b5c2d6b09107ed192f6777b16c9fb4c5975f25c2009ea11", 0x30, 0xb3a8}, {&(0x7f0000000580)="77dcd8a382cc59ed1cd3111948e723b1fe1afea1fcd9d9320e04de46f0e7a8019b96993c5e02132fd62ea18b34935bb63833198c1b020734502551485450ad39ebcd7e721b45ce4e848b47a9b0afcb027b152e077091f25163e316a940b46712f064fd1fc0b9de9aff9aa60d0156750fd135ebebeb1d7d5423177f85d43cf0ad3f5c5c399d408219edd1b14fc614f3cadc5bea00536d32e2abaa7b181d6d5d96f2e54b8834d238346abf9e82a5f02707efe5e69ff6bdc84e6e1388263e735628a7a72cc1cd12c10d81f6273ad78cafbf57efe928dfca174167419a844682ef6b", 0xe0, 0x3c7600000000800}], 0x100000, &(0x7f0000000140)={[{@mode}, {@uid}, {}], [{@fsmagic={'fsmagic', 0x3d, 0x7}}]}) [ 687.898446] loop2: detected capacity change from 0 to 512 [ 687.899765] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (68 blocks) [ 687.938324] loop5: detected capacity change from 0 to 272 01:45:50 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8930, &(0x7f0000000080)={'lo\x00', 0x0}) [ 687.947789] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (68 blocks) 01:45:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:46:04 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:46:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:04 executing program 3: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x8, 0xfff}) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6002, 0x0) pwritev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)="0e0995c9f48ae5403c0fac54e3439d6d87b0b507af661e687648a8afbd0f1981ce9406e90578f7ce524b85b858199f6eb38c5a6a132c2061a2885ff03e476d6e0641834ab148ab4b851a27ba5fe7c8dea1584de4a50b5e7dfc19085baf57f7b768ffdd321055a23c7c7ac106b980c554fbbddde10be1f74c7dd593e18dc7bea3aedf5d64ec3add0597992df69bfdd8ef304409a34f3bbfc9a25e1842caa116238923", 0xa2}], 0x1, 0x1000, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0x2, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet6_int(r3, 0x29, 0x10, 0x0, &(0x7f0000000080)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) 01:46:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:46:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:46:04 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8931, &(0x7f0000000080)={'lo\x00', 0x0}) [ 702.415673] No source specified [ 702.425253] loop2: detected capacity change from 0 to 512 [ 702.439865] loop7: detected capacity change from 0 to 272 [ 702.485825] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (68 blocks) 01:46:04 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB='8\x00\x00'], 0x38}}, 0x0) 01:46:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) [ 702.623469] No source specified [ 702.633483] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7027 comm=syz-executor.1 01:46:16 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8932, &(0x7f0000000080)={'lo\x00', 0x0}) 01:46:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:46:16 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB='8\x00\x00'], 0x38}}, 0x0) 01:46:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:46:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:16 executing program 3: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x8, 0xfff}) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6002, 0x0) pwritev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)="0e0995c9f48ae5403c0fac54e3439d6d87b0b507af661e687648a8afbd0f1981ce9406e90578f7ce524b85b858199f6eb38c5a6a132c2061a2885ff03e476d6e0641834ab148ab4b851a27ba5fe7c8dea1584de4a50b5e7dfc19085baf57f7b768ffdd321055a23c7c7ac106b980c554fbbddde10be1f74c7dd593e18dc7bea3aedf5d64ec3add0597992df69bfdd8ef304409a34f3bbfc9a25e1842caa116238923", 0xa2}], 0x1, 0x1000, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0x2, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet6_int(r3, 0x29, 0x10, 0x0, &(0x7f0000000080)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) 01:46:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:46:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 714.795656] No source specified [ 714.807603] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7044 comm=syz-executor.1 01:46:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 714.831052] loop2: detected capacity change from 0 to 512 01:46:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 714.838186] No source specified 01:46:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:46:17 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB='8\x00\x00'], 0x38}}, 0x0) 01:46:17 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:17 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) 01:46:17 executing program 3: io_setup(0x572, &(0x7f0000000140)=0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r2, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x101) io_submit(r0, 0x5, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x80, r2, &(0x7f0000000000)="fed4631de6430f54d033921a3ef1ebe0a9bd33932fb63cbd0e6128fe4a263bcf82075ea6effdad3503f068c4c5872389030a026a84426ed6753cf0171d0476d38b6e9f06b26728cfafd0aa4eb885a0887706edb19c2c7bfa18493d04ba9cfa7104538641a613d208c0b3856aad8957ac94b06a35d9c1d31ecb2e91b90a2c6981958efb6428aa13d01a1142dc44b1597baf5e31f8be66bcb9e67ab458", 0x9c, 0x2, 0x0, 0x3, r3}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8, 0xfffb, r4, &(0x7f0000000200)="b8485ff3f356b63e62252bab2f6b1ae483ce3b37e061d8b359d319ea0f36d81bc505591410bc51ca0f7f667f58893a4839c24780c34e3c172ec7e9a3204bb45ee0e8cb44cdc34c3852fbacc88557cd2dcd891aaca56d6ef2a5349dd2411ba3a0845f176e47bbc16ca7158a6113c98390679d47cc9983a9947e30f6f97f7348", 0x7f, 0x6, 0x0, 0x1}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x8, 0x0, r5, &(0x7f00000002c0)="98fba20eb532c936effa817f4b12ad18ecd31f436654275989ef525f213234e57fc20e07525b067a63a9", 0x2a, 0x5e9c, 0x0, 0x1, r6}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x8, 0x101, r1, &(0x7f0000000380)="f35945159053cdf7fcf6d67dd014f0061c4b91002a040a36bc6d2c218263e78747ff9ce2270eac0f3ef297cb8008f6a8e4fef8e483656f56ee2fd84549462f665313701e9fa719a1e69896f32ec2c2c98c6d4ee3ea06008cc05a24646e69056ab48ee4896a3fa449477f37aeaf67a2bdad03b339c93d3d1f189f2d296218f17e5128ece012f799d31441179130bec0b08bf0d9f02f499a256a23238f83ad68b71cfd01d284ed61b4093ab6d8ca24280d", 0xb0, 0x4, 0x0, 0x0, r1}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x2, 0x9, r1, &(0x7f00000004c0)="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", 0xfa, 0x9, 0x0, 0x2}]) write$binfmt_misc(r1, &(0x7f0000000440)={'syz0'}, 0x4) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x17}]) 01:46:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:17 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:46:17 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 715.053861] No source specified [ 715.056382] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7067 comm=syz-executor.1 [ 715.066253] loop5: detected capacity change from 0 to 512 [ 715.081925] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 715.082885] EXT4-fs (loop5): group descriptors corrupted! [ 715.087376] loop2: detected capacity change from 0 to 512 01:46:17 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:46:17 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:46:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 715.270525] loop5: detected capacity change from 0 to 512 [ 715.280928] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 715.281884] EXT4-fs (loop5): group descriptors corrupted! 01:46:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:28 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000"], 0x38}}, 0x0) 01:46:28 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8937, &(0x7f0000000080)={'lo\x00', 0x0}) 01:46:28 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:46:28 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x0) 01:46:28 executing program 3: syz_usb_connect$cdc_ncm(0x4, 0x81, &(0x7f00000000c0)={{0x12, 0x1, 0x520, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6f, 0x2, 0x1, 0x7, 0x80, 0x5e, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x6, 0x24, 0x6, 0x0, 0x1, '\v'}, {0x5, 0x24, 0x0, 0xfffa}, {0xd, 0x24, 0xf, 0x1, 0x6, 0xfffb, 0x3, 0x1}, {0x6, 0x24, 0x1a, 0x401, 0x24}, [@network_terminal={0x7, 0x24, 0xa, 0x8, 0x1, 0x1, 0x20}, @country_functional={0x6, 0x24, 0x7, 0xff, 0x6151}, @call_mgmt={0x5, 0x24, 0x1, 0x0, 0x5}]}, {{0x9, 0x5, 0x81, 0x3, 0x10, 0x40, 0x2e}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x40, 0xea, 0x1, 0x4f}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x4, 0x3f}}}}}}}]}}, &(0x7f0000000540)={0xa, &(0x7f0000000000)={0x65, 0x6, 0x201, 0x1f, 0x1f, 0x5, 0x30, 0x84}, 0x10, &(0x7f0000000040)={0x5, 0xf, 0x10, 0x1, [@wireless={0xb, 0x10, 0x1, 0x4, 0x42, 0x20, 0x1, 0x5, 0x3}]}, 0xa}) syz_usb_connect$cdc_ncm(0x1, 0x77, &(0x7f0000000b40)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x65, 0x2, 0x1, 0x7, 0x10, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x9, 0x24, 0x6, 0x0, 0x1, "bd19aa11"}, {0x5, 0x24, 0x0, 0xa94}, {0xd, 0x24, 0xf, 0x1, 0x3, 0x4, 0x6, 0x6}, {0x6, 0x24, 0x1a, 0x1, 0x11}, [@call_mgmt={0x5, 0x24, 0x1, 0x2, 0x7}]}, {{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1, 0x4f}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x8, 0x40, 0xee}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0xcc, 0x7f, 0xe7}}}}}}}]}}, &(0x7f0000001100)={0xa, &(0x7f0000000bc0)={0xa, 0x6, 0x110, 0x1, 0x1, 0xff, 0x20, 0x4}, 0xc8, &(0x7f0000000c00)={0x5, 0xf, 0xc8, 0x6, [@generic={0x98, 0x10, 0xb, "2105415968a961cff0815bbb21fcbbf49487e22a0c0d1001f698a098a9f1767108356c5922bd28688e045bf47c26e977630c0f5a19c172f666cf163073c75d7289196c49e16a94635fd0a6b258821954dd18b93a686af670b4f103eaf837fc207f7d7a34c803998937d61eb220c07575434e893a5b32ca77194abfcd2b00395e31dee3901d305c72246bd259ecf4f28e2d6c412817"}, @ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x6, 0x1, 0x0, 0x8}, @ss_container_id={0x14, 0x10, 0x4, 0x7, "8f332ef0563822953fa89d7142ab0659"}, @ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x1, 0xd8, 0x6, 0xff}]}, 0x7, [{0x8f, &(0x7f0000000d00)=@string={0x8f, 0x3, "d61225526d1cab1278c34aa51a7ef4b91fc294d949145fea0451897387cb7b2d7b206200e5a082bccfc771f233a101811949f16556517aef27c7dbfe3ef5ed0d71818863965b414ed7aaed229fb9e1ddbcfbba205f83629d66f905774d553968df3b15689b6bcd528a00a00997848e0ed81c731820027be0dc837192b70f977f0d46fc98b22abbba84daf6863d"}}, {0x4, &(0x7f0000000dc0)=@lang_id={0x4, 0x3, 0xc0c}}, {0x4, &(0x7f0000000e00)=@lang_id={0x4, 0x3, 0x449}}, {0x4, &(0x7f0000000e40)=@lang_id={0x4, 0x3, 0x407}}, {0xd1, &(0x7f0000000e80)=@string={0xd1, 0x3, "a77cef04d715a1468486847ac5d7dcca7b14c0a9b10a7c89e31cdf3b7aafd38fd2ca82f5da02aebf13356a1748202c54d6dade199b42d2bf26a58ded80c98a960ce891e10e31741523c7416da6472bc43ba511f4373656056896ad554914794cced21ccf4da627eec110d4e04177b52c3e597da1e938f3286437c0a7e2b42874d2ba413f2f796e155299abe1cf54d0b955ad46eae1dff290c3040987bc3ac1b7cb7b50b6a5dffbfb1defc3c9ab7d5d13f568a05d389bc8a9502beecd960bcab5daf514132415fcf1d21bfa5b6e2195"}}, {0x67, &(0x7f0000001180)=ANY=[@ANYBLOB="6703d3e6bcc1065378230000000025300371787d1c1b842d819fb5799f1e56963346b05261f80b47ac84585f49a5db924abfe0cf73ad26fbc0f9f933706bce0aa01668a9de7ee8b734649a2e91f9c89eda62927e1244347184749ab4f475c0e03c5fb9f5e49c926b54b9ccf9b4ce7f00000000000000"]}, {0xeb, &(0x7f0000001000)=@string={0xeb, 0x3, "5a8887a052f7635b0ffdbf6003bfcc6459a7c6695bb64ce08b610915566fdae87042a5801e7afbf451bc626ad4618266991fd96c2d1eaaa2b5f3b6e0c6d692fa1f44606d4ad3da0cce32d002a80253e90ededea5c0b898f1d968f2461f81096931c95219872a722599884db23d7dcb3a311e06789909ed997d6d9341da99dbd0d0cb2fa17b18218240e32745e50e902be414ca3adf1964ae8884bc4d49757bd1217a1e94b80a8545d9ef6308d4916c87209dd19f202b38547c5a10713bf3213ddd367a972969f4ac036e2d8f04b8bbb41a93f3cd6c719a1be0f633b851976f7902c9fc738e6a4f7587"}}]}) syz_usb_connect$cdc_ncm(0x1, 0xd4, &(0x7f00000001c0)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xc2, 0x2, 0x1, 0x4, 0x80, 0x89, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x9, 0x24, 0x6, 0x0, 0x1, "8e6bcb5f"}, {0x5, 0x24, 0x0, 0x1000}, {0xd, 0x24, 0xf, 0x1, 0xfc3, 0x9, 0xfff8, 0x3}, {0x6, 0x24, 0x1a, 0x1}, [@obex={0x5, 0x24, 0x15, 0x994}, @mbim_extended={0x8, 0x24, 0x1c, 0x4, 0x8, 0x4}, @mdlm_detail={0x3a, 0x24, 0x13, 0x8, "47353670669294aa065487d31ae2ad4ef4c96f1dab5fdc9c2190e885cc44fb09764a65bd48b747fc16ebb5b1e9069b22bdda52dd0bd4"}, @country_functional={0x12, 0x24, 0x7, 0x5, 0x100, [0x2, 0x8, 0x4, 0x7, 0x4c5, 0x8]}, @call_mgmt={0x5, 0x24, 0x1, 0x1}, @acm={0x4, 0x24, 0x2, 0xa}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0xce, 0x1}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x3, 0x5, 0xca}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0xff, 0x8, 0xbd}}}}}}}]}}, &(0x7f0000000640)={0xa, &(0x7f00000002c0)={0xa, 0x6, 0x201, 0x3c, 0x3, 0x8, 0x10, 0x4}, 0x18, &(0x7f0000000340)={0x5, 0xf, 0x18, 0x2, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x4, 0x1, 0x2, 0xf, 0x7, [0xf]}]}, 0x6, [{0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x41f}}, {0x47, &(0x7f00000003c0)=@string={0x47, 0x3, "79d3bf53e7d2b846c6cd7e1f6eb3cad026efd8ca8d15ad71ce4ee59f0b6a34d781ba7437d531b51292506e329fe8217e8414f89db17e471462942db83e64d37310ce4ce74c"}}, {0xbe, &(0x7f0000000440)=@string={0xbe, 0x3, "b26cd18174ae414bb0c0baf1ca3f630f5ed7e00f6f88942ace944091b74c468e46871135cf84b85ab7653f7bd20cdd0ed85d3a5d9a288d58da6286dac6d8cb7fff099ee707e52fa501db3b34bc6cdd5547af7290a188364917379e400ca60fc57d519ef145e5899a5572f11c61d308337cdc48051eba350a0a04ff716db5967e07d815474eea0205cd1eee8031761bfbdddc7b44df04dab2721319dafe634429680057cf929fdc6652b71d5c0efc99a21e7087041bd00645e7b996e0"}}, {0x4, &(0x7f0000000500)=@lang_id={0x4, 0x3, 0x4001}}, {0x67, &(0x7f0000000580)=@string={0x67, 0x3, "6b0dd38ff1246bde7b76c86a0ff9bb773b191545e43c0703ad2dad3b0cc61242afaa15ff3bae7a74076c4708b6ccf6c5ba4b68034312f21ab61b00d321112167d93e6992abc1af01160f3738157c7e248bb06d087138c6554fc50fc0e7ab92466e7caca015"}}, {0x4, &(0x7f0000000600)=@lang_id={0x4, 0x3, 0x500d}}]}) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000300), 0x80, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)) r1 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r1, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r1, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r1, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0x1c, {0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r1, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r1, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_ep_write(r1, 0x82, 0x5, &(0x7f0000002340)='hello') syz_usb_control_io$cdc_ncm(r1, &(0x7f0000000800)={0x14, &(0x7f00000006c0)={0x20, 0xd, 0xdd, {0xdd, 0x3, "ed934fa5928cd8529cc1baf37b0f67c1f24a73db9ebe182b7d675b428d2a7744b92f101d57210a1a5b6bda046c026ef0d8d7602aa409b793ca33511e70ab2fa59c7289460e58fd38476fb45140f911fdf95f5b9c926ac4925ceb6e8ebe4a10035730a2217a518af626d5f3b9cfd51d06ffd409b1dd6172cd28e5e7aa027737f2fde4ad59e9342aca43427430066f85580f7a34730edf851820b81525c5d5c3db943a34612f9ff2d9f4268bc613864cc6c3b5b13d4f3cca20fdc0adcd635bc06b67396b32148f0d0c50ca1c5eaff6fa521ae4c57a3a35550141a9cc"}}, &(0x7f00000007c0)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000a40)={0x44, &(0x7f0000000840)={0x40, 0x0, 0x39, "3d3e25ed1a972e182d4ac441af441fa31a8ca13f13720520334fa7d7473e9b235022f4e649e7dd542c4797c97738b647c662361d502eafceb4"}, &(0x7f0000000880)={0x0, 0xa, 0x1, 0x34}, &(0x7f00000008c0)={0x0, 0x8, 0x1, 0x1f}, &(0x7f0000000900)={0x20, 0x80, 0x1c, {0x6, 0x819, 0x2, 0x4, 0x4, 0x1, 0x101, 0x6, 0x6, 0x5f, 0xff, 0x1}}, &(0x7f0000000940)={0x20, 0x85, 0x4, 0x3ff}, &(0x7f0000000980)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000009c0)={0x20, 0x87, 0x2, 0xf3a2}, &(0x7f0000000a00)={0x20, 0x89, 0x2}}) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000b00)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000180)={0xec96, 0x8, 0x6}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r2, 0x0, 0x0) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000ac0)={0x3ff, 0x0, 0x2}) [ 726.067872] loop2: detected capacity change from 0 to 272 [ 726.072629] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 726.088603] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (68 blocks) [ 726.101523] loop5: detected capacity change from 0 to 512 [ 726.113301] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 726.119499] No source specified [ 726.135550] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 726.152224] Process accounting resumed [ 726.164520] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 726.177674] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 726.192805] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 726.194564] EXT4-fs (loop5): group descriptors corrupted! 01:46:28 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000"], 0x38}}, 0x0) 01:46:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x0) [ 726.223607] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 726.248025] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 726.289862] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 726.768252] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 726.776951] misc raw-gadget: fail, usb_gadget_register_driver returned -16 01:46:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 737.178489] loop5: detected capacity change from 0 to 512 01:46:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:39 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000"], 0x38}}, 0x0) 01:46:39 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x0) 01:46:39 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8940, &(0x7f0000000080)={'lo\x00', 0x0}) 01:46:39 executing program 3: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) open_by_handle_at(r0, &(0x7f0000000040)=@xfs={0x1c, 0x81, {0xfffffffeffffffff, 0x9, 0x800, 0x8}}, 0x90000) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'ip6_vti0\x00', 0x0, 0x4, 0xff, 0x7, 0x9, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @local, 0x20, 0x7, 0x1ff, 0xfffffffd}}) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x8, 0x30, 0xffffffffffffffff, 0x8000000) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_submit(r2, 0x0, &(0x7f0000001600)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r3, 0x0, &(0x7f00000015c0)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x9, 0x4}, 0x80, &(0x7f0000000340)=[{&(0x7f00000001c0)="707f50d29f1af46105bd55539a1b5c9bc38669f48808e09087960cb2122d13c0b804f714c5383262510b378eb2f67a436ec585bc634a22cade1426cbda06f815c345d4e4725999e5ba63362d184d9d7090ba2ee785a761fe0d1aac9182fa9e10cbd20d463d040543b094e7efaec3f0229a58fbe65edcdac38379ed3f1515a15f45f5f288d73f152e02d627e152d5cf5fe25147d6967236ea4125aa8b54db1dbc8e248547852227d3af756f101287a28ead3977d3ed8cde09b3b2858d6df35c8aec2b64606c1f41f28964093e1f443fb51631d55d7c6f801d701f467ba7c3ea40b1d2977e5c8fc4", 0xe7}, {&(0x7f00000002c0)="3cb6223ce93882fb15dc90af8ff1c08400234f31e95bcbfe4c4563b12b435f87a1e3db246d16b8404b80741a3316e445a07d997f2aedc6a89b342e6821453f0f1ac9ff5ba28e91da7f16a87e43b7a82bfa9a968788e6cb8f62565b84755a1e5a6f373d15fa1952a07b4e7c", 0x6b}], 0x2, &(0x7f0000000380)=[{0xc0, 0x10f, 0x4, "4e21b4f119fb1aed10e049d4910d8ace9c0abacc6f54b937f365455b776f28318b4297b03dd2cfcb257297755e4715d38cb9d7fd19a9f182c77abdc96c561d5e07e4977e17a7b954bfedf5000cc1382e25aafdf354f3c0d685579ea1a3e9456025ce39165b628132e75dd013436cdfe2964ebccf28634bea2e335f175436756527f59c035596c93c141eda97edb61f31ed5feee35dad2006686dead602b26db06883409e6df0b9eb871f"}, {0xf0, 0xff, 0x10001, "59e7c61f4bfe417fa7b54f702db77e842a8febbb658648eda6655f6a40a877b41903eb38312e746cda1b51a77b27192d2f7ec8ef07261854140a7b7a78b149808f6df4b90a79fc6a99a3731b6971fdc84be7116c7f19b7c9df8e9fd72a9582a092279f230d5c944a1282e26242ec2ec05ff0c5a65bc09ee534adedef8cb97a1ce7f696ff788f8a228de9b8fe1270e2d30c28afe0c75b39fc104c458d8cf97d24c166e542e79311d794457563ae02370487a8c5331b8fc43e42404683ab13dadfdc6f71fc7371728861d16a6e8dd1fd2a3973cc81082e773687bc"}, {0x80, 0x101, 0x5, "f9f8537bdba578738115b60d228f167af58d65b0ebe483560f1ea821a23e79f41379e1a3a603b26b5daa9e213f6226e5648bb458b07d13ccdfaed4efa4710b927e50c7f9bf3ee4bbf904bb771f56ba0d751a66f767eff8e1560b18d9b12fa11820f081e3526050df2c"}, {0x1010, 0x10c, 0x80000000, "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"}], 0x1240}, 0x0, 0x8800, 0x1}, 0xffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000000, 0x810, 0xffffffffffffffff, 0x8000000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r5) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000001, 0x40010, 0xffffffffffffffff, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r6, 0x114, &(0x7f0000001640), 0x0, 0x4) syz_io_uring_submit(r6, 0x0, &(0x7f0000001680)=@IORING_OP_READ_FIXED={0x4, 0x5, 0x4004, @fd=r0, 0x8, 0x9, 0x400, 0xc, 0x0, {0x2}}, 0xfffffe00) r7 = socket$inet6(0xa, 0x5, 0xabd5) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000001940)=@IORING_OP_SENDMSG={0x9, 0x3, 0x0, r7, 0x0, &(0x7f0000001900)={&(0x7f00000016c0)=@pppol2tpin6={0x18, 0x1, {0x0, r8, 0x2, 0x1, 0x3, 0x3, {0xa, 0x4e23, 0x316, @rand_addr=' \x01\x00', 0x2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001740)="1f0aeacfc9cc9166898f4ad5490a7487cbe318c9e1cac4d50380c0a0a3e5253642857e25b7ad774f78e8bb1f7ab2c6bdbac8b32a8337", 0x36}], 0x1, &(0x7f00000017c0)=[{0x48, 0x102, 0x3d, "b9abade3f2f7cd9fb65d813013790edd6533c7855de26c69fc40783c50cf10c867096465b6ace1ac80fd116b3fd5be6dcd"}, {0x90, 0x118, 0xcfa, "6c97fbf8018e1e3af53eb395244e0892ae9bf894e2a0989bd3b6309868c6ee7b3631b734e352837a61558fab0925325b619604654f6b980e2996f2d94bbc47bdc20373e4637d05264e7b944021a9c10be9311c3703f70e4310175e7d887ce2be961cb6b797bb44cbf060aeaa6cfa2cd7ed0f7fb1765d3eadaff65d"}, {0x38, 0x113, 0x3, "5fd8bf34da42037a18e730949ae1615dcaeae41e0af4789352e3a8b4a3d70efbf8c1e0f3151c6b"}], 0x110}, 0x0, 0x8000, 0x0, {0x0, r9}}, 0x4) [ 737.191213] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 737.191957] EXT4-fs (loop5): group descriptors corrupted! [ 737.225286] loop7: detected capacity change from 0 to 512 [ 737.242787] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 737.243811] EXT4-fs (loop7): group descriptors corrupted! 01:46:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 737.257905] loop2: detected capacity change from 0 to 272 01:46:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 737.275512] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (68 blocks) [ 737.315636] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 01:46:39 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:39 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8941, &(0x7f0000000080)={'lo\x00', 0x0}) [ 737.350760] loop5: detected capacity change from 0 to 512 01:46:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, 0x0, r1, 0x0) [ 737.377740] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 737.378731] EXT4-fs (loop5): group descriptors corrupted! [ 737.379960] loop7: detected capacity change from 0 to 512 [ 737.398289] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 737.399255] EXT4-fs (loop7): group descriptors corrupted! 01:46:39 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e00000000000000"], 0x38}}, 0x0) 01:46:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9}}, './file0\x00'}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x3d, 0x4, 0x9, 0x8, 0x0, 0x0, 0x22440, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x2, 0x8001}, 0x84, 0x6, 0x8, 0x7, 0x800, 0x0, 0x5, 0x0, 0xff, 0x0, 0x101}, 0xffffffffffffffff, 0xb, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 01:46:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:39 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 737.530074] loop2: detected capacity change from 0 to 272 [ 737.535088] loop7: detected capacity change from 0 to 512 [ 737.536979] audit: type=1326 audit(1762047999.636:20): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7158 comm="syz-executor.3" exe="/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f1bcd6e1b19 code=0x0 [ 737.550747] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (68 blocks) [ 737.552572] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 737.553566] EXT4-fs (loop7): group descriptors corrupted! [ 737.554255] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 738.363041] audit: type=1326 audit(1762048000.463:21): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7158 comm="syz-executor.3" exe="/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f1bcd6e1b19 code=0x0 01:46:49 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8942, &(0x7f0000000080)={'lo\x00', 0x0}) 01:46:49 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x30]}}}}]}) symlinkat(&(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000100)='./file1\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mounts\x00') sendfile(r1, r1, &(0x7f0000000000)=0x8000, 0x200000000307) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x80400, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000280)='freezer.state\x00', 0x0, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000640)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000300)=@acquire={0x2dc, 0x17, 0x400, 0x70bd25, 0x25dfdbfb, {{@in=@loopback, 0x4d5, 0x32}, @in=@empty, {@in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4e23, 0x4, 0x4e21, 0x5, 0xa, 0xa0, 0x30, 0x2c, 0x0, 0xee00}, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x81, 0x4e21, 0x8, 0x2, 0x0, 0xa0, 0x2f, 0x0, 0xee01}, {0xfffffffffffffffa, 0x9, 0x3, 0x1190000, 0x24, 0x0, 0x9, 0x9}, {0x0, 0x2, 0x2, 0x7}, 0x1ff, 0x6e6bbc, 0x1, 0x0, 0x1, 0x3}, 0x0, 0x2, 0x0, 0x70bd28}, [@algo_auth={0x75, 0x1, {{'poly1305\x00'}, 0x168, "ad9021c1eca3fa8fd39b1b339e01dc227d6ea4c8374b576e3d34ab583ce428c595f35a4a1880a42cd9fe7eab80"}}, @migrate={0x134, 0x11, [{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in6=@mcast2, @in=@rand_addr=0x64010100, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x6c, 0x1, 0x0, 0x3505, 0x2, 0x2}, {@in6=@dev={0xfe, 0x80, '\x00', 0x1}, @in=@private=0xa010102, @in=@rand_addr=0x64010101, @in=@remote, 0x3c, 0x2, 0x0, 0x3500, 0xa, 0x2}, {@in=@multicast2, @in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev={0xac, 0x14, 0x14, 0x1e}, 0x6c, 0x2, 0x0, 0x3502, 0x2, 0x2}, {@in6=@empty, @in6=@mcast1, @in=@private=0x6, @in=@local, 0x33, 0x2, 0x0, 0x3500, 0x2, 0x2}]}, @tfcpad={0x8, 0x16, 0x53}]}, 0x2dc}, 0x1, 0x0, 0x0, 0x8000}, 0x4004081) linkat(r2, &(0x7f00000001c0)='./file1\x00', r0, &(0x7f0000000240)='./file1\x00', 0x400) 01:46:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:49 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, 0x0, r1, 0x0) 01:46:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:46:49 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:46:49 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e00000000000000"], 0x38}}, 0x0) 01:46:49 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 747.820710] No source specified [ 747.821828] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 01:46:49 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e00000000000000"], 0x38}}, 0x0) 01:46:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) [ 747.878636] loop7: detected capacity change from 0 to 512 [ 747.887265] loop5: detected capacity change from 0 to 512 [ 747.903637] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 747.905385] EXT4-fs (loop7): group descriptors corrupted! 01:46:50 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8943, &(0x7f0000000080)={'lo\x00', 0x0}) [ 747.910833] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 747.911806] EXT4-fs (loop5): group descriptors corrupted! 01:46:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, 0x0, r1, 0x0) 01:46:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 747.972461] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 748.012576] No source specified 01:46:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 748.124081] loop5: detected capacity change from 0 to 512 [ 748.130752] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 748.131710] EXT4-fs (loop5): group descriptors corrupted! 01:47:01 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028"], 0x38}}, 0x0) 01:47:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, r0, 0x0, 0x0) 01:47:01 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockname(r0, 0x0, &(0x7f0000000180)) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0xd0000, 0x8, 0x2}, 0x18) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x8, 0xb0, 0x9}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000100)) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000080)={0x0, 0x2, 0xffffffffffffffff, 0xa0}) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r4, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f0000000200)={0x0, 0x3, r4, 0x40b}) r5 = getpid() r6 = pidfd_open(r5, 0x0) copy_file_range(r6, 0x0, r3, 0x0, 0x6e3f, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000180)={0x0}) r8 = syz_io_uring_setup(0x3cfc, &(0x7f0000000240)={0x0, 0x20000000, 0x0, 0x0, 0x3}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) io_uring_register$IORING_REGISTER_PROBE(r8, 0x8, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f0000000080)={r7, 0x2, r8, 0xa0}) r9 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140)=0x14, 0x800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f00000001c0)={r7, 0x0, r9, 0x3}) 01:47:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:01 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'lo\x00', 0x0}) 01:47:01 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x0) 01:47:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013c00)=ANY=[]) [ 759.066703] loop7: detected capacity change from 0 to 512 [ 759.067500] loop5: detected capacity change from 0 to 512 [ 759.075036] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 759.075897] EXT4-fs (loop7): group descriptors corrupted! [ 759.076527] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 759.077461] EXT4-fs (loop5): group descriptors corrupted! [ 759.079275] No source specified 01:47:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, r0, 0x0, 0x0) [ 759.188769] loop7: detected capacity change from 0 to 512 [ 759.193768] loop5: detected capacity change from 0 to 512 [ 759.202804] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 759.203674] EXT4-fs (loop7): group descriptors corrupted! [ 759.207108] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 759.207866] EXT4-fs (loop5): group descriptors corrupted! [ 759.208925] loop2: detected capacity change from 0 to 512 01:47:01 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000080)={'lo\x00', 0x0}) 01:47:01 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x0) [ 759.251495] Process accounting paused [ 759.272205] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 759.273940] EXT4-fs (loop2): group descriptors corrupted! 01:47:11 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x0) 01:47:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x5}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, r0, 0x0, 0x0) 01:47:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:11 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028"], 0x38}}, 0x0) 01:47:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000080)={0x1, 0x0, 0x14, 0x0, 0x129, 0x0}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r1, 0x0, 0x0) write(r1, &(0x7f0000000000)="22e8925d170845a56fe990db0e7dcbead6d1e1b2e8cfc06588e909e2c9d2f33c20d000bb1ca30629a5c995fa7b71ba949c1bcffeacba289af623fbddb767a332605540c021a2d9b6528740495f20d583f65609aaa6a3e0290506d220215f5fdf6aef076dcffe15d92285731ba82feff4aed708619573a18021caf278a666ea", 0x55) 01:47:11 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8948, &(0x7f0000000080)={'lo\x00', 0x0}) [ 768.973695] loop7: detected capacity change from 0 to 512 [ 768.974743] loop2: detected capacity change from 0 to 512 [ 768.985666] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 768.986639] EXT4-fs (loop2): group descriptors corrupted! [ 768.989635] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 768.990366] EXT4-fs (loop7): group descriptors corrupted! [ 769.003610] loop5: detected capacity change from 0 to 512 [ 769.021683] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 769.022529] EXT4-fs (loop5): group descriptors corrupted! 01:47:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:11 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8949, &(0x7f0000000080)={'lo\x00', 0x0}) 01:47:11 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028"], 0x38}}, 0x0) 01:47:11 executing program 3: r0 = clone3(&(0x7f0000000240)={0x61020100, &(0x7f00000056c0)=0xffffffffffffffff, 0x0, 0x0, {}, &(0x7f00000001c0)=""/96, 0x54, 0x0, &(0x7f0000000000), 0x3}, 0x58) r2 = fork() tkill(r2, 0x31) r3 = fork() tkill(r3, 0x31) r4 = fork() tkill(r4, 0x31) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r5) r6 = pidfd_getfd(r5, r1, 0x0) fsetxattr$security_ima(r6, &(0x7f0000001680), &(0x7f00000016c0)=@md5={0x1, "8bbb5beb0deb9b7d389548896044e808"}, 0x11, 0x1) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001640)={0xffffffffffffffff, 0x8, 0x3, 0x5}) perf_event_open(&(0x7f00000015c0)={0x5, 0x80, 0x1, 0x6, 0x7b, 0x3, 0x0, 0x1, 0x15bb5f1093d0c8be, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7ff80, 0x2, @perf_bp={&(0x7f0000001580), 0x2}, 0x40002, 0x3, 0xfffffffd, 0x3, 0x8, 0x52, 0x4, 0x0, 0x1, 0x0, 0xa0}, r0, 0xa, r5, 0x1) clone3(&(0x7f0000001500)={0x0, &(0x7f0000001380), &(0x7f00000013c0), &(0x7f0000001400), {0x36}, &(0x7f0000001440)=""/62, 0x3e, &(0x7f0000001480)=""/36, &(0x7f00000014c0)=[r0, r2, r3, r4], 0x4, {r5}}, 0x58) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r7) ioctl$EVIOCGID(r7, 0x80084502, &(0x7f0000001700)=""/121) clone3(&(0x7f0000001300)={0x108260000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x18}, &(0x7f00000000c0)=""/235, 0xeb, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=[r2], 0x1}, 0x58) [ 769.116841] loop2: detected capacity change from 0 to 512 01:47:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:11 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, 0x0, r1, 0x0) [ 769.136677] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 769.137520] EXT4-fs (loop2): group descriptors corrupted! [ 769.138713] loop7: detected capacity change from 0 to 512 [ 769.173844] loop5: detected capacity change from 0 to 512 [ 769.185760] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 769.187236] EXT4-fs (loop7): group descriptors corrupted! [ 769.187692] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 769.188934] EXT4-fs (loop5): group descriptors corrupted! 01:47:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) (fail_nth: 1) 01:47:11 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, 0x0, r1, 0x0) [ 769.279677] FAULT_INJECTION: forcing a failure. [ 769.279677] name failslab, interval 1, probability 0, space 0, times 1 [ 769.280956] CPU: 0 UID: 0 PID: 7293 Comm: syz-executor.4 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 769.280974] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 769.280982] Call Trace: [ 769.280987] [ 769.280993] dump_stack_lvl+0xfa/0x120 [ 769.281021] should_fail_ex+0x4d7/0x5e0 [ 769.281047] should_failslab+0xc2/0x120 [ 769.281068] __kmalloc_cache_noprof+0x81/0x6b0 [ 769.281095] ? assoc_array_delete+0xb9/0xc40 [ 769.281120] ? assoc_array_delete+0xb9/0xc40 [ 769.281135] ? __key_move_lock+0x124/0x150 [ 769.281154] assoc_array_delete+0xb9/0xc40 [ 769.281181] ? __pfx_assoc_array_delete+0x10/0x10 [ 769.281203] ? down_write_nested+0x11d/0x1f0 [ 769.281228] ? __pfx_down_write_nested+0x10/0x10 [ 769.281250] ? __pfx_lookup_user_key+0x10/0x10 [ 769.281261] ? __mutex_unlock_slowpath+0x157/0x750 [ 769.281301] key_move+0xda/0x500 [ 769.281322] ? __pfx_keyring_search_iterator+0x10/0x10 [ 769.281339] ? __pfx_key_move+0x10/0x10 [ 769.281359] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 769.281376] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 769.281405] keyctl_keyring_move+0xf4/0x160 [ 769.281430] __do_sys_keyctl+0x508/0x5b0 [ 769.281454] do_syscall_64+0xbf/0x390 [ 769.281478] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 769.281492] RIP: 0033:0x7f809dddbb19 [ 769.281502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 769.281515] RSP: 002b:00007f809b351188 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 769.281527] RAX: ffffffffffffffda RBX: 00007f809deeef60 RCX: 00007f809dddbb19 [ 769.281535] RDX: 0000000006a2651c RSI: 0000000015472591 RDI: 000000000000001e [ 769.281542] RBP: 00007f809b3511d0 R08: 0000000000000000 R09: 0000000000000000 [ 769.281550] R10: 000000002323bcc1 R11: 0000000000000246 R12: 0000000000000001 [ 769.281558] R13: 00007ffd0247038f R14: 00007f809b351300 R15: 0000000000022000 [ 769.281596] [ 769.307423] loop2: detected capacity change from 0 to 512 01:47:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:11 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e00000000000000002800"], 0x38}}, 0x0) 01:47:11 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x894a, &(0x7f0000000080)={'lo\x00', 0x0}) [ 769.317288] loop5: detected capacity change from 0 to 512 [ 769.323953] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 769.324716] EXT4-fs (loop2): group descriptors corrupted! [ 769.325719] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 769.326687] EXT4-fs (loop5): group descriptors corrupted! 01:47:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) (fail_nth: 2) [ 769.467460] loop5: detected capacity change from 0 to 512 [ 769.472774] loop2: detected capacity change from 0 to 512 [ 769.478700] loop7: detected capacity change from 0 to 512 [ 769.479727] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 769.480569] EXT4-fs (loop5): group descriptors corrupted! [ 769.484867] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 769.485615] EXT4-fs (loop2): group descriptors corrupted! [ 769.495210] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 769.495940] EXT4-fs (loop7): group descriptors corrupted! 01:47:11 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x894c, &(0x7f0000000080)={'lo\x00', 0x0}) 01:47:11 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, 0x0, r1, 0x0) 01:47:11 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e00000000000000002800"], 0x38}}, 0x0) 01:47:21 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) (fail_nth: 3) 01:47:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, r0, 0x0, 0x0) 01:47:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:21 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e00000000000000002800"], 0x38}}, 0x0) 01:47:21 executing program 3: r0 = clone3(&(0x7f0000000240)={0x61020100, &(0x7f00000056c0)=0xffffffffffffffff, 0x0, 0x0, {}, &(0x7f00000001c0)=""/96, 0x54, 0x0, &(0x7f0000000000), 0x3}, 0x58) r2 = fork() tkill(r2, 0x31) r3 = fork() tkill(r3, 0x31) r4 = fork() tkill(r4, 0x31) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r5) r6 = pidfd_getfd(r5, r1, 0x0) fsetxattr$security_ima(r6, &(0x7f0000001680), &(0x7f00000016c0)=@md5={0x1, "8bbb5beb0deb9b7d389548896044e808"}, 0x11, 0x1) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001640)={0xffffffffffffffff, 0x8, 0x3, 0x5}) perf_event_open(&(0x7f00000015c0)={0x5, 0x80, 0x1, 0x6, 0x7b, 0x3, 0x0, 0x1, 0x15bb5f1093d0c8be, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7ff80, 0x2, @perf_bp={&(0x7f0000001580), 0x2}, 0x40002, 0x3, 0xfffffffd, 0x3, 0x8, 0x52, 0x4, 0x0, 0x1, 0x0, 0xa0}, r0, 0xa, r5, 0x1) clone3(&(0x7f0000001500)={0x0, &(0x7f0000001380), &(0x7f00000013c0), &(0x7f0000001400), {0x36}, &(0x7f0000001440)=""/62, 0x3e, &(0x7f0000001480)=""/36, &(0x7f00000014c0)=[r0, r2, r3, r4], 0x4, {r5}}, 0x58) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r7) ioctl$EVIOCGID(r7, 0x80084502, &(0x7f0000001700)=""/121) clone3(&(0x7f0000001300)={0x108260000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x18}, &(0x7f00000000c0)=""/235, 0xeb, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=[r2], 0x1}, 0x58) 01:47:21 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8970, &(0x7f0000000080)={'lo\x00', 0x0}) [ 779.422682] FAULT_INJECTION: forcing a failure. [ 779.422682] name failslab, interval 1, probability 0, space 0, times 0 [ 779.423838] CPU: 0 UID: 0 PID: 7337 Comm: syz-executor.4 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 779.423856] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 779.423863] Call Trace: [ 779.423868] [ 779.423874] dump_stack_lvl+0xfa/0x120 [ 779.423903] should_fail_ex+0x4d7/0x5e0 [ 779.423929] should_failslab+0xc2/0x120 [ 779.423951] __kmalloc_cache_noprof+0x81/0x6b0 [ 779.423975] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 779.423995] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 779.424016] ? assoc_array_insert+0xe1/0x2ae0 [ 779.424041] ? assoc_array_insert+0xe1/0x2ae0 [ 779.424055] assoc_array_insert+0xe1/0x2ae0 [ 779.424071] ? keyring_compare_object+0x75/0x220 [ 779.424088] ? kasan_save_track+0x14/0x30 [ 779.424114] ? assoc_array_delete+0x28c/0xc40 [ 779.424144] ? __pfx_assoc_array_delete+0x10/0x10 [ 779.424158] ? __pfx_assoc_array_insert+0x10/0x10 [ 779.424180] ? down_write_nested+0x11d/0x1f0 [ 779.424211] ? __pfx_lookup_user_key+0x10/0x10 [ 779.424222] ? __mutex_unlock_slowpath+0x157/0x750 [ 779.424254] __key_link_begin+0xf0/0x260 [ 779.424277] key_move+0x11c/0x500 [ 779.424298] ? __pfx_keyring_search_iterator+0x10/0x10 [ 779.424317] ? __pfx_key_move+0x10/0x10 [ 779.424338] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 779.424357] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 779.424388] keyctl_keyring_move+0xf4/0x160 [ 779.424415] __do_sys_keyctl+0x508/0x5b0 [ 779.424442] do_syscall_64+0xbf/0x390 [ 779.424468] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 779.424482] RIP: 0033:0x7f809dddbb19 [ 779.424493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 779.424506] RSP: 002b:00007f809b351188 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 779.424518] RAX: ffffffffffffffda RBX: 00007f809deeef60 RCX: 00007f809dddbb19 [ 779.424527] RDX: 000000000171ebfb RSI: 0000000018da6574 RDI: 000000000000001e [ 779.424534] RBP: 00007f809b3511d0 R08: 0000000000000000 R09: 0000000000000000 [ 779.424542] R10: 00000000329eb231 R11: 0000000000000246 R12: 0000000000000001 [ 779.424549] R13: 00007ffd0247038f R14: 00007f809b351300 R15: 0000000000022000 [ 779.424589] [ 779.445825] loop2: detected capacity change from 0 to 512 [ 779.458484] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 779.459238] EXT4-fs (loop2): group descriptors corrupted! [ 779.483179] loop5: detected capacity change from 0 to 512 [ 779.494502] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 779.495922] EXT4-fs (loop5): group descriptors corrupted! 01:47:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, r0, 0x0, 0x0) 01:47:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) (fail_nth: 4) [ 779.547907] loop7: detected capacity change from 0 to 512 01:47:21 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8971, &(0x7f0000000080)={'lo\x00', 0x0}) [ 779.587011] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 779.587813] EXT4-fs (loop7): group descriptors corrupted! 01:47:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) (fail_nth: 5) [ 779.693041] loop2: detected capacity change from 0 to 512 [ 779.704508] FAULT_INJECTION: forcing a failure. [ 779.704508] name failslab, interval 1, probability 0, space 0, times 0 [ 779.705473] CPU: 0 UID: 0 PID: 7362 Comm: syz-executor.4 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 779.705491] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 779.705499] Call Trace: [ 779.705505] [ 779.705511] dump_stack_lvl+0xfa/0x120 [ 779.705540] should_fail_ex+0x4d7/0x5e0 [ 779.705566] should_failslab+0xc2/0x120 [ 779.705591] __kmalloc_cache_noprof+0x81/0x6b0 [ 779.705618] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 779.705637] ? assoc_array_walk.isra.0+0x1d0/0x5c0 [ 779.705661] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 779.705685] ? assoc_array_insert+0x3c9/0x2ae0 [ 779.705709] ? assoc_array_insert+0x3c9/0x2ae0 [ 779.705723] assoc_array_insert+0x3c9/0x2ae0 [ 779.705739] ? keyring_compare_object+0x75/0x220 [ 779.705768] ? assoc_array_delete+0x28c/0xc40 [ 779.705792] ? __pfx_assoc_array_delete+0x10/0x10 [ 779.705806] ? __pfx_assoc_array_insert+0x10/0x10 [ 779.705825] ? down_write_nested+0x11d/0x1f0 [ 779.705858] ? __pfx_lookup_user_key+0x10/0x10 [ 779.705870] ? __mutex_unlock_slowpath+0x157/0x750 [ 779.705904] __key_link_begin+0xf0/0x260 [ 779.705927] key_move+0x11c/0x500 [ 779.705951] ? __pfx_keyring_search_iterator+0x10/0x10 [ 779.705971] ? __pfx_key_move+0x10/0x10 [ 779.705994] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 779.706014] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 779.706046] keyctl_keyring_move+0xf4/0x160 [ 779.706076] __do_sys_keyctl+0x508/0x5b0 [ 779.706105] do_syscall_64+0xbf/0x390 [ 779.706138] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 779.706152] RIP: 0033:0x7f809dddbb19 [ 779.706163] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 779.706176] RSP: 002b:00007f809b351188 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 779.706188] RAX: ffffffffffffffda RBX: 00007f809deeef60 RCX: 00007f809dddbb19 [ 779.706197] RDX: 00000000190e0914 RSI: 000000002767bf51 RDI: 000000000000001e [ 779.706205] RBP: 00007f809b3511d0 R08: 0000000000000000 R09: 0000000000000000 [ 779.706212] R10: 0000000019dab6bb R11: 0000000000000246 R12: 0000000000000001 [ 779.706220] R13: 00007ffd0247038f R14: 00007f809b351300 R15: 0000000000022000 [ 779.706259] [ 779.736082] loop5: detected capacity change from 0 to 512 [ 779.753704] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 779.755285] EXT4-fs (loop2): group descriptors corrupted! [ 779.762166] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 779.762913] EXT4-fs (loop5): group descriptors corrupted! 01:47:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:31 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dns_resolver', 0xc0000, 0x0) lseek(r0, 0x0, 0x2) getdents(r1, &(0x7f0000000340)=""/170, 0x1517f) 01:47:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:31 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, r0, 0x0, 0x0) 01:47:31 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) (fail_nth: 1) 01:47:31 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000080)={'lo\x00', 0x0}) 01:47:31 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) (fail_nth: 6) 01:47:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 789.238877] loop5: detected capacity change from 0 to 512 [ 789.244435] FAULT_INJECTION: forcing a failure. [ 789.244435] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 789.245549] CPU: 0 UID: 0 PID: 7380 Comm: syz-executor.1 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 789.245567] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 789.245575] Call Trace: [ 789.245581] [ 789.245588] dump_stack_lvl+0xfa/0x120 [ 789.245616] should_fail_ex+0x4d7/0x5e0 [ 789.245644] _copy_from_user+0x30/0xd0 [ 789.245668] copy_msghdr_from_user+0x88/0x150 [ 789.245688] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 789.245716] ? perf_trace_run_bpf_submit+0xef/0x180 [ 789.245753] ___sys_sendmsg+0xdc/0x1b0 [ 789.245773] ? __pfx____sys_sendmsg+0x10/0x10 [ 789.245800] ? __pfx_perf_trace_lock+0x10/0x10 [ 789.245820] ? proc_fail_nth_write+0x97/0x220 [ 789.245851] ? lock_acquire+0x15e/0x2f0 [ 789.245870] ? __fget_files+0x34/0x3b0 [ 789.245889] ? find_held_lock+0x2b/0x80 [ 789.245906] ? __fget_files+0x203/0x3b0 [ 789.245924] ? lock_release+0xc8/0x290 [ 789.245953] ? __fget_files+0x20d/0x3b0 [ 789.245992] __sys_sendmsg+0x150/0x200 [ 789.246009] ? __pfx___sys_sendmsg+0x10/0x10 [ 789.246047] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 789.246068] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 789.246091] ? ksys_write+0x1a3/0x240 [ 789.246110] ? __pfx_ksys_write+0x10/0x10 [ 789.246155] do_syscall_64+0xbf/0x390 [ 789.246182] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 789.246197] RIP: 0033:0x7fadb4bbeb19 [ 789.246209] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 789.246222] RSP: 002b:00007fadb2134188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 789.246235] RAX: ffffffffffffffda RBX: 00007fadb4cd1f60 RCX: 00007fadb4bbeb19 [ 789.246245] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 789.246253] RBP: 00007fadb21341d0 R08: 0000000000000000 R09: 0000000000000000 [ 789.246261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 789.246268] R13: 00007fff59d0b57f R14: 00007fadb2134300 R15: 0000000000022000 [ 789.246309] [ 789.263080] loop7: detected capacity change from 0 to 512 [ 789.267100] loop2: detected capacity change from 0 to 512 [ 789.288537] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 789.289545] EXT4-fs (loop5): group descriptors corrupted! [ 789.295517] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 789.297114] EXT4-fs (loop7): group descriptors corrupted! [ 789.319900] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 789.321661] EXT4-fs (loop2): group descriptors corrupted! 01:47:31 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) (fail_nth: 7) [ 789.391369] Process accounting resumed [ 789.431734] FAULT_INJECTION: forcing a failure. [ 789.431734] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 789.432848] CPU: 0 UID: 0 PID: 7393 Comm: syz-executor.4 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 789.432866] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 789.432874] Call Trace: [ 789.432879] [ 789.432886] dump_stack_lvl+0xfa/0x120 [ 789.432914] should_fail_ex+0x4d7/0x5e0 [ 789.432941] _copy_to_user+0x32/0xd0 [ 789.432966] simple_read_from_buffer+0xe0/0x180 [ 789.432990] proc_fail_nth_read+0x18a/0x240 [ 789.433016] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 789.433041] ? security_file_permission+0x22/0x90 [ 789.433066] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 789.433089] vfs_read+0x1eb/0xc70 [ 789.433120] ? __pfx_vfs_read+0x10/0x10 [ 789.433146] ? lock_release+0xc8/0x290 [ 789.433177] ? __fget_files+0x20d/0x3b0 [ 789.433216] ksys_read+0x121/0x240 [ 789.433234] ? __pfx_ksys_read+0x10/0x10 [ 789.433252] ? keyctl_keyring_move+0x11e/0x160 [ 789.433288] do_syscall_64+0xbf/0x390 [ 789.433315] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 789.433329] RIP: 0033:0x7f809dd8e69c [ 789.433340] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 789.433353] RSP: 002b:00007f809b351170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 789.433366] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f809dd8e69c [ 789.433374] RDX: 000000000000000f RSI: 00007f809b3511e0 RDI: 0000000000000004 [ 789.433382] RBP: 00007f809b3511d0 R08: 0000000000000000 R09: 0000000000000000 [ 789.433390] R10: 0000000037ecfe38 R11: 0000000000000246 R12: 0000000000000001 [ 789.433397] R13: 00007ffd0247038f R14: 00007f809b351300 R15: 0000000000022000 [ 789.433437] 01:47:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01", 0x1}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:42 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8983, &(0x7f0000000080)={'lo\x00', 0x0}) 01:47:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:42 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) (fail_nth: 1) 01:47:42 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) (fail_nth: 2) 01:47:42 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:47:42 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x20, r3, 0x1, 0x0, 0x0, {0x8}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000600)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x20, 0x0, 0x20, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_PAUSE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000004}, 0x4008000) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r1) syz_genetlink_get_family_id$smc(&(0x7f0000000200), r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000700)=ANY=[@ANYBLOB="53aeab626fd605c8773dc9b048d96428193bbd0f36d117542e4eaa2d062e190203da633395bc5ca385861d05991f53b5ff5f34454cccdddd51212992", @ANYRES16=0x0, @ANYBLOB="01000000000000000000080000000c00018008000100", @ANYRES32=r6, @ANYBLOB], 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f0000000c40)={0x174, r3, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0xe4, 0x2, 0x0, 0x1, [{0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}]}, @ETHTOOL_A_STRSET_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x8000}, 0x20000080) r7 = syz_genetlink_get_family_id$devlink(&(0x7f00000003c0), r1) sendmsg$DEVLINK_CMD_GET(r1, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0xe8, r7, 0x30e, 0x70bd25, 0x25dfdbfd, {}, [@pci={{0x8}, {0x11}}, @nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8}, {0x11}}, @nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8}, {0x11}}, @nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4000}, 0x1) r8 = syz_open_dev$vcsu(&(0x7f0000000240), 0x5, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r8, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x4c, r7, 0x20, 0x70bd27, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}]}, 0x4c}}, 0x20040800) sendmsg$DEVLINK_CMD_RATE_DEL(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r7, 0xc10, 0x70bd26, 0x25dfdbfb, {}, [@DEVLINK_ATTR_RATE_NODE_NAME={0xe}]}, 0x24}}, 0x40) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x43000000}}]}) sendmsg$TIPC_NL_KEY_SET(r8, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f00000008c0)={0x34c, 0x0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x180}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xf1ff}]}, @TIPC_NLA_NODE={0xe0, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x7a, 0x3, "a6a184cbb519d3497f4e767e2a1c3889cedee60cf8a7d8d79bbf7fdc81cca664b0a78da9ad27ae93f59b59cc787d874d96555f1a92972cdb8e44a10afa75388999f2ba450b6bc8ffa88637e162128a914a112e3296879dca2f95dfbc37207e3ded3e47ae43e4f65ba8caafaec1cfdcf8a974825a7424"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x43, 0x4, {'gcm(aes)\x00', 0x1b, "308b880a8322a9ab50a818f15318797fcaeae2ab5eca4cf1c86ff1"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_BEARER={0xe8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x20}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xb4, @rand_addr=' \x01\x00', 0xfff}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast2}}}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xeb1}]}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}]}, @TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}]}, @TIPC_NLA_BEARER={0x50, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9d7b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x15, 0x1, @l2={'ib', 0x3a, 'veth1_macvtap\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_BEARER={0xa4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd4}]}, @TIPC_NLA_BEARER_NAME={0x13, 0x1, @l2={'eth', 0x3a, 'veth1_vlan\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'gre0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'batadv0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x3}}, {0x14, 0x2, @in={0x2, 0x4e21, @broadcast}}}}]}]}, 0x34c}}, 0x40) [ 800.731060] FAULT_INJECTION: forcing a failure. [ 800.731060] name failslab, interval 1, probability 0, space 0, times 0 [ 800.732606] CPU: 0 UID: 0 PID: 7407 Comm: syz-executor.0 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 800.732629] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 800.732638] Call Trace: [ 800.732645] [ 800.732653] dump_stack_lvl+0xfa/0x120 [ 800.732686] should_fail_ex+0x4d7/0x5e0 [ 800.732719] should_failslab+0xc2/0x120 [ 800.732747] __kmalloc_cache_noprof+0x81/0x6b0 [ 800.732777] ? __mutex_lock+0xae3/0x1020 [ 800.732800] ? mark_held_locks+0x49/0x80 [ 800.732825] ? assoc_array_delete+0xb9/0xc40 [ 800.732858] ? assoc_array_delete+0xb9/0xc40 [ 800.732872] ? __key_move_lock+0x124/0x150 [ 800.732898] assoc_array_delete+0xb9/0xc40 [ 800.732932] ? __pfx_assoc_array_delete+0x10/0x10 [ 800.732968] ? __pfx_down_write_nested+0x10/0x10 [ 800.733000] ? __pfx_lookup_user_key+0x10/0x10 [ 800.733015] ? __mutex_unlock_slowpath+0x157/0x750 [ 800.733064] key_move+0xda/0x500 [ 800.733092] ? __pfx_keyring_search_iterator+0x10/0x10 [ 800.733116] ? __pfx_key_move+0x10/0x10 [ 800.733149] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 800.733173] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 800.733212] keyctl_keyring_move+0xf4/0x160 [ 800.733247] __do_sys_keyctl+0x508/0x5b0 [ 800.733280] do_syscall_64+0xbf/0x390 [ 800.733313] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 800.733330] RIP: 0033:0x7f40bc3adb19 [ 800.733344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 800.733360] RSP: 002b:00007f40b9923188 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 800.733376] RAX: ffffffffffffffda RBX: 00007f40bc4c0f60 RCX: 00007f40bc3adb19 [ 800.733387] RDX: 0000000012c3a631 RSI: 0000000034773af3 RDI: 000000000000001e [ 800.733397] RBP: 00007f40b99231d0 R08: 0000000000000000 R09: 0000000000000000 [ 800.733407] R10: 00000000249190a8 R11: 0000000000000246 R12: 0000000000000001 [ 800.733416] R13: 00007ffdd6ea451f R14: 00007f40b9923300 R15: 0000000000022000 [ 800.733477] [ 800.743496] loop5: detected capacity change from 0 to 512 [ 800.750335] loop7: detected capacity change from 0 to 512 [ 800.754167] loop2: detected capacity change from 0 to 512 [ 800.767599] FAULT_INJECTION: forcing a failure. [ 800.767599] name failslab, interval 1, probability 0, space 0, times 0 [ 800.769525] CPU: 1 UID: 0 PID: 7415 Comm: syz-executor.1 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 800.769557] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 800.769571] Call Trace: [ 800.769579] [ 800.769588] dump_stack_lvl+0xfa/0x120 [ 800.769625] should_fail_ex+0x4d7/0x5e0 [ 800.769659] should_failslab+0xc2/0x120 [ 800.769694] kmem_cache_alloc_node_noprof+0x87/0x6b0 [ 800.769723] ? __alloc_skb+0x2ab/0x370 [ 800.769759] ? __alloc_skb+0x2ab/0x370 [ 800.769780] ? __pfx_netlink_insert+0x10/0x10 [ 800.769806] __alloc_skb+0x2ab/0x370 [ 800.769831] ? __pfx___alloc_skb+0x10/0x10 [ 800.769855] ? netlink_autobind.isra.0+0x158/0x370 [ 800.769900] netlink_alloc_large_skb+0x69/0x150 [ 800.769932] netlink_sendmsg+0x66d/0xd80 [ 800.769969] ? __pfx_netlink_sendmsg+0x10/0x10 [ 800.770018] ____sys_sendmsg+0xa67/0xc20 [ 800.770055] ? copy_msghdr_from_user+0xfb/0x150 [ 800.770082] ? __pfx_____sys_sendmsg+0x10/0x10 [ 800.770137] ? lock_acquire+0x15e/0x2f0 [ 800.770178] ___sys_sendmsg+0x10f/0x1b0 [ 800.770206] ? __pfx____sys_sendmsg+0x10/0x10 [ 800.770230] ? perf_trace_lock+0xb5/0x5d0 [ 800.770271] ? __pfx_perf_trace_lock+0x10/0x10 [ 800.770303] ? proc_fail_nth_write+0x97/0x220 [ 800.770345] ? lock_acquire+0x15e/0x2f0 [ 800.770377] ? __fget_files+0x34/0x3b0 [ 800.770407] ? find_held_lock+0x2b/0x80 [ 800.770433] ? __fget_files+0x203/0x3b0 [ 800.770462] ? lock_release+0xc8/0x290 [ 800.770501] ? __fget_files+0x20d/0x3b0 [ 800.770546] __sys_sendmsg+0x150/0x200 [ 800.770573] ? __pfx___sys_sendmsg+0x10/0x10 [ 800.770615] ? __pfx_ksys_write+0x10/0x10 [ 800.770662] do_syscall_64+0xbf/0x390 [ 800.770701] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 800.770726] RIP: 0033:0x7fadb4bbeb19 [ 800.770744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 800.770767] RSP: 002b:00007fadb2134188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 800.770789] RAX: ffffffffffffffda RBX: 00007fadb4cd1f60 RCX: 00007fadb4bbeb19 [ 800.770806] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 800.770820] RBP: 00007fadb21341d0 R08: 0000000000000000 R09: 0000000000000000 [ 800.770834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 800.770848] R13: 00007fff59d0b57f R14: 00007fadb2134300 R15: 0000000000022000 [ 800.770888] 01:47:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x2, r2, r0, r1, 0x0) [ 800.839161] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 800.840069] EXT4-fs (loop7): group descriptors corrupted! [ 800.846551] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 800.848176] EXT4-fs (loop5): group descriptors corrupted! [ 800.849491] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 800.851765] EXT4-fs (loop2): group descriptors corrupted! 01:47:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) (fail_nth: 2) 01:47:43 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 800.972706] EXT4-fs: EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 01:47:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:43 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) (fail_nth: 3) 01:47:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x3, r2, r0, r1, 0x0) 01:47:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01", 0x1}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 801.103005] EXT4-fs: EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 [ 801.120893] loop7: detected capacity change from 0 to 512 [ 801.158557] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 801.160354] EXT4-fs (loop7): group descriptors corrupted! [ 801.167771] loop5: detected capacity change from 0 to 512 [ 801.170631] loop2: detected capacity change from 0 to 512 [ 801.193621] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 801.194503] EXT4-fs (loop2): group descriptors corrupted! [ 801.198361] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 801.199250] EXT4-fs (loop5): group descriptors corrupted! 01:47:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) (fail_nth: 3) 01:47:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x4, r2, r0, r1, 0x0) 01:47:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:53 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x20, r0, 0x300, 0x70bd2d, 0x25dfdbff, {{}, {@void, @void, @val={0xc, 0x99, {0xfff, 0x45}}}}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000080}, 0x8004) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000470008000f801", 0x17}, {0x0, 0x0, 0x1e0}], 0x0, &(0x7f0000010f00)) ioctl$FAT_IOCTL_GET_VOLUME_ID(r1, 0x80047213, &(0x7f00000001c0)) 01:47:53 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) (fail_nth: 4) 01:47:53 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8990, &(0x7f0000000080)={'lo\x00', 0x0}) 01:47:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01", 0x1}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 811.485919] loop5: detected capacity change from 0 to 512 [ 811.509863] loop7: detected capacity change from 0 to 512 [ 811.516549] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 811.518269] EXT4-fs (loop5): group descriptors corrupted! [ 811.528377] loop2: detected capacity change from 0 to 512 [ 811.531985] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 811.533819] EXT4-fs (loop7): group descriptors corrupted! [ 811.539877] FAULT_INJECTION: forcing a failure. [ 811.539877] name failslab, interval 1, probability 0, space 0, times 0 [ 811.541740] CPU: 1 UID: 0 PID: 7465 Comm: syz-executor.0 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 811.541771] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 811.541784] Call Trace: [ 811.541792] [ 811.541801] dump_stack_lvl+0xfa/0x120 [ 811.541840] should_fail_ex+0x4d7/0x5e0 [ 811.541872] should_failslab+0xc2/0x120 [ 811.541905] __kmalloc_cache_noprof+0x81/0x6b0 [ 811.541941] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 811.541972] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 811.542005] ? assoc_array_insert+0xe1/0x2ae0 [ 811.542035] ? assoc_array_insert+0xe1/0x2ae0 [ 811.542056] assoc_array_insert+0xe1/0x2ae0 [ 811.542079] ? keyring_compare_object+0x75/0x220 [ 811.542106] ? kasan_save_track+0x14/0x30 [ 811.542151] ? assoc_array_delete+0x28c/0xc40 [ 811.542180] ? __pfx_assoc_array_delete+0x10/0x10 [ 811.542202] ? __pfx_assoc_array_insert+0x10/0x10 [ 811.542227] ? down_write_nested+0x11d/0x1f0 [ 811.542269] ? __pfx_lookup_user_key+0x10/0x10 [ 811.542289] ? __mutex_unlock_slowpath+0x157/0x750 [ 811.542329] __key_link_begin+0xf0/0x260 [ 811.542360] key_move+0x11c/0x500 [ 811.542391] ? __pfx_keyring_search_iterator+0x10/0x10 [ 811.542419] ? __pfx_key_move+0x10/0x10 [ 811.542449] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 811.542480] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 811.542519] keyctl_keyring_move+0xf4/0x160 [ 811.542556] __do_sys_keyctl+0x508/0x5b0 [ 811.542593] do_syscall_64+0xbf/0x390 [ 811.542629] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 811.542652] RIP: 0033:0x7f40bc3adb19 [ 811.542669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 811.542689] RSP: 002b:00007f40b9923188 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 811.542710] RAX: ffffffffffffffda RBX: 00007f40bc4c0f60 RCX: 00007f40bc3adb19 [ 811.542725] RDX: 000000001c61ac09 RSI: 0000000009982042 RDI: 000000000000001e [ 811.542738] RBP: 00007f40b99231d0 R08: 0000000000000000 R09: 0000000000000000 [ 811.542752] R10: 00000000275fe198 R11: 0000000000000246 R12: 0000000000000001 [ 811.542765] R13: 00007ffdd6ea451f R14: 00007f40b9923300 R15: 0000000000022000 [ 811.542802] 01:47:53 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8992, &(0x7f0000000080)={'lo\x00', 0x0}) [ 811.605641] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 811.607011] EXT4-fs (loop2): group descriptors corrupted! 01:47:53 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) (fail_nth: 5) 01:47:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x5, r2, r0, r1, 0x0) 01:47:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:47:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) (fail_nth: 4) 01:47:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x4, r2, r0, r1, 0x0) 01:47:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 811.800775] loop5: detected capacity change from 0 to 512 [ 811.808624] loop7: detected capacity change from 0 to 512 [ 811.819603] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 811.853318] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 811.854831] EXT4-fs (loop7): group descriptors corrupted! 01:47:53 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) (fail_nth: 6) 01:47:53 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8993, &(0x7f0000000080)={'lo\x00', 0x0}) [ 811.999599] FAULT_INJECTION: forcing a failure. [ 811.999599] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 812.001677] CPU: 0 UID: 0 PID: 7491 Comm: syz-executor.1 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 812.001708] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 812.001720] Call Trace: [ 812.001729] [ 812.001739] dump_stack_lvl+0xfa/0x120 [ 812.001782] should_fail_ex+0x4d7/0x5e0 [ 812.001824] _copy_from_iter+0x1dc/0x1660 [ 812.001857] ? lock_acquire+0x15e/0x2f0 [ 812.001889] ? __virt_addr_valid+0x1c6/0x5d0 [ 812.001917] ? find_held_lock+0x2b/0x80 [ 812.001948] ? __pfx__copy_from_iter+0x10/0x10 [ 812.001971] ? lock_release+0xc8/0x290 [ 812.002018] ? __virt_addr_valid+0x100/0x5d0 [ 812.002049] ? __check_object_size+0x579/0x880 [ 812.002092] netlink_sendmsg+0x800/0xd80 [ 812.002150] ? __pfx_netlink_sendmsg+0x10/0x10 [ 812.002221] ____sys_sendmsg+0xa67/0xc20 [ 812.002261] ? copy_msghdr_from_user+0xfb/0x150 [ 812.002288] ? __pfx_____sys_sendmsg+0x10/0x10 [ 812.002338] ? perf_trace_run_bpf_submit+0xef/0x180 [ 812.002395] ___sys_sendmsg+0x10f/0x1b0 [ 812.002427] ? __pfx____sys_sendmsg+0x10/0x10 [ 812.002471] ? __pfx_perf_trace_lock+0x10/0x10 [ 812.002500] ? proc_fail_nth_write+0x97/0x220 [ 812.002549] ? lock_acquire+0x15e/0x2f0 [ 812.002579] ? __fget_files+0x34/0x3b0 [ 812.002609] ? find_held_lock+0x2b/0x80 [ 812.002635] ? __fget_files+0x203/0x3b0 [ 812.002664] ? lock_release+0xc8/0x290 [ 812.002711] ? __fget_files+0x20d/0x3b0 [ 812.002774] __sys_sendmsg+0x150/0x200 [ 812.002802] ? __pfx___sys_sendmsg+0x10/0x10 [ 812.002860] ? __pfx_ksys_write+0x10/0x10 [ 812.002924] do_syscall_64+0xbf/0x390 [ 812.002967] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 812.002990] RIP: 0033:0x7fadb4bbeb19 [ 812.003009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 812.003029] RSP: 002b:00007fadb2134188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 812.003051] RAX: ffffffffffffffda RBX: 00007fadb4cd1f60 RCX: 00007fadb4bbeb19 [ 812.003066] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 812.003079] RBP: 00007fadb21341d0 R08: 0000000000000000 R09: 0000000000000000 [ 812.003092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 812.003104] R13: 00007fff59d0b57f R14: 00007fadb2134300 R15: 0000000000022000 [ 812.003171] [ 812.024713] loop2: detected capacity change from 0 to 512 [ 812.054167] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 812.055513] EXT4-fs (loop2): group descriptors corrupted! 01:48:03 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) (fail_nth: 7) 01:48:03 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x6, r2, r0, r1, 0x0) 01:48:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) (fail_nth: 5) 01:48:04 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x1ff) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 01:48:04 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8994, &(0x7f0000000080)={'lo\x00', 0x0}) [ 821.953243] loop5: detected capacity change from 0 to 512 [ 821.955994] loop2: detected capacity change from 0 to 512 [ 821.977627] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 821.987108] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 821.988626] EXT4-fs (loop2): group descriptors corrupted! [ 822.010380] loop7: detected capacity change from 0 to 512 [ 822.022979] FAULT_INJECTION: forcing a failure. [ 822.022979] name failslab, interval 1, probability 0, space 0, times 0 [ 822.024795] CPU: 1 UID: 0 PID: 7517 Comm: syz-executor.1 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 822.024826] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 822.024839] Call Trace: [ 822.024847] [ 822.024856] dump_stack_lvl+0xfa/0x120 [ 822.024895] should_fail_ex+0x4d7/0x5e0 [ 822.024927] should_failslab+0xc2/0x120 [ 822.024960] kmem_cache_alloc_node_noprof+0x87/0x6b0 [ 822.024984] ? perf_trace_lock_acquire+0xc9/0x700 [ 822.025019] ? __alloc_skb+0x2ab/0x370 [ 822.025051] ? __alloc_skb+0x2ab/0x370 [ 822.025070] __alloc_skb+0x2ab/0x370 [ 822.025093] ? __pfx___alloc_skb+0x10/0x10 [ 822.025119] ? __mutex_trylock_common+0xf9/0x260 [ 822.025160] ? __pfx___mutex_trylock_common+0x10/0x10 [ 822.025198] netlink_dump+0x194/0x1200 [ 822.025226] ? trace_contention_end+0xca/0x110 [ 822.025259] ? __mutex_lock+0x166/0x1020 [ 822.025292] ? __pfx_netlink_dump+0x10/0x10 [ 822.025315] ? __pfx_perf_trace_lock+0x10/0x10 [ 822.025346] ? __netlink_lookup+0x63e/0x8f0 [ 822.025385] ? lock_release+0xc8/0x290 [ 822.025427] __netlink_dump_start+0x6c5/0x980 [ 822.025457] ? __pfx_xfrm_dump_sa+0x10/0x10 [ 822.025479] xfrm_user_rcv_msg+0x710/0xa00 [ 822.025517] ? __is_insn_slot_addr+0x2e/0x290 [ 822.025546] ? __pfx_xfrm_user_rcv_msg+0x10/0x10 [ 822.025581] ? __is_insn_slot_addr+0x136/0x290 [ 822.025607] ? __pfx_xfrm_dump_sa+0x10/0x10 [ 822.025625] ? __pfx_xfrm_dump_sa_done+0x10/0x10 [ 822.025665] ? __is_insn_slot_addr+0x140/0x290 [ 822.025695] ? kernel_text_address+0x5b/0xc0 [ 822.025727] ? __kernel_text_address+0xd/0x40 [ 822.025756] ? unwind_get_return_address+0x59/0xa0 [ 822.025777] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 822.025813] ? perf_trace_lock_acquire+0xc9/0x700 [ 822.025853] ? __lock_acquire+0xc65/0x1b70 [ 822.025898] ? __mutex_trylock_common+0xf9/0x260 [ 822.025932] ? __pfx___mutex_trylock_common+0x10/0x10 [ 822.025977] netlink_rcv_skb+0x147/0x430 [ 822.026005] ? __pfx_xfrm_user_rcv_msg+0x10/0x10 [ 822.026044] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 822.026091] ? netlink_deliver_tap+0x1ae/0xce0 [ 822.026123] xfrm_netlink_rcv+0x74/0x90 [ 822.026156] netlink_unicast+0x5a7/0x870 [ 822.026190] ? __pfx_netlink_unicast+0x10/0x10 [ 822.026234] netlink_sendmsg+0x8a3/0xd80 [ 822.026269] ? __pfx_netlink_sendmsg+0x10/0x10 [ 822.026314] ____sys_sendmsg+0xa67/0xc20 [ 822.026347] ? copy_msghdr_from_user+0xfb/0x150 [ 822.026372] ? __pfx_____sys_sendmsg+0x10/0x10 [ 822.026416] ? lock_acquire+0x15e/0x2f0 [ 822.026452] ___sys_sendmsg+0x10f/0x1b0 [ 822.026478] ? __pfx____sys_sendmsg+0x10/0x10 [ 822.026499] ? perf_trace_lock+0xb5/0x5d0 [ 822.026536] ? __pfx_perf_trace_lock+0x10/0x10 [ 822.026565] ? proc_fail_nth_write+0x97/0x220 [ 822.026604] ? lock_acquire+0x15e/0x2f0 [ 822.026632] ? __fget_files+0x34/0x3b0 [ 822.026660] ? find_held_lock+0x2b/0x80 [ 822.026683] ? __fget_files+0x203/0x3b0 [ 822.026709] ? lock_release+0xc8/0x290 [ 822.026745] ? __fget_files+0x20d/0x3b0 [ 822.026787] __sys_sendmsg+0x150/0x200 [ 822.026811] ? __pfx___sys_sendmsg+0x10/0x10 [ 822.026849] ? __pfx_ksys_write+0x10/0x10 [ 822.026893] do_syscall_64+0xbf/0x390 [ 822.026929] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 822.026952] RIP: 0033:0x7fadb4bbeb19 [ 822.026969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 822.026989] RSP: 002b:00007fadb2134188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 822.027010] RAX: ffffffffffffffda RBX: 00007fadb4cd1f60 RCX: 00007fadb4bbeb19 [ 822.027025] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 822.027038] RBP: 00007fadb21341d0 R08: 0000000000000000 R09: 0000000000000000 [ 822.027052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 822.027064] R13: 00007fff59d0b57f R14: 00007fadb2134300 R15: 0000000000022000 [ 822.027102] [ 822.127239] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 822.128889] EXT4-fs (loop7): group descriptors corrupted! 01:48:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x7, r2, r0, r1, 0x0) 01:48:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:04 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8995, &(0x7f0000000080)={'lo\x00', 0x0}) [ 822.183187] FAULT_INJECTION: forcing a failure. [ 822.183187] name failslab, interval 1, probability 0, space 0, times 0 [ 822.185099] CPU: 0 UID: 0 PID: 7514 Comm: syz-executor.0 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 822.185153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 822.185171] Call Trace: [ 822.185181] [ 822.185194] dump_stack_lvl+0xfa/0x120 [ 822.185242] should_fail_ex+0x4d7/0x5e0 [ 822.185292] should_failslab+0xc2/0x120 [ 822.185334] __kmalloc_cache_noprof+0x81/0x6b0 [ 822.185378] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 822.185414] ? assoc_array_walk.isra.0+0x1d0/0x5c0 [ 822.185454] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 822.185493] ? assoc_array_insert+0x3c9/0x2ae0 [ 822.185543] ? assoc_array_insert+0x3c9/0x2ae0 [ 822.185571] assoc_array_insert+0x3c9/0x2ae0 [ 822.185604] ? keyring_compare_object+0x75/0x220 [ 822.185656] ? assoc_array_delete+0x28c/0xc40 [ 822.185706] ? __pfx_assoc_array_delete+0x10/0x10 [ 822.185735] ? __pfx_assoc_array_insert+0x10/0x10 [ 822.185773] ? down_write_nested+0x11d/0x1f0 [ 822.185831] ? __pfx_lookup_user_key+0x10/0x10 [ 822.185854] ? __mutex_unlock_slowpath+0x157/0x750 [ 822.185917] __key_link_begin+0xf0/0x260 [ 822.185961] key_move+0x11c/0x500 [ 822.186005] ? __pfx_keyring_search_iterator+0x10/0x10 [ 822.186041] ? __pfx_key_move+0x10/0x10 [ 822.186084] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 822.186120] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 822.186182] keyctl_keyring_move+0xf4/0x160 [ 822.186236] __do_sys_keyctl+0x508/0x5b0 [ 822.186289] do_syscall_64+0xbf/0x390 [ 822.186341] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 822.186370] RIP: 0033:0x7f40bc3adb19 [ 822.186391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 822.186415] RSP: 002b:00007f40b9923188 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 822.186440] RAX: ffffffffffffffda RBX: 00007f40bc4c0f60 RCX: 00007f40bc3adb19 [ 822.186457] RDX: 000000001a331329 RSI: 000000003d61da08 RDI: 000000000000001e 01:48:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 822.186472] RBP: 00007f40b99231d0 R08: 0000000000000000 R09: 0000000000000000 [ 822.186488] R10: 000000001055fbe9 R11: 0000000000000246 R12: 0000000000000001 [ 822.186503] R13: 00007ffdd6ea451f R14: 00007f40b9923300 R15: 0000000000022000 [ 822.186583] 01:48:04 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x89a0, &(0x7f0000000080)={'lo\x00', 0x0}) [ 822.281842] loop5: detected capacity change from 0 to 512 [ 822.295915] Process accounting paused [ 822.305965] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 822.311437] loop2: detected capacity change from 0 to 512 01:48:04 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) (fail_nth: 8) [ 822.334898] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 822.336352] EXT4-fs (loop2): group descriptors corrupted! 01:48:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) (fail_nth: 6) [ 822.361585] loop7: detected capacity change from 0 to 512 01:48:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 822.410689] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 822.412248] EXT4-fs (loop7): group descriptors corrupted! 01:48:15 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x89a3, &(0x7f0000000080)={'lo\x00', 0x0}) 01:48:15 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) (fail_nth: 7) 01:48:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01", 0x1}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:15 executing program 3: mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x15) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 01:48:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:15 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) (fail_nth: 9) 01:48:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x8, r2, r0, r1, 0x0) [ 833.482423] loop5: detected capacity change from 0 to 512 [ 833.500701] loop2: detected capacity change from 0 to 512 [ 833.519953] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 833.522829] loop7: detected capacity change from 0 to 512 [ 833.525524] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 833.526858] EXT4-fs (loop2): group descriptors corrupted! 01:48:15 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) (fail_nth: 10) [ 833.532797] FAULT_INJECTION: forcing a failure. [ 833.532797] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 833.534619] CPU: 1 UID: 0 PID: 7567 Comm: syz-executor.0 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 833.534649] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 833.534662] Call Trace: [ 833.534669] [ 833.534678] dump_stack_lvl+0xfa/0x120 [ 833.534716] should_fail_ex+0x4d7/0x5e0 [ 833.534749] _copy_to_user+0x32/0xd0 [ 833.534779] simple_read_from_buffer+0xe0/0x180 [ 833.534810] proc_fail_nth_read+0x18a/0x240 [ 833.534845] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 833.534879] ? security_file_permission+0x22/0x90 [ 833.534915] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 833.534947] vfs_read+0x1eb/0xc70 [ 833.534984] ? __pfx_vfs_read+0x10/0x10 [ 833.535014] ? lock_release+0xc8/0x290 [ 833.535052] ? __fget_files+0x20d/0x3b0 [ 833.535094] ksys_read+0x121/0x240 [ 833.535121] ? __pfx_ksys_read+0x10/0x10 [ 833.535156] ? keyctl_keyring_move+0x11e/0x160 [ 833.535199] do_syscall_64+0xbf/0x390 [ 833.535236] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 833.535259] RIP: 0033:0x7f40bc36069c [ 833.535276] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 833.535296] RSP: 002b:00007f40b9923170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 833.535318] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f40bc36069c [ 833.535332] RDX: 000000000000000f RSI: 00007f40b99231e0 RDI: 0000000000000004 [ 833.535345] RBP: 00007f40b99231d0 R08: 0000000000000000 R09: 0000000000000000 [ 833.535358] R10: 000000003703bf55 R11: 0000000000000246 R12: 0000000000000001 [ 833.535371] R13: 00007ffdd6ea451f R14: 00007f40b9923300 R15: 0000000000022000 [ 833.535408] [ 833.585474] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 833.586382] EXT4-fs (loop7): group descriptors corrupted! 01:48:15 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f0000000080)={'lo\x00', 0x0}) 01:48:15 executing program 3: ioperm(0x7fa, 0x0, 0x2) ioperm(0x24000, 0x3, 0xfffffffffffeffff) ioperm(0x0, 0x20, 0x6) modify_ldt$read_default(0x2, &(0x7f0000000780)=""/190, 0xbe) modify_ldt$read_default(0x2, &(0x7f0000000440)=""/175, 0xaf) ioperm(0x401, 0x8, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffffff, 0x7, &(0x7f0000000640)=[{&(0x7f0000000180)="17e2fa864db4aa4a0a826ce05d06eb00425e1fb263042b4ddb3d8f1bb00e30fbb89f28fe7ad4ce1e589c98d8d9a629973bddac996cd3d8894cba0c483b802a9e8625d97a98a7fae7ab9a72d8780c23995d644b4c24cbe7a41ac6774c", 0x5c, 0x6}, {&(0x7f0000000200)="5b7f46f4a6dc460295b62cf858a785ae5f7add6cff15e7e7435ec2a9c6b7ec45c757863ba1ae0ee468570b66e816bec3d89c173ff58b1822db40e1878e20a38abaf117cf0267b42deffd512264e83bb633f2d6d03849d1b26a86754732ff45c13f18289b1c2793e8be43b877115f31761c1602b7eb45d75f05301e3abd2f44d904501704d125737f39ca90f2222743a19625b89b22a8981afe8556eb86", 0x9d, 0x80}, {&(0x7f00000002c0)="14e5561506198e40ee985eb594a1b07a04d6690bed55b2edff38814fed82e8183f7e3e8901033a1448215adc98f5712bc86e64f8221f073505c452eb6973794bcfcdb030ae8d762939fac8bd669579749651c553e4f19262b287da0fd0594591ac591e012793166ec565dec53d34bf42266b", 0x72}, {&(0x7f0000000340)="c3d9a08c75200572af27dd759ecd05ca223cb39a649daecca70228dade01c87a4a8776d5a39ee62c0091eeb53e62a8318419bb25a85195c7db10dc4f64120cea68faa015799fd94a046ca3876584d589fa318c03965368d9877f5154c2bc123a78faae718c682f273b927f471d8181237f9d83a2f1c5804e18e8bec0336945463708507d3b1e6fcf47e8a9f8035815e4b93e2ff1ab05f1dc71cbb8df564bd132404e0e50823f32f24dfa34", 0xab, 0x2}, {&(0x7f0000000400)="481e57c39c8ca9034a8e", 0xa, 0x6}, {0x0, 0x0, 0x6}, {&(0x7f0000000440)}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=0xee01, @ANYBLOB=',mpol=bind,uid=', @ANYRESHEX=0x0, @ANYBLOB="9a175ef26bbd7366fe23702a59be978af47a6528376769643d0000cda08cb7305948fb3645cdad862ec103474382", @ANYRESHEX=0xee01, @ANYBLOB=',huge=advise,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c13ff61676b6673686c6f6f72ff027174643e", @ANYRESDEC=0xee00, @ANYBLOB=',smackfstral\x00\x00\x00\x00\x00\x00\x00:{-#.,appraise,obj_role=,\x00']) 01:48:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 833.795844] loop2: detected capacity change from 0 to 512 [ 833.802599] loop5: detected capacity change from 0 to 512 [ 833.809651] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 833.811120] EXT4-fs (loop2): group descriptors corrupted! [ 833.816601] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:48:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:48:27 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x9, r2, r0, r1, 0x0) 01:48:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180), 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200), 0x0, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:27 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) (fail_nth: 11) 01:48:27 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x89b1, &(0x7f0000000080)={'lo\x00', 0x0}) 01:48:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x42) write(r1, &(0x7f0000000900)='^', 0x1) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x44000) sendfile(r1, r2, 0x0, 0xfdef) write(r0, &(0x7f0000000900)="5ed0b2ff68d76fb346352b602a2a1295cbe01cb3f64fbed9e7f9bc9be0f300cb97f6a204cc586e45dfb949002f61f8fb969dd435dd0c37c5077e5b10cfeafd75205e215b167323a3b971b0ec98e6c3d4d825cae01271cb35cdd091e4872367f354e0dc81a7e4ac79775bc1dcaafe2f5079da79d1989f1ddce6722fc438a7217526cfe75d53471624d6f091e19a7fb699ea27efa9e0fd1914e7c35f297afd9b9b85ff0ce7a982f4fa0c172ea5f06479eec302f30e5df66273717e028f4ca7d4c5b6bc8a3c3c67f688195f22488a15d9e1f7e5fed3a6c2aba7bc308b0e2c5657", 0xdf) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r4, 0x2, r3, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x8a, 0x2, 0x60, 0x3, 0x0, 0x101, 0x24410, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x200, 0x0, @perf_config_ext={0x100000000}, 0x50801, 0xc70, 0x1, 0x2, 0x9, 0x8, 0x81, 0x0, 0xffff, 0x0, 0xfccc}, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0x3) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendfile(r0, r5, 0x0, 0xfdef) 01:48:27 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01", 0x1}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 845.445403] loop7: detected capacity change from 0 to 512 [ 845.450261] FAULT_INJECTION: forcing a failure. [ 845.450261] name failslab, interval 1, probability 0, space 0, times 0 [ 845.451453] CPU: 0 UID: 0 PID: 7592 Comm: syz-executor.1 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 845.451469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 845.451477] Call Trace: [ 845.451482] [ 845.451488] dump_stack_lvl+0xfa/0x120 [ 845.451515] should_fail_ex+0x4d7/0x5e0 [ 845.451539] should_failslab+0xc2/0x120 [ 845.451560] __kmalloc_node_track_caller_noprof+0xc6/0x690 [ 845.451582] ? xfrm_dump_sa+0x282/0x590 [ 845.451607] kmemdup_noprof+0x2b/0x60 [ 845.451629] xfrm_dump_sa+0x282/0x590 [ 845.451646] ? __pfx_xfrm_dump_sa+0x10/0x10 [ 845.451735] ? __mutex_trylock_common+0xf9/0x260 [ 845.451760] ? __pfx___mutex_trylock_common+0x10/0x10 [ 845.451786] netlink_dump+0x51a/0x1200 [ 845.451812] ? __mutex_lock+0x166/0x1020 [ 845.451833] ? __pfx_netlink_dump+0x10/0x10 [ 845.451846] ? __pfx_perf_trace_lock+0x10/0x10 [ 845.451865] ? __netlink_lookup+0x63e/0x8f0 [ 845.451899] ? lock_release+0xc8/0x290 [ 845.451932] __netlink_dump_start+0x6c5/0x980 [ 845.451953] ? __pfx_xfrm_dump_sa+0x10/0x10 [ 845.451966] xfrm_user_rcv_msg+0x710/0xa00 [ 845.451996] ? __pfx_xfrm_user_rcv_msg+0x10/0x10 [ 845.452019] ? __pfx_xfrm_dump_sa+0x10/0x10 [ 845.452029] ? __pfx_xfrm_dump_sa_done+0x10/0x10 [ 845.452058] ? __pfx_perf_tp_event+0x10/0x10 [ 845.452081] ? __kernel_text_address+0xd/0x40 [ 845.452106] ? perf_trace_lock_acquire+0xc9/0x700 [ 845.452139] ? __lock_acquire+0xc65/0x1b70 [ 845.452179] ? __mutex_trylock_common+0xf9/0x260 [ 845.452200] ? __pfx___mutex_trylock_common+0x10/0x10 [ 845.452236] netlink_rcv_skb+0x147/0x430 [ 845.452254] ? __pfx_xfrm_user_rcv_msg+0x10/0x10 [ 845.452279] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 845.452321] ? netlink_deliver_tap+0x1ae/0xce0 [ 845.452345] xfrm_netlink_rcv+0x74/0x90 [ 845.452365] netlink_unicast+0x5a7/0x870 [ 845.452390] ? __pfx_netlink_unicast+0x10/0x10 [ 845.452429] netlink_sendmsg+0x8a3/0xd80 [ 845.452456] ? __pfx_netlink_sendmsg+0x10/0x10 [ 845.452495] ____sys_sendmsg+0xa67/0xc20 [ 845.452518] ? copy_msghdr_from_user+0xfb/0x150 [ 845.452534] ? __pfx_____sys_sendmsg+0x10/0x10 [ 845.452562] ? perf_trace_run_bpf_submit+0xef/0x180 [ 845.452592] ___sys_sendmsg+0x10f/0x1b0 [ 845.452610] ? __pfx____sys_sendmsg+0x10/0x10 [ 845.452634] ? __pfx_perf_trace_lock+0x10/0x10 [ 845.452650] ? proc_fail_nth_write+0x97/0x220 [ 845.452677] ? lock_acquire+0x15e/0x2f0 [ 845.452694] ? __fget_files+0x34/0x3b0 [ 845.452711] ? find_held_lock+0x2b/0x80 [ 845.452725] ? __fget_files+0x203/0x3b0 [ 845.452741] ? lock_release+0xc8/0x290 [ 845.452767] ? __fget_files+0x20d/0x3b0 [ 845.452803] __sys_sendmsg+0x150/0x200 [ 845.452817] ? __pfx___sys_sendmsg+0x10/0x10 [ 845.452850] ? __pfx_ksys_write+0x10/0x10 [ 845.452886] do_syscall_64+0xbf/0x390 [ 845.452909] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 845.452923] RIP: 0033:0x7fadb4bbeb19 [ 845.452933] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 845.452946] RSP: 002b:00007fadb2134188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 845.452958] RAX: ffffffffffffffda RBX: 00007fadb4cd1f60 RCX: 00007fadb4bbeb19 [ 845.452966] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 845.452974] RBP: 00007fadb21341d0 R08: 0000000000000000 R09: 0000000000000000 [ 845.452981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 845.452988] R13: 00007fff59d0b57f R14: 00007fadb2134300 R15: 0000000000022000 [ 845.453026] [ 845.489365] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 845.490082] EXT4-fs (loop7): group descriptors corrupted! [ 845.515078] loop2: detected capacity change from 0 to 512 [ 845.533866] loop5: detected capacity change from 0 to 512 01:48:27 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01", 0x1}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 845.543862] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 845.545325] EXT4-fs (loop2): group descriptors corrupted! 01:48:27 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) (fail_nth: 12) [ 845.573354] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 845.592665] loop7: detected capacity change from 0 to 512 01:48:27 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0xa, r2, r0, r1, 0x0) 01:48:27 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'lo\x00', 0x0}) [ 845.639529] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 845.641000] EXT4-fs (loop7): group descriptors corrupted! 01:48:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01", 0x1}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x2, r2, r0, r1, 0x0) 01:48:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180), 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:27 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x89ff, &(0x7f0000000080)={'lo\x00', 0x0}) [ 845.800750] loop2: detected capacity change from 0 to 512 [ 845.806369] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 845.807845] EXT4-fs (loop2): group descriptors corrupted! [ 845.815107] loop5: detected capacity change from 0 to 512 [ 845.825446] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:48:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01", 0x1}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:37 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0xb, r2, r0, r1, 0x0) 01:48:37 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x40049409, &(0x7f0000000080)={'lo\x00', 0x0}) 01:48:37 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) (fail_nth: 13) 01:48:37 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x3, r2, r0, r1, 0x0) 01:48:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180), 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:37 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x42) write(r1, &(0x7f0000000900)='^', 0x1) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x44000) sendfile(r1, r2, 0x0, 0xfdef) write(r0, &(0x7f0000000900)="5ed0b2ff68d76fb346352b602a2a1295cbe01cb3f64fbed9e7f9bc9be0f300cb97f6a204cc586e45dfb949002f61f8fb969dd435dd0c37c5077e5b10cfeafd75205e215b167323a3b971b0ec98e6c3d4d825cae01271cb35cdd091e4872367f354e0dc81a7e4ac79775bc1dcaafe2f5079da79d1989f1ddce6722fc438a7217526cfe75d53471624d6f091e19a7fb699ea27efa9e0fd1914e7c35f297afd9b9b85ff0ce7a982f4fa0c172ea5f06479eec302f30e5df66273717e028f4ca7d4c5b6bc8a3c3c67f688195f22488a15d9e1f7e5fed3a6c2aba7bc308b0e2c5657", 0xdf) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r4, 0x2, r3, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x8a, 0x2, 0x60, 0x3, 0x0, 0x101, 0x24410, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x200, 0x0, @perf_config_ext={0x100000000}, 0x50801, 0xc70, 0x1, 0x2, 0x9, 0x8, 0x81, 0x0, 0xffff, 0x0, 0xfccc}, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0x3) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendfile(r0, r5, 0x0, 0xfdef) [ 855.479817] loop7: detected capacity change from 0 to 512 [ 855.488081] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 855.488505] loop5: detected capacity change from 0 to 512 [ 855.515919] loop2: detected capacity change from 0 to 512 01:48:37 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0xc, r2, r0, r1, 0x0) [ 855.526572] FAULT_INJECTION: forcing a failure. [ 855.526572] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 855.528473] CPU: 1 UID: 0 PID: 7645 Comm: syz-executor.1 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) 01:48:37 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 855.528504] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 855.528518] Call Trace: [ 855.528526] [ 855.528535] dump_stack_lvl+0xfa/0x120 [ 855.528575] should_fail_ex+0x4d7/0x5e0 [ 855.528609] _copy_to_user+0x32/0xd0 [ 855.528642] simple_read_from_buffer+0xe0/0x180 [ 855.528674] proc_fail_nth_read+0x18a/0x240 [ 855.528711] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 855.528747] ? security_file_permission+0x22/0x90 [ 855.528785] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 855.528820] vfs_read+0x1eb/0xc70 [ 855.528859] ? __pfx_vfs_read+0x10/0x10 [ 855.528892] ? lock_release+0xc8/0x290 [ 855.528932] ? __fget_files+0x20d/0x3b0 [ 855.528978] ksys_read+0x121/0x240 [ 855.529007] ? __pfx_ksys_read+0x10/0x10 [ 855.529052] do_syscall_64+0xbf/0x390 [ 855.529091] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 855.529115] RIP: 0033:0x7fadb4b7169c [ 855.529140] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 855.529162] RSP: 002b:00007fadb2134170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 855.529185] RAX: ffffffffffffffda RBX: 0000000000000038 RCX: 00007fadb4b7169c [ 855.529200] RDX: 000000000000000f RSI: 00007fadb21341e0 RDI: 0000000000000005 [ 855.529214] RBP: 00007fadb21341d0 R08: 0000000000000000 R09: 0000000000000000 [ 855.529228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 855.529242] R13: 00007fff59d0b57f R14: 00007fadb2134300 R15: 0000000000022000 [ 855.529282] [ 855.566227] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 855.588431] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 855.589281] EXT4-fs (loop2): group descriptors corrupted! [ 855.621976] loop7: detected capacity change from 0 to 512 01:48:37 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x40086602, &(0x7f0000000080)={'lo\x00', 0x0}) [ 855.634701] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 01:48:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01", 0x1}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:37 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0xd, r2, r0, r1, 0x0) [ 855.677877] Process accounting resumed 01:48:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x4, r2, r0, r1, 0x0) 01:48:37 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:48:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2", 0x31, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:37 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 855.763116] loop7: detected capacity change from 0 to 512 [ 855.764048] loop5: detected capacity change from 0 to 512 [ 855.772172] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 855.772723] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 855.798362] loop2: detected capacity change from 0 to 512 [ 855.833470] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 855.834879] EXT4-fs (loop2): group descriptors corrupted! 01:48:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9232, 0x68188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000015c0)=[{{&(0x7f0000000140)={0x2, 0x4e1e, 0x0, @local}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000100)}}], 0x2, 0x4) 01:48:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2", 0x31, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:37 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:37 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 855.882739] loop5: detected capacity change from 0 to 512 [ 855.897225] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:48:47 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x40087602, &(0x7f0000000080)={'lo\x00', 0x0}) 01:48:47 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:48:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:47 executing program 3: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x124240, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r4) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r5) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:ipmi_device_t:s0\x00', 0x21, 0x0) r6 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) fsetxattr$security_selinux(r6, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:ipmi_device_t:s0\x00', 0x21, 0x0) 01:48:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0xe, r2, r0, r1, 0x0) 01:48:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x5, r2, r0, r1, 0x0) 01:48:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2", 0x31, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 865.787031] loop7: detected capacity change from 0 to 512 [ 865.788565] loop5: detected capacity change from 0 to 512 [ 865.794595] loop2: detected capacity change from 0 to 512 [ 865.814611] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 865.815681] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 865.818563] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 865.860060] SELinux: Context system_u:object_r:ipmi_device_t:s is not valid (left unmapped). 01:48:58 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:48:58 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0xf, r2, r0, r1, 0x0) 01:48:58 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:58 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x6, r2, r0, r1, 0x0) 01:48:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000", 0x4a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:58 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x401c5820, &(0x7f0000000080)={'lo\x00', 0x0}) 01:48:58 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x80080, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x324}, 0x1, 0x0, 0x0, 0x2048000}, 0x30000080) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r1) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f00000002c0)={0x91, 0x7d, 0x2, {{0x0, 0x7b, 0x7, 0x1, {0x0, 0x0, 0x7}, 0x40000, 0x481c, 0x409, 0x14000000000000, 0x12, '/dev/loop-control\x00', 0x12, '/dev/loop-control\x00', 0x12, '/dev/loop-control\x00', 0x12, '/dev/loop-control\x00'}, 0x1, '/', 0xffffffffffffffff, r2, 0xee00}}, 0x91) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) io_setup(0xfff, &(0x7f0000000040)) write$binfmt_script(r3, &(0x7f0000000100)=ANY=[], 0x8b) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/stat\x00', 0x0, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000180)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) [ 876.000151] loop2: detected capacity change from 0 to 512 [ 876.005041] loop7: detected capacity change from 0 to 512 [ 876.011213] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 876.016426] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 01:48:58 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x4020940d, &(0x7f0000000080)={'lo\x00', 0x0}) [ 876.050525] loop5: detected capacity change from 0 to 512 01:48:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:58 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180), 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:48:58 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 876.131952] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 876.134148] EXT4-fs (loop5): group descriptors corrupted! [ 876.152447] loop2: detected capacity change from 0 to 512 01:48:58 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x10, r2, r0, r1, 0x0) [ 876.188046] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 01:48:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 876.223514] loop5: detected capacity change from 0 to 512 [ 876.226854] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:48:58 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x7, r2, r0, r1, 0x0) [ 876.366018] loop7: detected capacity change from 0 to 512 [ 876.377972] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 01:49:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x11, r2, r0, r1, 0x0) 01:49:10 executing program 3: kexec_load(0x4, 0x8, &(0x7f0000001480)=[{&(0x7f0000000080)="9efe759abe2c9170888294d72e", 0xd, 0x4, 0xd2}, {&(0x7f00000000c0)="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", 0xff, 0x1a36, 0x4}, {&(0x7f00000001c0)="3634e98d91bd678472f72b9ee8fdc15f425291b499804bbd8d74815738f04d10792260b04345be7feecafedb22863192735ffa04f56a7b647076c9f98f876003a939b40317e449f34b8f5ce62c493d6c0d0a99c6d34155194e7b208667256e3a688af29ffd84ff76bdefdf0f326253ca5e26b9850bac66492fb9d761db12197a2d637f794850bb6b32b56a22018c794479504a4afd39174ca7e866d3c96566125352eefc272a4a80485deb9d4bf532e63894e8f0", 0xb4, 0x5f3, 0x68ce}, {&(0x7f0000000280)="1abcca63c6b4a5dbcd5f16b6559fabcf9f626652dd999ce4997400078097e7f3d5ab7ce0a75aed", 0x27, 0xffffffffffffdb96, 0x8}, {&(0x7f00000002c0)="5753930d00e1d846d24506a5c60eb4130f4220040a42ed017b260557526ec8a091e792a9e3f62323df4b36e440b02008a21e9c95c00119821a525d7e6365bd08b3f6ba15083728f77d5dc405c650ea1ae8661102f9c541e395", 0x59, 0x2, 0x1}, {&(0x7f0000000340)="9eee95eca3912decaef7ca0d9e0195f94cf91a2eb7f5ac4fadbc72b52ff7c38a64a2bcd4087cb468fff3b207b926574d383ae08eaf99f5430cdeb9cb2d6c9a7350f21c460ce56f59590b38c9d893ee51c757886b073fb596bd9d1f08a3ece780e483ec901c690a9ea4085bf145f4a5bdeee3b97361f0f1707907ea88ebc74a012b408c9a8d3a3695e4980bd83454770a0c3607877c5c9bba57e9f115d649163d0e7523ddb1ec5b63a061f394bec5498bd3a0d3795761ade9b230f318e02d959abb61fdee1ceba27481b26ddf5b9572f9", 0xd0, 0x3f, 0x7}, {&(0x7f0000000440)="b772a26a0bf110427f633873b703b60df07c2bfa4f943b9f9abb672c0bb25ea29d9c45ec8657ff4b", 0x28, 0x1, 0x3}, {&(0x7f0000000480)="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", 0x1000, 0xce, 0x1}], 0x3e0000) kexec_load(0xc5, 0x8, &(0x7f0000001b40)=[{&(0x7f0000001580)="77d04ba0d3cf14bcfbf658b44962150bcd0d5be9a36ba9880d0f9dcf377f515291f424977d5ce3ef254d8ac8556828114bbbe773cbcbd90fd9f2ec3509c02405719940ed042543425fa74f469c9faa629b4b33b1626fc34fca03b32b9c3e95223050e01404bb583749bc86b336626287e0587edc47d0e13783c64c93ebc7361e935ddfd3588c40a721098bfe", 0x8c, 0x0, 0x401}, {&(0x7f0000001640)="80c06544255c6480d20bdd8ce806818062d7f8f0b0212e37a3b613a0ba48ad4c4436d03c8baa718aaf1bd4c69f6b9866b69f9b7cfcfa58db2a636e3e0f65d82183e10561d4e9cce29435d1d9073fe02bbd5ff0f904a71d57409d144ec4898d70f95f5c1da3580e3417158dcd30e9dbe937128c5ae15bed509749b8e9fd71aebeab636df087527d63c4cf88615f991865b7f598cd5a4942ca2ee36818dab791a81a1240c2f3abc966a9e05f16a0400ca34ec7a913ee64e65d52135ba79c5f48b600a209f14670386e3a00cedd1bd8a3571c85", 0xd2, 0xffffffff, 0x7}, {&(0x7f0000001740)="948f55fe06d5e5ffcf0fc737764ea25c163cb4b2d5ed5fa8d3592885c14d499d7addd4c7d5224f4607f183d8106dc297f5b92566f8d83d01a32202", 0x3b, 0xf8, 0x2}, {&(0x7f0000001780)="bcab750e78e9b191c6dbe7b2fba12165f69fb8297dfb1ed9b06733042cde48618507446a16c3845bbddfda469876d503057d00dbe8afd02b18ae2fa6bf27728638ec4ed4cf0f30f000656a808c9dcd5c265809f370af38b6c781ada01ef0127f3dcf6797de64102412245818174859d6e1aa5124a12f47901a9399e715cc140c0dddd6e8c94d6e23e9d539cc24887685b427426ad9d3a8886ec1edf9d4767bdbb6a8f2e62abc585a3f0fb5eb6c06513e45ca23a33987a3e5b2f5ebbddc17cd8f6614568582cd6a1d891f57aa662ee631bab7839202505e7c4f0271bd72f9f2d04113462caa048fa944c92371668084eb923aa2e6", 0xf4, 0x6c7d, 0xcaa}, {&(0x7f0000001880)="1f35c1b47deaf26369044d3b87bdde5a213457126ed37a32c0b5c3d67311b6bea240e23c662e822d2b630c715cc89acc8f56dc7d451f6cf4da55d6115b8cc4ef31508ef0a61f56e156aa2aefffef8f18bd7c353635a70c370e570b422ccf93dc479f6c661d2a9c1948edaaa03ea5a7433c32a7f32ab9ec00143b6a167c2b2ce00f724e7a8493ebbcea6b4caaf224ac53dadf1c483256707c96ab9cc9b5109bc2af91c0804e47da2f63cb730060dbe49c6b1705a27ca572be84b5", 0xba, 0x3, 0x7}, {&(0x7f0000001940)="b818255998bd4a7d6e5f3a5f13389c5f1a9e12f84dda9b169a33425c02ca17ac85acd6e04f23556eeec80a4d45a9e6d315b8d6b8f22592098001207613a82005ab3ca3ffeb2c59aa218278f6b4c416b383bfd86238141472fe0c80b637700cc543c0d9db930feb5c345e005b1d1eb7043b50d274325490496c355c64841001e43ef7a9f67e78d8d6bd74b0f45f", 0x8d, 0xd7, 0x10001}, {&(0x7f0000001a00)="83571ce931482e9d05f7c46ca9cbb1b5f806a06a4908e57acdf5ef0b54692c9ff912813ac230c1041ab96af164dbfc0c28207d2143ba5e4323589b7fc134dc43db4487c9bff33dd8bc03a6bd26bfd47976126e216d38ecaea19ada983e40f5c07d3b5ebb93edcc94655f5439f4b44a63bb9c378fa2852c316676933247bbcd5d48e9716883a21598ac751d05ef6edbcbcbc3b71080fb27b196f8153c98aa21648c545ed13f1b0914fe", 0xa9, 0xfffffffffffffffe, 0xfffffffffffff9d9}, {&(0x7f0000001ac0)="ff83de2ceeec967fd31bc11ab2a6091def98a7744e6afd0539e2c9373db3aa1da655180639eda99fe642296abcd4bd066df7769140f1e9ff2ef5c389cbf2184802afdf577893e5b614982c72096b7f234edc5ddcd2f9750196c5f0646408e460dc6ad523676d", 0x66, 0x101, 0x7}], 0x2a0000) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000002280)=[{0x0}], 0x8000, &(0x7f0000001c40)) 01:49:10 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:49:10 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x80086601, &(0x7f0000000080)={'lo\x00', 0x0}) 01:49:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180), 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:10 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x8, r2, r0, r1, 0x0) 01:49:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 888.931116] loop5: detected capacity change from 0 to 512 [ 888.953670] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 888.971459] loop2: detected capacity change from 0 to 512 [ 888.985411] loop7: detected capacity change from 0 to 512 [ 888.997157] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 889.007798] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 01:49:11 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x80087601, &(0x7f0000000080)={'lo\x00', 0x0}) 01:49:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x12, r2, r0, r1, 0x0) 01:49:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0xfffffffffffffe59, 0xe9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x8000, 0x101, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="00701443e100000098767878b2b705921f33a0ff2dcbde45a2acd061d06e47a9ccc81bec4a6ca49337c0db695d8931e60d5b09b03e40", @ANYRES16=r1, @ANYBLOB="010000000000fddbdf2501000000080001000000000010000c800c000b800800090072337c4c04000480040008800800020001000000"], 0x3c}}, 0x24000010) r2 = open(0x0, 0x300, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x90, 0x0, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x51a}, {0xc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x1}, {0xc, 0x8f, 0x6}, {0xc, 0x90, 0x3}}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) 01:49:11 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x9, r2, r0, r1, 0x0) 01:49:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180), 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 889.152396] Process accounting paused 01:49:11 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x6, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 889.215716] loop5: detected capacity change from 0 to 512 [ 889.251603] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 889.255720] loop2: detected capacity change from 0 to 512 [ 889.257333] loop7: detected capacity change from 0 to 512 [ 889.270665] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 889.274882] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 01:49:11 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x80108906, &(0x7f0000000080)={'lo\x00', 0x0}) 01:49:11 executing program 3: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3ff, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)={[], [{@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@obj_role={'obj_role', 0x3d, '}\x00'}}, {@seclabel}, {@seclabel}, {@obj_type={'obj_type', 0x3d, '\x01\x00\x00\x00\xb5\x83v/'}}]}) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 01:49:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x13, r2, r0, r1, 0x0) 01:49:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2", 0x31, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 889.493961] loop7: detected capacity change from 0 to 512 [ 889.505633] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 01:49:24 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2", 0x31, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:24 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x14, r2, r0, r1, 0x0) 01:49:24 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x7, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:49:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:24 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x80108907, &(0x7f0000000080)={'lo\x00', 0x0}) 01:49:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0xa, r2, r0, r1, 0x0) 01:49:24 executing program 3: readv(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r3, 0x2, r2, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r4, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r3, r4, 0x85}) [ 902.048687] loop7: detected capacity change from 0 to 512 [ 902.063199] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 902.084108] loop5: detected capacity change from 0 to 512 [ 902.095829] loop2: detected capacity change from 0 to 512 [ 902.115329] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 902.117009] EXT4-fs (loop5): group descriptors corrupted! 01:49:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0xb, r2, r0, r1, 0x0) [ 902.124527] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 01:49:24 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2", 0x31, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 902.180260] loop7: detected capacity change from 0 to 512 01:49:24 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x80111500, &(0x7f0000000080)={'lo\x00', 0x0}) [ 902.197813] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 01:49:24 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x15, r2, r0, r1, 0x0) 01:49:24 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40220, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "aa59a295b8abf010"}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x1f}}, './file0\x00'}) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f0000001280)=[{&(0x7f0000000140)="a7e74311f855bf593a1351423a1de0a2c1fb875294812264f2a0d77b69eec0802c4d3039c72710bff3fa5eeece678a6fb97993584982ce93d46b6d82f477c9874c5c53397f640c49a496772091f525f12907c19ecebc7b2b5dd6bdb1ebe2ea8157bbc20669d8941585a0b5fdb23ac91ac2a4fab3de4420edd9707a9a52695ad60526927c79ca53d6943296f73093a84d0d5a75b3eff4cf30cb6ee0a9fac81ef08589ad0dd39ff11db7efbdb7967bffbce54992edc1559ed87533207b06162f8e1a91caea71ab30bad239caac8abe27cfb8d7bef337c251a28271c62a20282b", 0xdf, 0x9}, {&(0x7f0000000240)="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", 0x1000, 0x2}, {&(0x7f0000001240)="9a1a6fbf2f9196284b87b2e458d8505b91e2773d8de54c16e4b41bfc0b4a88b597281a2ca99dbfa4956525162b0a", 0x2e, 0xfffffffffffffffc}], 0x15000c, &(0x7f0000001300)={[{@huge_advise}, {@huge_within_size}, {@huge_within_size}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fowner_lt}]}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000001380)={{0x1, 0x1, 0x18, r3, @in_args={0xfed534441d2f0bfe}}, './file0\x00'}) statfs(0x0, 0x0) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r4) renameat(r4, &(0x7f00000013c0)='./file0\x00', r3, &(0x7f0000001400)='./file0\x00') 01:49:24 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x8, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:49:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0xc, r2, r0, r1, 0x0) 01:49:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180), 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:24 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000", 0x4a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 902.413659] loop2: detected capacity change from 0 to 512 [ 902.426919] loop5: detected capacity change from 0 to 512 [ 902.469024] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 902.496511] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 902.504644] loop7: detected capacity change from 0 to 512 [ 902.537639] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 902.538716] EXT4-fs (loop7): group descriptors corrupted! 01:49:34 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:34 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x801c581f, &(0x7f0000000080)={'lo\x00', 0x0}) 01:49:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = request_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='-\xc0+(\x00', 0xfffffffffffffffb) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc2}, &(0x7f0000000200)={0x0, "f3655418d79c0e5a18d49002e6e5a2d097e5e22b2e43e84cc9ab3e44e7eabd5b626dd3db594528e40e0d899a20db8219cb8f90fb868cfceff4a710cbdb68ccbc", 0x37}, 0x48, r1) r3 = request_key(&(0x7f0000000280)='.request_key_auth\x00', &(0x7f0000000940)={'syz', 0x0}, 0x0, r2) keyctl$update(0x2, r3, 0x0, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x99ad) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x7, 0x13, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r4, 0x0, &(0x7f0000000000), 0x0, 0x4) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000008, 0x4010, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r5, 0x114, &(0x7f00000002c0), 0x0, 0x4) madvise(&(0x7f0000ff3000/0xd000)=nil, 0xd000, 0x15) syz_memcpy_off$IO_URING_METADATA_FLAGS(r4, 0x0, &(0x7f0000000440), 0x0, 0x4) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 01:49:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0xd, r2, r0, r1, 0x0) 01:49:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x18, r2, r0, r1, 0x0) 01:49:34 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x9, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:49:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180), 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 912.155570] loop5: detected capacity change from 0 to 512 [ 912.174090] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 912.175928] loop7: detected capacity change from 0 to 512 [ 912.190576] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 912.194429] loop2: detected capacity change from 0 to 512 [ 912.217926] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 01:49:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:34 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xa, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:49:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0xe, r2, r0, r1, 0x0) 01:49:34 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x80811501, &(0x7f0000000080)={'lo\x00', 0x0}) 01:49:34 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000440), 0x145c02, 0x0) io_setup(0xfff, &(0x7f0000000040)=0x0) io_submit(r1, 0x2, &(0x7f00000004c0)=[&(0x7f0000000280)={0x0, 0x0, 0x8, 0x0, 0x0, r0, &(0x7f0000000000), 0x3000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000500)='5', 0x1}]) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x111142, 0x0) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f00000000c0)=0x5) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 912.309613] loop5: detected capacity change from 0 to 512 [ 912.318746] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:49:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180), 0x0, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:34 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x19, r2, r0, r1, 0x0) [ 912.367435] loop2: detected capacity change from 0 to 512 [ 912.370357] loop7: detected capacity change from 0 to 512 01:49:34 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0045878, &(0x7f0000000080)={'lo\x00', 0x0}) 01:49:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0xf, r2, r0, r1, 0x0) 01:49:34 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 912.395159] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 912.396102] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 912.396814] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 912.397484] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 06 00 [ 912.398238] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x200000 phys_seg 3 prio class 2 [ 912.412179] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 912.417847] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 912.437249] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 912.438187] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 912.438858] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 912.439536] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 06 00 [ 912.440265] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x200000 phys_seg 3 prio class 2 01:49:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0xf, r2, r0, r1, 0x0) 01:49:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x10, r2, r0, r1, 0x0) 01:49:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2", 0x31, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1b, r2, r0, r1, 0x0) 01:49:44 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0045878, &(0x7f0000000080)={'lo\x00', 0x0}) 01:49:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:44 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xf, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 921.951293] loop5: detected capacity change from 0 to 512 [ 921.960389] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 921.994694] loop7: detected capacity change from 0 to 512 01:49:44 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f0000000080)={'lo\x00', 0x0}) [ 922.011482] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 922.025053] loop2: detected capacity change from 0 to 512 01:49:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 922.051697] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 922.076684] loop5: detected capacity change from 0 to 512 [ 922.083964] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 922.112956] Process accounting resumed 01:49:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1c, r2, r0, r1, 0x0) 01:49:52 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0xc020660b, &(0x7f0000000080)={'lo\x00', 0x0}) 01:49:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2", 0x31, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x11, r2, r0, r1, 0x0) 01:49:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400028001000440000004f80100", 0x18, 0xffffffffffffffe0}, {0x0, 0x0, 0x1e0}, {0x0, 0x0, 0xfffffffffffffffd}, {0x0, 0x0, 0xfffffffffffffffd}], 0x20, &(0x7f0000010f00)) 01:49:52 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:49:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 930.556241] loop2: detected capacity change from 0 to 512 [ 930.578367] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 930.590275] loop5: detected capacity change from 0 to 512 01:49:52 executing program 3: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) [ 930.609183] loop7: detected capacity change from 0 to 512 01:49:52 executing program 6: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000000)=0x400, 0x4) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x40, &(0x7f00000002c0)=0x2, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8922, &(0x7f0000000080)={'veth1\x00', 0x0}) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) recvfrom(r0, &(0x7f00000001c0)=""/78, 0x4e, 0x40002143, &(0x7f0000000240)=@generic={0x5, "dd7537b7b18f458db47f7ef471fe082812799cb21e7537fa76c729868cf135528dc6db562c5e6269e3a70aacf0386b25b9333e1058157e38081f619420f76a83a7426e24e92be033127c1af614c567688d00a6d0d60ee5eb785ba45ccca65b1efdcc8a12dc676c8640e79cd33e452aabf1425edb5c7b32b78f919b3b712c"}, 0x80) sendto(0xffffffffffffffff, &(0x7f00000000c0)="dcba5aede7c5080b727ff640eddd8ed8b65e43e2c0d5f435da3c8752cf3256e590e9c1dc5a1d6d57b935ab8cffc0b065fee16d42f73b61738f119f9b544e7da0124e87f821ea4e9e5f4b4f36eb9f9e744f5788dacf65", 0x56, 0x8044, &(0x7f0000000140)=@nfc={0x27, 0x0, 0x0, 0x5}, 0x80) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r1) connect$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x8) lsetxattr$trusted_overlay_redirect(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x8, 0x0) 01:49:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x12, r2, r0, r1, 0x0) [ 930.628850] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 930.643040] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 930.644860] EXT4-fs (loop7): group descriptors corrupted! 01:49:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2", 0x31, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:52 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x11, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:49:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1d, r2, r0, r1, 0x0) 01:49:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef01", 0x3b, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:49:52 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0)={0x0, 0x3938700}, 0x0, 0x0) 01:49:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x13, r2, r0, r1, 0x0) [ 930.892882] loop5: detected capacity change from 0 to 512 [ 930.895987] loop2: detected capacity change from 0 to 512 [ 930.917064] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 930.918234] EXT4-fs (loop5): group descriptors corrupted! [ 930.934401] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 01:49:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x14, r2, r0, r1, 0x0) [ 930.999491] loop7: detected capacity change from 0 to 512 [ 931.012196] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 01:50:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:04 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:50:04 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$AUDIT_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x3e8, 0x4, 0x70bd2b, 0x25dfdbfd, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0xc5}, 0x0) copy_file_range(r0, &(0x7f0000000140)=0x3, r0, &(0x7f0000000180)=0x7, 0x7, 0x0) 01:50:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x2) 01:50:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000", 0x4a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x15, r2, r0, r1, 0x0) 01:50:04 executing program 3: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000180)=""/64, 0x40}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/24, 0x18}], 0x3, &(0x7f0000000280)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, 0x40) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x800}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000080)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) r1 = syz_open_dev$vcsu(&(0x7f00000003c0), 0x1f145745, 0x40000) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0xf8, 0x40, 0x3f, 0x1, 0x0, 0x0, 0xa0008, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffffffffffffffa6, 0xfc05}, 0x4000, 0x9, 0x3ff, 0x2, 0x380, 0x2, 0x1, 0x0, 0x800}, 0x0, 0x1, r1, 0x1) [ 942.770544] loop7: detected capacity change from 0 to 512 [ 942.770693] loop5: detected capacity change from 0 to 512 [ 942.778538] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 942.779947] loop2: detected capacity change from 0 to 512 [ 942.788747] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 942.792859] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 942.799985] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 942.811790] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 942.813374] EXT4-fs (loop2): group descriptors corrupted! 01:50:04 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'gre0\x00', 0x0}) 01:50:04 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x15, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:50:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x3) 01:50:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x18, r2, r0, r1, 0x0) 01:50:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 943.003872] loop5: detected capacity change from 0 to 512 [ 943.022235] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 943.062482] loop7: detected capacity change from 0 to 512 01:50:05 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xf0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 943.074585] loop2: detected capacity change from 0 to 512 [ 943.080041] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 943.090058] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 01:50:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x5) 01:50:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 943.278059] loop5: detected capacity change from 0 to 512 01:50:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x19, r2, r0, r1, 0x0) [ 943.305515] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 943.311356] loop7: detected capacity change from 0 to 512 [ 943.311825] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 943.323625] misc raw-gadget: fail, usb_gadget_register_driver returned -16 01:50:05 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x177, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 943.343977] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 943.399254] loop2: detected capacity change from 0 to 512 01:50:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x8) [ 943.448936] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 01:50:05 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000140)=@reiserfs_2={0x8, 0x2, {0xfff}}, 0x2f00) 01:50:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r0, 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/174, 0xae, 0x800) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 01:50:14 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0xf) 01:50:14 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1b, r2, r0, r1, 0x0) 01:50:14 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x300, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:50:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:14 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) r2 = fork() tkill(r2, 0x31) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={r2, 0xee01}, 0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) [ 952.612981] loop2: detected capacity change from 0 to 512 [ 952.615336] loop7: detected capacity change from 0 to 512 [ 952.622257] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 952.622853] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 01:50:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 952.686597] loop5: detected capacity change from 0 to 512 [ 952.710169] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 952.711021] EXT4-fs (loop5): group descriptors corrupted! [ 952.729751] loop7: detected capacity change from 0 to 512 [ 952.730812] loop2: detected capacity change from 0 to 512 [ 952.744721] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 952.747159] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 952.747996] EXT4-fs (loop2): group descriptors corrupted! [ 952.779061] Process accounting paused 01:50:23 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x300) 01:50:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:23 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x500, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:50:23 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1c, r2, r0, r1, 0x0) 01:50:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef01", 0x3b, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:23 executing program 6: socket$nl_xfrm(0x10, 0x3, 0x6) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000003c0)=@updsa={0x13c, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private0, @in=@remote}, {@in, 0x0, 0x33}, @in6=@private0, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256-generic\x00'}}}]}, 0x13c}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000180)=@newae={0x2d0, 0x1e, 0x100, 0x70bd25, 0x25dfdbfe, {{@in6=@loopback, 0x4d4, 0x2, 0x3c}, @in=@private=0xa010102, 0x100, 0x3503}, [@extra_flags={0x8, 0x18, 0x2ed0}, @lifetime_val={0x24, 0x9, {0x1, 0x3, 0xfffffffffffffffc, 0x5}}, @migrate={0xe8, 0x11, [{@in6=@mcast2, @in=@loopback, @in6=@mcast1, @in=@loopback, 0x2b, 0x3, 0x0, 0x0, 0xa, 0xa}, {@in6=@private0, @in=@private=0xa010101, @in=@rand_addr=0x64010101, @in6=@ipv4={'\x00', '\xff\xff', @multicast2}, 0xff, 0x2, 0x0, 0x34ff, 0xa, 0xa}, {@in=@private=0xa010102, @in=@loopback, @in=@broadcast, @in=@multicast1, 0x3c, 0x4, 0x0, 0x3504, 0x2, 0xa}]}, @algo_auth_trunc={0xd6, 0x14, {{'tgr128-generic\x00'}, 0x450, 0xc0, "f61c9a6908368d5857c4449ad59a6c361833515fe4839a792f9003d0c4178ec905023d0af1a0e054d2e2438b9c9ded7a3871b6efb6eafbea176f3e3a9e34e84ac33113b3cad47ca8ed4b4b9f256e1ba97e3c58550da06dd829a065b671130963bc69f953ab7756db076b9dd7410bfcecaad4e2c6920030d77f1923689ae1ccec6f14d5d23ff523ff93ac"}}, @replay_thresh={0x8}, @algo_crypt={0x94, 0x2, {{'cbc(aes-arm)\x00'}, 0x260, "5b90e73e600d06d1b1d0aa5cd38887a9e0f987f4d35bae126aeaed42232fafa400795c4b2caf956ac8c12cf5cc00cc4d644c38af976673864fc1a537400956d67a9a80665b338fbdebecfb6d"}}, @extra_flags={0x8, 0x18, 0x20}]}, 0x2d0}, 0x1, 0x0, 0x0, 0x4000000}, 0x8810) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_KEY(r3, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL802154_CMD_GET_INTERFACE(r3, &(0x7f0000000840)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x20, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x20}, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000740)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x21043248}, 0xc, &(0x7f0000000540)={&(0x7f00000005c0)=@newsa={0x17c, 0x10, 0x200, 0x70bd2a, 0x25dfdbfc, {{@in6=@mcast2, @in=@multicast2, 0x4e22, 0x1, 0x4e23, 0x9, 0xa, 0x80, 0x20, 0xff, 0x0, r0}, {@in=@multicast1, 0x4d2, 0xff}, @in=@rand_addr=0x64010102, {0x10001, 0x4, 0xffffffff7fffffff, 0x8, 0x3ff, 0xfffffffffffff1cb, 0x9, 0x40}, {0x3ff, 0x9, 0x2, 0x2e3f}, {0x0, 0x1, 0xffff79ca}, 0x70bd27, 0x3501, 0x2, 0x3, 0x40, 0x4}, [@tfcpad={0x8, 0x16, 0x5}, @sec_ctx={0x79, 0x8, {0x75, 0x8, 0x0, 0x5, 0x6d, "bed2acf34c7ab5d01dbe78390d5b9a7f7097bcb41bd6225de091ff2a55d53eb0c915c3c180b9f5c98c3b6fe07f0542ee12b0c3adc933d5d74a8265e9ef32644c25548ecd9a4d8ccdbd802b765f35b216ba57ce45d557341ee2505352d2887e277677e8c62107aa82d8acf2526c"}}, @XFRMA_SET_MARK={0x8, 0x1d, 0x40}]}, 0x17c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4040001) 01:50:23 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000d00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)=ANY=[]) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xd400080b) inotify_rm_watch(r1, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r4 = inotify_init1(0x0) r5 = inotify_add_watch(r4, &(0x7f00000000c0)='./file0\x00', 0x20000000) inotify_rm_watch(r4, r5) inotify_rm_watch(r3, r5) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x103) [ 961.549859] audit: type=1400 audit(1762048223.650:22): avc: denied { watch_reads } for pid=8153 comm="syz-executor.3" path="/syzkaller-testdir549382217/syzkaller.AAc9Bh/136/file0" dev="tmpfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir permissive=1 [ 961.560587] loop5: detected capacity change from 0 to 512 [ 961.577978] loop7: detected capacity change from 0 to 512 [ 961.583901] loop2: detected capacity change from 0 to 512 [ 961.587259] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:50:23 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1d, r2, r0, r1, 0x0) [ 961.601202] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 961.602879] EXT4-fs (loop7): group descriptors corrupted! [ 961.608233] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 01:50:23 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x500) 01:50:23 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x600, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:50:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000000c0), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4041}, 0x4000000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r3) sendmsg$IEEE802154_ASSOCIATE_REQ(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_CHANNEL={0x5}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000240), r3) write(r2, &(0x7f0000000900)="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", 0x200) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x1ff) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x44000) sendfile(r2, r5, 0x0, 0xfdef) 01:50:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 961.860628] loop7: detected capacity change from 0 to 512 [ 961.874646] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 961.909703] loop5: detected capacity change from 0 to 512 [ 961.939953] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:50:34 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x700, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:50:34 executing program 3: unshare(0x8020000) semget$private(0x0, 0x5, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x52f4, 0x1800}, {0x0, 0xfff7}], 0x2) unshare(0xc000080) unshare(0x68000000) 01:50:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x2) 01:50:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0xf00) 01:50:34 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:34 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x30) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x20, r2, 0x1, 0x0, 0x0, {0x8}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x20}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r1) [ 972.426853] loop2: detected capacity change from 0 to 512 [ 972.431252] loop7: detected capacity change from 0 to 512 [ 972.437816] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 972.444390] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 972.461682] loop5: detected capacity change from 0 to 512 [ 972.480773] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:50:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x80000) 01:50:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4", 0x32, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:34 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 972.568910] loop2: detected capacity change from 0 to 512 01:50:34 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x900, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 972.577900] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 972.580202] loop7: detected capacity change from 0 to 512 [ 972.588063] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 972.667073] loop5: detected capacity change from 0 to 512 [ 972.673152] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:50:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0xfeffff) 01:50:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x3) 01:50:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:44 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xa00, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:50:44 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$netlink(0x10, 0x3, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="41000000000000000000000000000000000000000000000000006d24ba1804b2100a4837edf033d100"/58]}) 01:50:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@remote, 0x8, 0x0, 0x4e22, 0x0, 0x2, 0x80}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {0x200000}, 0x0, 0x0, 0x1}, {{@in=@private=0x1000000, 0x0, 0x3c}, 0x0, @in=@multicast2, 0x400000, 0x0, 0x0, 0x0, 0x800}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@remote, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3, 0x4, 0x4, 0x100, 0x0, 0x80000000}) [ 982.540395] loop2: detected capacity change from 0 to 512 [ 982.550820] loop7: detected capacity change from 0 to 512 [ 982.553994] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 982.565909] loop5: detected capacity change from 0 to 512 01:50:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x5) [ 982.577192] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 982.578074] EXT4-fs (loop7): group descriptors corrupted! [ 982.585866] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:50:44 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xb00, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:50:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 982.701995] loop2: detected capacity change from 0 to 512 01:50:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 982.722301] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 01:50:44 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000d9f4655fd9f4655fd9f4655f000000000000040004", 0x1d, 0x2100}, {&(0x7f0000000080)="20000000d817501bd817894676605ba2ee2d37b5371b50327b0a80c0be3afeee22a1c81401ebb5285891ebefb4773d528677e2324b93b9b9c03593a2af22aa2f179cf061976a389df7715ac84b354a0ac6219d1530169700449c94b8d025164ebe72b7b656d341bd28b11dfcf4754a5490e7a79a2fe7d34ebc2bd2007ab4270f216159fc4769ae84b80e720b376a3349336c3bfaa3a9cf", 0x97, 0x217f}], 0x0, &(0x7f0000012c00)) r1 = syz_mount_image$nfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x4, 0x5, &(0x7f0000002340)=[{&(0x7f0000000280)="ba564f51a8a706b0c73e9f5b484caa7f2e41741f0c29975538d7afecbd5e013e322148894ed58d04833f9d516d7b1839ffa7c533125e196303add62027daee3f13eeeef5704da92116da348e5ca8218e29", 0x51, 0x5}, {&(0x7f0000000300)="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", 0x1000, 0x9}, {&(0x7f00000001c0)="f073cfeaf1d1c88edad1125d4e84b8adcc49e5e23b0fa6c47dd1a487b58da53f21db6a428b", 0x25, 0x20}, {&(0x7f0000001300)="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", 0x1000, 0x1}, {&(0x7f0000002300)="a7767746d9c872d3a4b1528d72d1cf3fefeb5e57658d796e08ad46e8db412f438c", 0x21, 0x9}], 0x0, &(0x7f00000023c0)={[{'(+('}, {'ext4\x00'}, {'ext4\x00'}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) mkdirat(r1, &(0x7f0000002440)='./file0\x00', 0x48) dup(r0) 01:50:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x1000000) 01:50:44 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xec0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:50:44 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r0, &(0x7f0000000440)={&(0x7f0000000000), 0xc, &(0x7f0000000400)={&(0x7f0000000140)=@acquire={0x284, 0x17, 0x200, 0x70bd26, 0x25dfdbff, {{@in=@remote, 0x4d5, 0x33}, @in6=@private1, {@in6=@private2, @in6=@empty, 0x4e21, 0x20, 0x4e22, 0x7fff, 0x2, 0x70, 0xa0, 0x88, 0x0, r1}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in6=@loopback, 0x4e20, 0xb3, 0x9, 0x8, 0x2, 0x0, 0x20, 0x33}, {0x7ff, 0x48, 0x9, 0x5, 0xff80000, 0x100, 0x2, 0x1}, {0x5, 0x0, 0x0, 0xc82}, 0x0, 0x6e6bbe, 0x0, 0x1, 0x0, 0x1}, 0x5, 0x7f, 0x3, 0x70bd2a}, [@algo_crypt={0x127, 0x2, {{'cbc(aes-ce)\x00'}, 0x6f8, "9e4a79886ec07f808587d06a5b90d6b5945731faaebf0b1bf5f0d0fb80d6c0478e34985f9db77221247e5a4ac560e3862d3c95a90a6169cc7f7ff97acdce7bb5bf227abbe46d801d61216be4c1aab3b2b6e078963fb8de99f85ca8cc4c0971a6c468b750a4b3e214e0be13f1a2a7e59799b299b31d8cc29e91ffbb17c10dd122c789d0b6b04c0e4cbf9f5c69d6ec3b094bf86169b109cce121263a807cb6534dc2cb23a7c2f987333dcd26c694a36c2c274a2e70fa8ff85a352b37349f5d6b2766f7bfd491fef53d5199a5eebb99d19786e36383059cb44712c431b625e7af"}}, @tfcpad={0x8, 0x16, 0x7}, @user_kmaddress={0x2c, 0x13, {@in=@loopback, @in6=@loopback, 0x0, 0x2}}]}, 0x284}, 0x1, 0x0, 0x0, 0x20000000}, 0x400c1) 01:50:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 982.817924] loop7: detected capacity change from 0 to 512 01:50:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x8) [ 982.833203] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 982.898567] loop5: detected capacity change from 0 to 512 [ 982.901605] Process accounting resumed [ 982.926253] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:50:45 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xf00, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:50:45 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 982.976106] loop7: detected capacity change from 0 to 512 01:50:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef01", 0x3b, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:45 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0xf) [ 982.989291] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 01:50:54 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:54 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x300) 01:50:54 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'batadv0\x00', &(0x7f0000000000)=@ethtool_flash={0x33, 0x3697, './file0\x00'}}) 01:50:54 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x1100, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:50:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, 0x0) 01:50:54 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r0, 0x541a, 0x0) r1 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x8c00, 0x0, 0xf}, 0x18) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000080)=0x80) 01:50:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef01", 0x3b, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:50:54 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x2000000) [ 992.868689] loop7: detected capacity change from 0 to 512 [ 992.890843] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 992.892202] loop2: detected capacity change from 0 to 512 [ 992.905337] loop5: detected capacity change from 0 to 512 [ 992.914662] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 992.916144] EXT4-fs (loop2): group descriptors corrupted! 01:50:55 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x1400, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:50:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x500) 01:50:55 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 993.067100] loop7: detected capacity change from 0 to 512 [ 993.084922] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 01:51:06 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond_slave_0\x00', &(0x7f00000000c0)=ANY=[@ANYRESOCT]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x20, r2, 0x1, 0x0, 0x0, {0x8}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x20}}, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x7ff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r0, &(0x7f0000000680)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000640)={&(0x7f00000002c0)=@flushsa={0x360, 0x1c, 0x300, 0x70bd2c, 0x25dfdbfb, {0xff}, [@policy_type={0xa, 0x10, {0x1}}, @algo_auth_trunc={0xf9, 0x14, {{'wp256\x00'}, 0x568, 0x100, "24d0c873a89dba28d4b52b91fa234a4d49b71d8ea7d36e6a0b023796ba24cf5310c1c7234e88ef33e9815da8f103b6632d9abee61fa0b8d85e7b1f0e84b1d593982bd3e59583f3fb875538324c63bdc43e8d037bb490cccffd03681518fc3ebc8c97aeef5175eb88df967be46f21b0275abfba4ed1a06658c268529bf4bcb02d7df6afb5656fdf6ed771b7e4cd57961e95a07336b45b12773afeea4aa762260efeb0c7928f92dfb7b351be0dc6"}}, @proto={0x5, 0x19, 0x33}, @migrate={0x134, 0x11, [{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in=@empty, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@remote, 0x3c, 0x0, 0x0, 0x3501, 0x2, 0xa}, {@in=@dev={0xac, 0x14, 0x14, 0x24}, @in=@loopback, @in6=@private1, @in=@multicast2, 0x32, 0x0, 0x0, 0x3502, 0x2, 0xa}, {@in=@local, @in6=@private0, @in=@local, @in6=@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x33, 0x7, 0x0, 0x0, 0x2, 0x2}, {@in6=@empty, @in6=@private1, @in6=@mcast1, @in6=@mcast1, 0x33, 0x0, 0x0, 0x0, 0x2, 0xa}]}, @sa={0xe4, 0x6, {{@in=@remote, @in=@empty, 0x4e20, 0x2, 0x4e23, 0x70, 0xa, 0x60, 0x80, 0x2b, r4, r5}, {@in=@local, 0x4d5, 0x32}, @in=@multicast1, {0x7fffffff, 0x72e, 0x7fffffff, 0xeb2, 0xfffffffffffff299, 0x7ff, 0x0, 0x65c}, {0x2, 0x1, 0x10000, 0x9}, {0x7, 0xb0, 0x3c9a}, 0x70bd29, 0x0, 0x2, 0x1ac6cd3c44511edd, 0xff, 0x8}}, @replay_esn_val={0x24, 0x17, {0x2, 0x70bd26, 0x70bd25, 0x70bd26, 0x70bd2c, 0x0, [0x400, 0x5]}}]}, 0x360}, 0x1, 0x0, 0x0, 0x24044845}, 0x4000c882) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'dummy0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x3b, 0x1, [{0x1f, 0x80000001}]}}) 01:51:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, 0x0) 01:51:06 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0xf00) 01:51:06 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x3000000) 01:51:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:51:06 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x1500, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:51:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:51:06 executing program 3: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000140)=0x1) r2 = dup(r1) write$P9_RLERRORu(r0, &(0x7f0000000080)={0x10, 0x7, 0x2, {{0x3, '\'.,'}, 0xfffffffb}}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x501002, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f0000000280)={"c20705aaba798e47541e9b8466831e5f", 0x0, 0x0, {0x10000, 0x4}, {0x94, 0x4d}, 0x9, [0x7ff, 0x8, 0x8000, 0x7, 0x1f, 0xf93, 0x9, 0x0, 0xc79, 0x3, 0x9, 0x2, 0x200, 0x3, 0xcc4, 0xa27]}) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX=r0, @ANYRES16=r0, @ANYBLOB="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", @ANYRESHEX=r3, @ANYBLOB=',\x00', @ANYRESHEX=r5, @ANYBLOB="4d2b3d2d756c0a36e9a840a3dd8525ae084ee5161b64a3eaf8076cc373f67880aaad777d7c6e903a1fdd3c6f267b883d946f40b1d829a2a3e9e13aec2cbf01ffdc0e7d2e2e9bd33266b061219de9a53f0bd32c62324552e7008e2b74a4e4e48ab669a9061f3a08f46843637d287d12da23801e0aaaaaa8f72fc23880763beeb1867b041ab87a8a4fd57858011253aa4eec21ae3dd96f31d7b0a68a9f66948041f4a4a82c7727629ee111887be2ebf10cfb8e5e6e42a36bc9c28b493052ac36c03f17c896b2cf164bed221e030d0b27511ad1ca8acc48b16395effa1a461ab87bfc9e4b57142c5ff31f224f"]) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000000c0)='hybla\x00', 0x6) [ 1004.839861] loop5: detected capacity change from 0 to 512 [ 1004.858436] loop7: detected capacity change from 0 to 512 [ 1004.880668] loop2: detected capacity change from 0 to 512 [ 1004.893929] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1004.912842] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 01:51:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, 0x0) 01:51:07 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:51:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x5000000) 01:51:07 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x7701, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:51:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:51:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x80000) 01:51:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, 0x0) [ 1005.195065] loop2: detected capacity change from 0 to 512 [ 1005.220198] loop7: detected capacity change from 0 to 512 [ 1005.223414] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1005.247439] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 01:51:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0xf000000) 01:51:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, 0x0) 01:51:16 executing program 6: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000000)={'veth0_vlan\x00', 0x0}) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8100401}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x6c, 0x453, 0x200, 0x70bd2d, 0x25dfdbff, "9f449905a597ebf6474f9d69a78963e7b111909f74fb6412e6b77ca368fa79bacaca5efc3c1ad22a281e7d09e96acb7c58a148eb725551bb38bf7c835a698f0caa65031257035441755e0e9bac7ec4831c3ad0732d1c39f3c8f1", ["", "", ""]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000001}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x2000, 0x0) 01:51:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 1) 01:51:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x8, 0x1, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x7fff}, 0x80, 0x9, 0x2e, 0x0, 0x8001, 0x0, 0x8a81, 0x0, 0x9, 0x0, 0xfffffffffffffffb}, 0x0, 0x3, 0xffffffffffffffff, 0xd7ede9b8d2555a0a) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x1ff) write(0xffffffffffffffff, &(0x7f0000000900)="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", 0x200) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) sendfile(0xffffffffffffffff, r0, 0x0, 0xfdef) 01:51:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff", 0x38, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:51:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0xfeffff) 01:51:16 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xc00e, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:51:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0xfffffe00) [ 1014.798444] loop7: detected capacity change from 0 to 512 01:51:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x8000000000000) [ 1014.840973] loop2: detected capacity change from 0 to 512 [ 1014.858423] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 01:51:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000007600ffff000000000000bf3d1e1489d17b8004000000"], 0x1c}], 0x1}, 0x0) pwritev2(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="f2b63fc3feda5f9a5d40a381895a6af39575a55d729ae11ae15283298eaefca9810b0d81f70fc66a76616788e0813b0e33527eac7cb04e3764a31b70f5389eae3e52f87cc49bd1e842cb2eea421b3a2e7e923cb950cfc13ee25c76c724ecc91f3a28df8edbeeae9251486aa67865de123288280e4c3f353d9b4e21c34f3f170e0e76587fa8ba", 0x86}, {&(0x7f0000000000)="85fae269", 0x4}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000000140)="5b052ba0933d833a585fbdb4b0f01984a25ccceee12d0cdba7937a2721e2ec91bbc87a727aded3e520ac0b262dbd4dde74ff7f33e3226dd4ea5853bcd5ead6614b4547b204d540fac4806d3b7d2139c94f23488fe984273358cf2b653f786fc7", 0x60}], 0x4, 0x1ff, 0x8001, 0x1) 01:51:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, 0x0) [ 1014.868976] FAULT_INJECTION: forcing a failure. [ 1014.868976] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.869994] CPU: 0 UID: 0 PID: 8441 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1014.870010] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.870018] Call Trace: [ 1014.870022] [ 1014.870027] dump_stack_lvl+0xfa/0x120 [ 1014.870049] should_fail_ex+0x4d7/0x5e0 [ 1014.870067] should_failslab+0xc2/0x120 [ 1014.870086] __kmalloc_cache_noprof+0x81/0x6b0 [ 1014.870107] ? task_active_pid_ns+0xa9/0xd0 [ 1014.870125] ? alloc_name+0x41/0x110 [ 1014.870142] ? alloc_name+0x41/0x110 [ 1014.870154] alloc_name+0x41/0x110 [ 1014.870167] __x64_sys_memfd_create+0x130/0x280 [ 1014.870182] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1014.870203] do_syscall_64+0xbf/0x390 [ 1014.870224] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1014.870237] RIP: 0033:0x7f1b64b61b19 [ 1014.870247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1014.870258] RSP: 002b:00007f1b620d6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1014.870270] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b61b19 [ 1014.870278] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f1b64bbb0fb [ 1014.870285] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1014.870292] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1014.870299] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1014.870318] [ 1014.928877] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1014.936845] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1014.938276] loop7: detected capacity change from 0 to 512 [ 1014.953434] Process accounting paused [ 1014.955363] audit: type=1107 audit(1762048277.055:23): pid=8436 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 msg='ŸD™¥—ëöGOi§‰c籟tûdæ·|£húyºÊÊ^ü<Ò*(} éjË|X¡HërUQ»8¿|ƒZi ªeWTAu^›¬~ă:Ðs-9óÈñ' 01:51:17 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x1000000) 01:51:17 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xf000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:51:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:51:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 2) 01:51:17 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0xfeffff00000000) [ 1015.075529] loop5: detected capacity change from 0 to 512 [ 1015.085332] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1015.086199] EXT4-fs (loop5): group descriptors corrupted! [ 1015.120928] loop2: detected capacity change from 0 to 512 [ 1015.144270] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1015.145927] EXT4-fs (loop2): group descriptors corrupted! [ 1015.264522] audit: type=1107 audit(1762048277.358:24): pid=8436 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 msg='ŸD™¥—ëöGOi§‰c籟tûdæ·|£húyºÊÊ^ü<Ò*(} éjË|X¡HërUQ»8¿|ƒZi ªeWTAu^›¬~ă:Ðs-9óÈñ' 01:51:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x100000000000000) 01:51:26 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) clone3(&(0x7f0000005880)={0x7f904900, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, 0x0, 0x0}, 0x58) 01:51:26 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'vlan0\x00', 0x0}) 01:51:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:51:26 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x80000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:51:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 3) 01:51:26 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x2000000) 01:51:26 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, 0x0) [ 1024.100712] loop2: detected capacity change from 0 to 512 [ 1024.116601] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1024.141683] FAULT_INJECTION: forcing a failure. [ 1024.141683] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1024.142651] CPU: 1 UID: 0 PID: 8497 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1024.142667] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1024.142674] Call Trace: [ 1024.142678] [ 1024.142683] dump_stack_lvl+0xfa/0x120 [ 1024.142706] should_fail_ex+0x4d7/0x5e0 [ 1024.142725] strncpy_from_user+0x3b/0x2f0 [ 1024.142747] alloc_name+0x78/0x110 [ 1024.142762] __x64_sys_memfd_create+0x130/0x280 [ 1024.142777] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1024.142798] do_syscall_64+0xbf/0x390 [ 1024.142819] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1024.142833] RIP: 0033:0x7f1b64b61b19 [ 1024.142842] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1024.142853] RSP: 002b:00007f1b620d6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1024.142865] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b61b19 [ 1024.142873] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f1b64bbb0fb [ 1024.142880] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1024.142887] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1024.142894] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1024.142913] [ 1024.149560] loop7: detected capacity change from 0 to 512 01:51:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:51:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 4) [ 1024.255217] loop2: detected capacity change from 0 to 512 01:51:26 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xf0ffff, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1024.277501] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 01:51:26 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=@getae={0x2f8, 0x1f, 0x200, 0x70bd2b, 0x25dfdbfb, {{@in=@remote, 0x4d4, 0xa, 0x33}, @in=@remote, 0x2, 0x34ff}, [@mark={0xc, 0x15, {0x350759, 0x1000}}, @algo_crypt={0x142, 0x2, {{'ecb-camellia-aesni-avx2\x00'}, 0x7d0, "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"}}, @lifetime_val={0x24, 0x9, {0x9, 0x7ab3, 0x5, 0x1000}}, @tfcpad={0x8, 0x16, 0x3}, @sec_ctx={0xa3, 0x8, {0x9f, 0x8, 0x0, 0x20, 0x97, "698af265f922dd4e51c966f8e639ee6b247a89bbafa636ce08c49418bc8ed00de386adc6fe7c87ccbc9500e65247e1fdd5b886de6a391c419c2cdcbefb7ef2b4f464273ebbbb2909829a5cd6ff6dcb19de3e8cf7a10d4b8a00754bd3f39bac3bb51b05d4a04646710e38179a774412cd969c397e56acda8238c648d1a817666d546cc72e09760426703d9c12f8ba4a9f429fe0e4a91ff9"}}, @algo_comp={0x97, 0x3, {{'deflate\x00'}, 0x278, "ffb0c91f3612be46a6a122a4ea82873de725b2a65b9fddb0ee789500617583b71b576b300540b17c30876f6a8662d5ec651ccccfd6edadbbf7eeb918f8a2cd06bb252ef5a9011ee9942235261d9f11"}}]}, 0x2f8}, 0x1, 0x0, 0x0, 0x40800}, 0x20000000) 01:51:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x200000000000000) 01:51:26 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x3000000) 01:51:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1024.370804] FAULT_INJECTION: forcing a failure. [ 1024.370804] name failslab, interval 1, probability 0, space 0, times 0 [ 1024.371763] CPU: 1 UID: 0 PID: 8512 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1024.371780] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1024.371787] Call Trace: [ 1024.371791] [ 1024.371796] dump_stack_lvl+0xfa/0x120 [ 1024.371819] should_fail_ex+0x4d7/0x5e0 [ 1024.371837] ? shmem_alloc_inode+0x27/0x50 [ 1024.371851] should_failslab+0xc2/0x120 [ 1024.371869] kmem_cache_alloc_lru_noprof+0x84/0x690 [ 1024.371883] ? perf_trace_lock+0xb5/0x5d0 [ 1024.371907] ? shmem_alloc_inode+0x27/0x50 [ 1024.371918] shmem_alloc_inode+0x27/0x50 [ 1024.371929] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 1024.371941] alloc_inode+0x67/0x250 [ 1024.371961] new_inode+0x1e/0x160 [ 1024.371981] __shmem_get_inode+0x17c/0xe80 [ 1024.372000] __shmem_file_setup+0x107/0x370 [ 1024.372014] ? alloc_fd+0x2c1/0x560 [ 1024.372030] alloc_file+0x2ae/0x590 [ 1024.372047] __x64_sys_memfd_create+0x193/0x280 [ 1024.372061] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1024.372083] do_syscall_64+0xbf/0x390 [ 1024.372103] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1024.372121] RIP: 0033:0x7f1b64b61b19 [ 1024.372130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1024.372141] RSP: 002b:00007f1b620d6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1024.372153] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b61b19 [ 1024.372161] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f1b64bbb0fb [ 1024.372168] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1024.372175] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1024.372182] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1024.372201] 01:51:26 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) r1 = getuid() r2 = add_key$keyring(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000140)={'macsec0\x00', 0x3}) r3 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000001c0)="91", 0x1, r2) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}, {0x2, 0x4e24, @multicast2}, 0x280, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x800, 0x7ff, 0x5}) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0x1) keyctl$chown(0x4, r3, 0x0, r4) lchown(&(0x7f0000000000)='./file0\x00', r1, r4) 01:51:26 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 1) [ 1024.504428] FAULT_INJECTION: forcing a failure. [ 1024.504428] name failslab, interval 1, probability 0, space 0, times 0 [ 1024.506086] CPU: 0 UID: 0 PID: 8524 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1024.506123] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1024.506136] Call Trace: [ 1024.506144] [ 1024.506153] dump_stack_lvl+0xfa/0x120 [ 1024.506191] should_fail_ex+0x4d7/0x5e0 [ 1024.506222] should_failslab+0xc2/0x120 [ 1024.506255] __kmalloc_cache_noprof+0x81/0x6b0 [ 1024.506294] ? task_active_pid_ns+0xa9/0xd0 [ 1024.506318] ? alloc_name+0x41/0x110 [ 1024.506349] ? alloc_name+0x41/0x110 [ 1024.506371] alloc_name+0x41/0x110 [ 1024.506396] __x64_sys_memfd_create+0x130/0x280 [ 1024.506423] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1024.506462] do_syscall_64+0xbf/0x390 [ 1024.506499] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1024.506522] RIP: 0033:0x7f94bafefb19 [ 1024.506539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1024.506560] RSP: 002b:00007f94b8564f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1024.506581] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafefb19 [ 1024.506596] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f94bb0490fb [ 1024.506609] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1024.506622] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1024.506635] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1024.506671] [ 1024.567693] loop2: detected capacity change from 0 to 512 [ 1024.590586] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 01:51:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 5) 01:51:36 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x604, 0x0, 0x0, 0x40}]}) pipe(&(0x7f0000000200)) syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)=""/102400) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r0, 0x0, 0x0) pread64(r0, &(0x7f0000000180)=""/126, 0x7e, 0x7f) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x8, 0x0) 01:51:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x5000000) 01:51:36 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=@getsa={0x16c, 0x12, 0x8, 0x70bd2a, 0x25dfdbfc, {@in=@empty, 0x4d4, 0x2, 0x33}, [@algo_auth_trunc={0x142, 0x14, {{'blake2s-160-generic\x00'}, 0x7b0, 0x100, "ed18a34b4d72fca1415a2a04e1b7e1ac9e9a97abf5efc86577652cd895e68089a3b6ad12c2f302b75131ff1a32db94e60ba7a8f1d06dc07ae805a87fbd03c4a429d86dd1427fec0f15a97e0bd407e870e4652f74829fc0036f737ec4922728c53d9bfd50af42da1c7fd97762ea55e5a894482ace6974eb8202a452536d3af1b4f4c2968ba437694dd19e96ae73d043a4e43c14089d5ad6c6db0b0abf4a37502a50a0d9cd809f7897d4684549e66bbbfbe304ee47afe73f6e32638552e84dd7115b9cb546f83a3a4f2b270ecc7897b81cb0801f3cee47b4eb61b868b15441542f2ee9e0b92b379ebc16dde345bb17efe1d10e566c220c"}}]}, 0x16c}, 0x1, 0x0, 0x0, 0x8084}, 0x4000000) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) 01:51:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x300000000000000) 01:51:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:51:36 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 2) 01:51:36 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x1000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1034.355549] loop7: detected capacity change from 0 to 512 [ 1034.368687] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1034.369661] EXT4-fs (loop7): group descriptors corrupted! [ 1034.388056] loop5: detected capacity change from 0 to 512 01:51:36 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x2000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1034.406932] loop2: detected capacity change from 0 to 512 [ 1034.413621] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1034.414563] EXT4-fs (loop5): group descriptors corrupted! 01:51:36 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 3) 01:51:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x500000000000000) [ 1034.459160] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1034.484592] FAULT_INJECTION: forcing a failure. [ 1034.484592] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1034.485624] CPU: 0 UID: 0 PID: 8567 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1034.485641] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1034.485648] Call Trace: [ 1034.485653] [ 1034.485658] dump_stack_lvl+0xfa/0x120 [ 1034.485681] should_fail_ex+0x4d7/0x5e0 [ 1034.485699] strncpy_from_user+0x3b/0x2f0 [ 1034.485721] alloc_name+0x78/0x110 [ 1034.485736] __x64_sys_memfd_create+0x130/0x280 [ 1034.485751] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1034.485772] do_syscall_64+0xbf/0x390 [ 1034.485793] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1034.485806] RIP: 0033:0x7f94bafefb19 [ 1034.485816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1034.485827] RSP: 002b:00007f94b8564f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1034.485839] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafefb19 [ 1034.485847] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f94bb0490fb [ 1034.485854] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1034.485861] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1034.485868] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1034.485887] 01:51:48 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x3000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:51:48 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0xf00000000000000) 01:51:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:51:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x200000000000000) 01:51:48 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f00000001c0)=@newpolicy={0xb8, 0x13, 0x2, 0x70bd2b, 0x25dfdbff, {{@in=@loopback, @in=@multicast1, 0x4e20, 0x4, 0x4e23, 0xfff, 0xa, 0x20, 0x80, 0x2c, r1}, {0xfffffffffffffffb, 0x101, 0x7f, 0xfffffffffffffffa, 0x513db713, 0xc0, 0x6, 0x9}, {0x5, 0x136, 0x3f, 0x8ef}, 0x5, 0x6e6bb5, 0x0, 0x1, 0x3, 0x1}}, 0xb8}, 0x1, 0x0, 0x0, 0x4000}, 0x40) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) 01:51:48 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 4) 01:51:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 6) 01:51:48 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0xf000000) [ 1046.103940] loop2: detected capacity change from 0 to 512 [ 1046.134550] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1046.156104] FAULT_INJECTION: forcing a failure. [ 1046.156104] name failslab, interval 1, probability 0, space 0, times 0 [ 1046.158149] CPU: 0 UID: 0 PID: 8592 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1046.158179] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1046.158192] Call Trace: [ 1046.158200] [ 1046.158209] dump_stack_lvl+0xfa/0x120 [ 1046.158246] should_fail_ex+0x4d7/0x5e0 [ 1046.158276] ? shmem_alloc_inode+0x27/0x50 [ 1046.158299] should_failslab+0xc2/0x120 [ 1046.158330] kmem_cache_alloc_lru_noprof+0x84/0x690 [ 1046.158356] ? perf_trace_lock+0xb5/0x5d0 [ 1046.158398] ? shmem_alloc_inode+0x27/0x50 [ 1046.158419] shmem_alloc_inode+0x27/0x50 [ 1046.158440] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 1046.158461] alloc_inode+0x67/0x250 [ 1046.158497] new_inode+0x1e/0x160 [ 1046.158534] __shmem_get_inode+0x17c/0xe80 [ 1046.158570] __shmem_file_setup+0x107/0x370 [ 1046.158595] ? alloc_fd+0x2c1/0x560 [ 1046.158624] alloc_file+0x2ae/0x590 [ 1046.158655] __x64_sys_memfd_create+0x193/0x280 [ 1046.158682] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1046.158721] do_syscall_64+0xbf/0x390 [ 1046.158758] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1046.158781] RIP: 0033:0x7f94bafefb19 [ 1046.158797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1046.158818] RSP: 002b:00007f94b8564f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1046.158839] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafefb19 [ 1046.158853] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f94bb0490fb [ 1046.158867] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1046.158880] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1046.158893] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1046.158929] [ 1046.172553] FAULT_INJECTION: forcing a failure. [ 1046.172553] name failslab, interval 1, probability 0, space 0, times 0 [ 1046.185417] CPU: 1 UID: 0 PID: 8595 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1046.185448] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1046.185461] Call Trace: [ 1046.185469] [ 1046.185478] dump_stack_lvl+0xfa/0x120 [ 1046.185517] should_fail_ex+0x4d7/0x5e0 [ 1046.185548] ? security_inode_alloc+0x3e/0x130 [ 1046.185575] should_failslab+0xc2/0x120 [ 1046.185608] kmem_cache_alloc_noprof+0x80/0x690 [ 1046.185629] ? __pfx_map_id_range_down+0x10/0x10 [ 1046.185675] ? security_inode_alloc+0x3e/0x130 [ 1046.185700] security_inode_alloc+0x3e/0x130 [ 1046.185729] inode_init_always_gfp+0xc9d/0xff0 [ 1046.185765] alloc_inode+0x8d/0x250 [ 1046.185800] new_inode+0x1e/0x160 [ 1046.185837] __shmem_get_inode+0x17c/0xe80 [ 1046.185875] __shmem_file_setup+0x107/0x370 [ 1046.185900] ? alloc_fd+0x2c1/0x560 [ 1046.185929] alloc_file+0x2ae/0x590 [ 1046.185960] __x64_sys_memfd_create+0x193/0x280 [ 1046.185988] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1046.186027] do_syscall_64+0xbf/0x390 [ 1046.186064] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1046.186087] RIP: 0033:0x7f1b64b61b19 [ 1046.186104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1046.186132] RSP: 002b:00007f1b620d6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1046.186153] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b61b19 [ 1046.186168] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f1b64bbb0fb [ 1046.186181] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1046.186194] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1046.186206] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1046.186242] [ 1046.251028] Process accounting resumed 01:51:48 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'xfrm0\x00', 0x0}) 01:51:48 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x4000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:51:48 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 5) 01:51:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000700)=@IORING_OP_READ_FIXED={0x4, 0x3, 0x4000, @fd=r0, 0x3, 0x3, 0x2b9, 0x3, 0x1, {0x3}}, 0xb31) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8e030}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r3) add_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)="5f3dbcedcdf286224e767f411e8164bb4ff045b22c653d83564ef644239b9c1243f82d8bdcdebb83ce", 0x29, r1) keyctl$clear(0x7, r2) add_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000280)="5331cb2c90205637db23357bb3b3c06e32eb6171b71a10bd17eaa990964954e42553845176884d16266339a691fd95b4a39d03819a51cfcb29dba4b29c32a65f7021e79e4760c1b34055eaf3105d950bda018985a9aadc249f35b641a234923bbf94cfa8ed58352dd53fc12f19a7edf9edba129fbea854334178ed28efff372e7a043ce17061d4a5d16387ee06e6204fc7e895fa532008e61afa8ba3cd1edbae5a4b31e2eda47cfdd6827064daa8a23fe31f49b11473c23a457747bbf6d81132444a2cd3eb", 0xc5, r5) r6 = add_key(&(0x7f0000000500)='syzkaller\x00', &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000740)="bef0b4607fe056026e82d8f46561a489241e1ae47f4645478229a401f25f9c2bb6a418544d368392427953d4d004a886bd7a6a2f0bd4b312c5477bb7681d8567c4f464f2fbab93bfa1d4126badf5a7b72a6198f831418712f06d47fe7a0d4dccc755e7a260cfff72d4e8e5bf5c5fd07b2be860a7015e09f4bc9c6667a7786f3b9a94f4cfaad528c9349e3e4c47c904df32c0337f92c48eda39e29e9989be03057e44e9a06a866187b04e30c3226e643a781e825cddfecb9e90b1a8f9", 0xbc, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc3}, &(0x7f0000000480)={0x0, "8a081f4ee6d98b5e3c1ef9db8587690ed6465bb0fad56a93fb1ea324f4ef1afb40510662629b8eea23a3500e21fce827569110f7550f9139b128ba05ccedc4d9", 0x18}, 0x48, r6) keyctl$KEYCTL_MOVE(0x1e, r4, r1, r3, 0x0) 01:51:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:51:48 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x2b93faaa) 01:51:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 7) 01:51:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fdlrfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=', @ANYRESDEC=0xee00, @ANYBLOB=',noextend,\x00']) [ 1046.402516] loop2: detected capacity change from 0 to 512 [ 1046.424414] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1046.447310] loop7: detected capacity change from 0 to 512 [ 1046.490887] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1046.492366] EXT4-fs (loop7): group descriptors corrupted! [ 1046.513796] loop5: detected capacity change from 0 to 512 01:51:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, 0x0) [ 1046.559081] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1046.561220] EXT4-fs (loop5): group descriptors corrupted! 01:51:48 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x5000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1046.684369] 9pnet: Could not find request transport: fdlrfdno=0x0000000000000003 [ 1046.754403] 9pnet: Could not find request transport: fdlrfdno=0x0000000000000003 01:51:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 8) 01:51:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0xaafa932b) 01:51:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000700)=@IORING_OP_READ_FIXED={0x4, 0x3, 0x4000, @fd=r0, 0x3, 0x3, 0x2b9, 0x3, 0x1, {0x3}}, 0xb31) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8e030}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r3) add_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)="5f3dbcedcdf286224e767f411e8164bb4ff045b22c653d83564ef644239b9c1243f82d8bdcdebb83ce", 0x29, r1) keyctl$clear(0x7, r2) add_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000280)="5331cb2c90205637db23357bb3b3c06e32eb6171b71a10bd17eaa990964954e42553845176884d16266339a691fd95b4a39d03819a51cfcb29dba4b29c32a65f7021e79e4760c1b34055eaf3105d950bda018985a9aadc249f35b641a234923bbf94cfa8ed58352dd53fc12f19a7edf9edba129fbea854334178ed28efff372e7a043ce17061d4a5d16387ee06e6204fc7e895fa532008e61afa8ba3cd1edbae5a4b31e2eda47cfdd6827064daa8a23fe31f49b11473c23a457747bbf6d81132444a2cd3eb", 0xc5, r5) r6 = add_key(&(0x7f0000000500)='syzkaller\x00', &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000740)="bef0b4607fe056026e82d8f46561a489241e1ae47f4645478229a401f25f9c2bb6a418544d368392427953d4d004a886bd7a6a2f0bd4b312c5477bb7681d8567c4f464f2fbab93bfa1d4126badf5a7b72a6198f831418712f06d47fe7a0d4dccc755e7a260cfff72d4e8e5bf5c5fd07b2be860a7015e09f4bc9c6667a7786f3b9a94f4cfaad528c9349e3e4c47c904df32c0337f92c48eda39e29e9989be03057e44e9a06a866187b04e30c3226e643a781e825cddfecb9e90b1a8f9", 0xbc, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc3}, &(0x7f0000000480)={0x0, "8a081f4ee6d98b5e3c1ef9db8587690ed6465bb0fad56a93fb1ea324f4ef1afb40510662629b8eea23a3500e21fce827569110f7550f9139b128ba05ccedc4d9", 0x18}, 0x48, r6) keyctl$KEYCTL_MOVE(0x1e, r4, r1, r3, 0x0) 01:51:59 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x6000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:51:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, 0x0) 01:51:59 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = fork() tkill(r1, 0x31) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r3, 0x2, r2, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x73, 0x5, 0x20, 0x7, 0x0, 0xc, 0x840, 0xdf2006df964bca4e, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x5, 0x40000006}, 0x8a94, 0x5, 0x7, 0x5, 0x3, 0x8, 0x2, 0x0, 0x5, 0x0, 0x3}, r1, 0xd, 0xffffffffffffffff, 0x9) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r4) r5 = request_key(&(0x7f0000000300)='cifs.idmap\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='\x00', r4) r6 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, r4, r6, 0x0) keyctl$revoke(0x3, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r6) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r8 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r8, r0, r7, 0x0) 01:51:59 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x105242, 0x0) copy_file_range(r1, &(0x7f0000000040)=0x9, r0, 0x0, 0x80, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) 01:51:59 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 6) 01:51:59 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x7000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1057.425219] FAULT_INJECTION: forcing a failure. [ 1057.425219] name failslab, interval 1, probability 0, space 0, times 0 [ 1057.427009] loop2: detected capacity change from 0 to 512 [ 1057.427938] CPU: 1 UID: 0 PID: 8651 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1057.427971] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1057.427985] Call Trace: [ 1057.427993] [ 1057.428002] dump_stack_lvl+0xfa/0x120 [ 1057.428041] should_fail_ex+0x4d7/0x5e0 [ 1057.428074] ? security_inode_alloc+0x3e/0x130 [ 1057.428102] should_failslab+0xc2/0x120 [ 1057.428143] kmem_cache_alloc_noprof+0x80/0x690 [ 1057.428166] ? __pfx_map_id_range_down+0x10/0x10 [ 1057.428214] ? security_inode_alloc+0x3e/0x130 [ 1057.428241] security_inode_alloc+0x3e/0x130 [ 1057.428273] inode_init_always_gfp+0xc9d/0xff0 [ 1057.428311] alloc_inode+0x8d/0x250 [ 1057.428348] new_inode+0x1e/0x160 [ 1057.428388] __shmem_get_inode+0x17c/0xe80 [ 1057.428428] __shmem_file_setup+0x107/0x370 [ 1057.428455] ? alloc_fd+0x2c1/0x560 [ 1057.428486] alloc_file+0x2ae/0x590 [ 1057.428519] __x64_sys_memfd_create+0x193/0x280 [ 1057.428549] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1057.428591] do_syscall_64+0xbf/0x390 [ 1057.428630] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1057.428655] RIP: 0033:0x7f94bafefb19 [ 1057.428672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1057.428694] RSP: 002b:00007f94b8564f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1057.428717] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafefb19 [ 1057.428733] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f94bb0490fb [ 1057.428747] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1057.428761] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1057.428775] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1057.428813] 01:51:59 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8001) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={[{@subsystem='net_prio'}, {@name={'name', 0x3d, '\x00\x00\x00'}}]}) [ 1057.462277] FAULT_INJECTION: forcing a failure. [ 1057.462277] name failslab, interval 1, probability 0, space 0, times 0 [ 1057.464084] CPU: 1 UID: 0 PID: 8655 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1057.464121] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1057.464134] Call Trace: [ 1057.464142] [ 1057.464151] dump_stack_lvl+0xfa/0x120 [ 1057.464187] should_fail_ex+0x4d7/0x5e0 [ 1057.464219] ? __d_alloc+0x31/0xa10 [ 1057.464248] should_failslab+0xc2/0x120 [ 1057.464281] kmem_cache_alloc_lru_noprof+0x84/0x690 [ 1057.464306] ? find_held_lock+0x2b/0x80 [ 1057.464344] ? __d_alloc+0x31/0xa10 [ 1057.464374] __d_alloc+0x31/0xa10 [ 1057.464404] ? mpol_shared_policy_init+0x24f/0x390 [ 1057.464438] d_alloc_pseudo+0x1d/0xc0 [ 1057.464461] alloc_file_pseudo+0xbe/0x220 [ 1057.464503] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1057.464541] ? __shmem_get_inode+0x682/0xe80 [ 1057.464580] __shmem_file_setup+0x1a7/0x370 [ 1057.464607] ? alloc_fd+0x2c1/0x560 [ 1057.464638] alloc_file+0x2ae/0x590 [ 1057.464670] __x64_sys_memfd_create+0x193/0x280 [ 1057.464700] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1057.464748] do_syscall_64+0xbf/0x390 [ 1057.464787] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1057.464811] RIP: 0033:0x7f1b64b61b19 [ 1057.464829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1057.464852] RSP: 002b:00007f1b620d6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1057.464876] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b61b19 [ 1057.464892] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f1b64bbb0fb [ 1057.464908] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1057.464923] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1057.464938] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1057.464977] 01:51:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, 0x0) [ 1057.521991] cgroup: Bad value for 'name' [ 1057.534916] cgroup: Bad value for 'name' 01:51:59 executing program 6: r0 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='cpu.pressure\x00', 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) close_range(r0, r1, 0x2) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) [ 1057.580822] loop2: detected capacity change from 0 to 512 01:51:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0xfffffe00) 01:51:59 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 7) 01:51:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 9) 01:51:59 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x8000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:51:59 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 1057.766107] loop5: detected capacity change from 0 to 512 [ 1057.767813] loop7: detected capacity change from 0 to 512 [ 1057.787021] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1057.788888] EXT4-fs (loop5): group descriptors corrupted! [ 1057.794509] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1057.798677] EXT4-fs (loop7): group descriptors corrupted! 01:52:10 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'ip6tnl0\x00', {0x2, 0x0, @loopback}}) 01:52:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 8) 01:52:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 10) 01:52:10 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x9000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:52:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000500), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x23}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000300)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_NEW_INTERFACE(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r2, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_IFTYPE={0x8, 0x5, 0xffffffffffffffff}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x2c}}, 0x2000001) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r6, 0x0, r0, 0x0) 01:52:10 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x8000000000000) 01:52:10 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet6(r0, &(0x7f00000059c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2, r2}}}], 0x28}}], 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) clone3(&(0x7f0000000240)={0x61020100, &(0x7f00000056c0), 0x0, 0x0, {}, &(0x7f00000001c0)=""/96, 0x54, 0x0, &(0x7f0000000000), 0x3}, 0x58) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'lo\x00'}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x20, r5, 0x1, 0x0, 0x0, {0x8}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x20}}, 0x0) sendmmsg$inet6(r3, &(0x7f0000005340)=[{{&(0x7f0000000180)={0xa, 0x4e24, 0x0, @loopback, 0x5}, 0x1c, &(0x7f0000001700)=[{&(0x7f0000001540)="ef03b23f75ee063268ae1a8e215396280797c307b4d1dfadb4a153af8e365acef8ee9e10ea4cc2095cfafd2f0d60800f78aa4f4548481b63b39cf10283aff24e0591227d72ae58430aeb60320eb63c38f7a6531e41521a3c5a19f836e557faccfd80c4b7f636d42c77c78e105a1fc61f111ea33d83a42850f5aeba3452eff98c621d98bab816ab18f379c1454dde275ac77c555ffcdd463286fb7e49a5634aa366", 0xa1}, {&(0x7f0000001600)="a55851076bd6cf9e9afa81ba9ba3f6d4f8267809766794489bc4a4d440c746399c1b0685046e586531ed1d14c7e68ffa1b7af3d288764b15748ace448109820a43125544f33f5eb7a46b5a110ddffd915c128329095a3eb8683075734458c4e55751a1bb7de14549a5706dcb2ee83f4042f35f14980029f2e83c2f83a332c829a495607e3ae4552853804b1c086d80d55b2c151645653f80e2a49fc8a6b6e949273ed871f396c5a05aeeda63d0069b3afd1e4a63a9581f9f1aced7719bad02989c", 0xc1}, {&(0x7f0000002780)="c5718b46c8cb86fdd56be3eb5d03e79d707a8f0f40571db60b7a91b4d6fa819f0189f4837bc1ea55bff4c3ad512fb4dacf688bf700f2621743d44e67b37a9d4f8ed42c681ee0e158531102c63b71f618b3d4686c0bd340d905b811f5503dba0484653333e5e87590d27b3c9c55af39b78e4b7047413befef6fbd25db8853812c1982372e244d9348f247e75f439d0736a4202b7542e6553e3b487684ee65c7c89e1a97259fbed89b702a8fce6a21349cd12cff8fdce32dc28a7ce88388ebf18599dffe684788bfd3af99c3471e7275256270042474e04e2fa43ecef0", 0xdc}, {&(0x7f0000002880)="0f283a8ab71bd528257810a1c08d9842c8e8497e47f80f90c966824510280351b211c4e640f2b1f6df095fb4b6697b54ba7e18201a7d229a7eec747ccd381f0d43976da99d70c16695615bc0dafdf25d343cf38b77326d0fefe6e271355caa73bfc5309b99ad3d2b59be96f290b9cdb6f868870b12bf19acded917c8f8fd0f9e6edf41e4c28bd1f252f8a8f6949a788db0b23e9a8622de75d7ad6b36f5b201c82c304f90bd256996b76cc51c21b9cf85072898cbdd926ef0f9cd67098db894a5720d73bfc670c3a0f0e1311c6fab676f3e3032", 0xd3}], 0x4, &(0x7f0000002980)=[@tclass={{0x14, 0x29, 0x43, 0x7}}, @dstopts_2292={{0x28, 0x29, 0x4, {0x8, 0x1, '\x00', [@pad1, @padn={0x1, 0x1, [0x0]}, @jumbo={0xc2, 0x4, 0xe0000000}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x10000}}, @hopopts={{0x28, 0x29, 0x36, {0x84, 0x1, '\x00', [@enc_lim={0x4, 0x1, 0x8}, @jumbo={0xc2, 0x4, 0x4}]}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x87, 0x6, 0x1, 0x6, 0x0, [@mcast1, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}]}}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x8, 0x0, '\x00', [@ra={0x5, 0x2, 0xb2}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x4bc}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xffba}}, @rthdrdstopts={{0x28, 0x29, 0x37, {0x2b, 0x1, '\x00', [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x1}, @jumbo={0xc2, 0x4, 0x9}]}}}, @hopopts_2292={{0x38, 0x29, 0x36, {0x6, 0x4, '\x00', [@hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x3e}}, @generic={0x57, 0x7, "c02f8f37bfaa7b"}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}], 0x178}}, {{&(0x7f0000002b00)={0xa, 0x4e20, 0xfffffff9, @local, 0x2}, 0x1c, &(0x7f0000002c40)=[{&(0x7f0000002b40)="8e1b188f3aa6c216480d3335cb7018882467dc9895bb4790b08881da8cba2cd09b571e14dc5500e9bd73c6430bcf2d44ffaead584675e0ca99b09ca5a8f2276cac666bf3a46466471b5ed465959f53b9dc232935847b71d46c6cea66b2cdf5ff587ea8d8fd331318c0855fbf89c492e7a560aa5b8890366a8fe50d2da48526be91cae180f6018b92b2c02bb9980e0b601a45cb25eca9be6f06e528663b9b294b73f50db1c9b1a3fe573df5e333d619a8ccc0ef5dffa4f8b554e9f8e3e2ba5ede90cd5d5e8d348e08616a3501", 0xcc}], 0x1, &(0x7f0000002c80)=[@rthdr={{0xa8, 0x29, 0x39, {0x4, 0x12, 0x0, 0x20, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @remote}, @empty, @private1, @mcast2, @empty, @dev={0xfe, 0x80, '\x00', 0x19}, @mcast2]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xe96}}, @rthdr_2292={{0x88, 0x29, 0x39, {0x3c, 0xe, 0x0, 0x0, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @remote}, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, @mcast1, @mcast1, @private2={0xfc, 0x2, '\x00', 0x1}]}}}, @rthdr={{0x78, 0x29, 0x39, {0x16, 0xc, 0x1, 0x4, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}, @empty, @private1, @loopback, @dev={0xfe, 0x80, '\x00', 0xf}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}}}], 0x1c0}}, {{0x0, 0x0, &(0x7f0000003200)=[{&(0x7f0000002e40)="11b3593575d745d98e", 0x9}, {&(0x7f0000002e80)}, {&(0x7f0000002ec0)="7ed64f7fdb3b69fedad080b39f26c731700997bd249515247ed216d7dd721c8229541f284d898346450885b2e561f771a9c7c480287699aad8b43e12e61b60d519497a2d6c01f2d1b588dd26c296cc8a900d5a98cda3e49bf87789b015c263061a1afcd4ffa914341caf70409e84887b5cd21c691e4ed0708d8a33fc767c30223d1b5617ac84025539f29b33abfb1b3fb53f8798e6bd7a7da3e800a00e82a648ceba7b69bb450619ec9c5c5ef9c40f01ac06fceb515215238ad11eab6b16ddfec950", 0xc2}, {&(0x7f0000002fc0)="33955ac602f2e953b86d963ee515cda5e81fbfddb011589f8b07edf2632671b2cd194ef48afb53d651f928a2192eae12f057cad57ee2872da13891f4ad7619a151d3abab6e2ec4b51819fbf70252c15348a75465", 0x54}, {&(0x7f0000003040)="b2f7a56f0a6d3cabd6e41b74e30797a8bf83d3c7ddb1e45592dc6e9173e98eac71762bd8f1a0c95013da36c56470c2497201612cfa06f3399d73e61a38f1240772368cda3c59befd9625e1d97f2b4da258e28352631abef58a53920d17fe69ce1e2e51e5d9e906ab7280b90671aa783d2ef7d7d06e", 0x75}, {&(0x7f00000030c0)="a3a27bd88d9c2d2e781da1755e963ead594d1bdf34c9a576391a0e2170624689b5b1beca1de363e7993fce3846289809ac37d2530de35f82052a032d534d17e3ead98c9274de3f995d8551953806166ac273c401ff4e2f5c3f3ede57748e4b8d31b5376cee505ec37e2bef16b53c45661bad7c5b5f231d694913db4faf27ec61a2c7e2092d7b3ac2ca70bd69547d178b58914bcbaa915d8e2581d52c407a36", 0x9f}, {&(0x7f0000003180)="959aa0099aeaf33acda57facf93bfcc00c4480d2aa827e967735eaa4f9fec5ea1f1054d56cfe3e44c3df034a85ce740771c1ebb8a4c32e3a67fce4d317e393ab4960ac95032b157464aca782420b7e0d99d8159db04e2f15a0faad9d6a", 0x5d}], 0x7, &(0x7f0000003280)=[@flowinfo={{0x14, 0x29, 0xb, 0xa000000}}, @tclass={{0x14, 0x29, 0x43, 0x8}}], 0x30}}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f00000032c0)="616bc3f0c445a83182b92f0c513de91357be7abb399c20283b6d374533c9e5da798d23026b22ba2b0a6391b7587da760dd", 0x31}, {&(0x7f0000003300)="ff364d4048a964c368ec2ec5851011ea9479c506d4c09efd273df067eaffee3ddfe686ac12eff807d337cf24084bae58888e2c9b1cb22796b830d1072c7ece89802712a5a0741c41953721a90b20648e7b3807fb4e694abc747851287cbceafd192c6fc89067ece81a6bab8a249b5d713bec6370bfae5b0c2b548be1c3625ad823b7276ce260be9a4f9896ca7f829a22165840bae2550bd8161c5bd64e8a2e57bbd4aa716a217fedc8ae1f2c68443ec2aee83c425d8bd8d5e7ec9f0dc1a34921c55bed929b76ee7d0957d18f017df9305fbabbc7f7", 0xd5}, {&(0x7f0000003400)="4487b0ac22857236265120e48b41b6c5313217683ea461d29dbcef8443f962c199c5d6fdd8e35c4130bc079314100e04381184190b567e0fccd706bb17ad490865e4c5bb62b33e8a0835ee249d136df84b421c25318f762758ed07f70e5878adb99102ec076c32489757c673c3b5bbd4ce8b83dfea8c01d4b4835465f2b757071a22ca95874bbac214cccd400265d40c2f387a5077ab19293bf883e357dcf41d9e51d7", 0xa3}, {&(0x7f00000034c0)="5fdc9c2a0319ad041476baa8b0eb05e0cca3ecff06d793cec2606231a2c446b9446492d3c19438f9e0646a61e80667ab1853d99100ebeca06ed04b5e48bf36022e31fd7c8ebcef57c6d595f3311fe06c26c8b83d90d7379474b368286825646e7b3875229abe117cda97aab5499b64c749a0708e4e04b8a2244a707b93c4fe42d07747", 0x83}, {&(0x7f0000003580)="078604e1cf329eec9a89328b57d1b7b4317f3f2f1063a33ec9c8b4d89e99c920a51d7dea9ed915272625a403cfb16770ddcc1fbe36345674e4ab4bafc479164364469eac769e6c7c7a2b6e9d6a5182d0d6556d135275ec611fca61010b01c39d0f577ac0f448e750a699364e3bdad2a200a162fb491fa0645065e9f810c1a496d24fe3c8556d75e0e58adbe86ac9c620ccd59bcda78b", 0x96}, {&(0x7f0000003640)="d36a4ccafea5a74bb00f579883dbaee5ab48c09d9acf10fe82b554ddbc8a64c351a83280485a9152d889883bf7e86d5b93736a1e60ec4e6a4b63f22a21d5f4813a454a7fe0a97338f52fc44cfff3e7a7fe909290b5dd7d141d55f1b3068c9826931e05741a00b82637", 0x69}, {&(0x7f00000036c0)="90a8fb083c047f5f8344c622df5becce6e40608fe3abf7e74463522b1ffc4887e2f2a5bcc2f914925a60c02cc8c1c1724f8638ad995bcb55f095f3b2949251f04e9d9519457ee86cb3fd593cc70837724d9c445fd66c9f5a72e597e1e55aa525d68ff7b79ed92ed812bddb4a5960e0a4b9044a04e5233e8429fe70b56d9aad3e6645d1f4c68d41e518b9b3ee4bfd9c5a585a7d4c17d2723f313d89d587a969592a6a9a696ba81ed01f64985ea3b72979621962f99f6d5d8c6bdbd175d28fe58d570c010fdc7be42a042bb16d47f628da1391c3f0bb701095217a99527fc21d9adb0cdad54edd314986b73c41fa5591f6eec33aa1ec632365", 0xf8}], 0x7, &(0x7f0000003840)=[@rthdrdstopts={{0x30, 0x29, 0x37, {0x3a, 0x2, '\x00', [@ra={0x5, 0x2, 0x2}, @hao={0xc9, 0x10, @remote}]}}}, @rthdrdstopts={{0x68, 0x29, 0x37, {0x0, 0x9, '\x00', [@generic={0x20, 0x3f, "341ee8b5f1e0ff8e20ccb6ac6435771c9be79fd36571ef07571338fb6e372d19723d07606c77bbebebfff639cc59a3f54e96d7de03cd83129bd7e9bdc5ead4"}, @pad1, @jumbo={0xc2, 0x4, 0x1f}]}}}, @rthdrdstopts={{0x90, 0x29, 0x37, {0x6c, 0xe, '\x00', [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @loopback}, @generic={0x7, 0x58, "c06c7778c7a13262f9c844ffbab9e12b6fa8e8f3f0ec9adc3cd52cd0e194da297d3f7652bafb5b1ef98cf7733bc6d4d4a8bab53cc3c10113df429bfbdf458b8a64ca6db31f93bd74efd964ab7261b3bffc2feda9375f0edc"}]}}}, @rthdrdstopts={{0xa0, 0x29, 0x37, {0x2b, 0x10, '\x00', [@calipso={0x7, 0x40, {0x3, 0xe, 0x78, 0x1, [0x6, 0x5, 0x3, 0x6, 0x4b, 0x6, 0x100000000]}}, @generic={0x0, 0x35, "6148992c495e7cdd00d045ec706740f00657c5e31c43d333aeac7272a18c62e83caa8081dae013b5f40f5a12002b44deea54901664"}, @enc_lim={0x4, 0x1, 0x1f}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0xe01ccaf}}, @hoplimit={{0x14, 0x29, 0x34, 0x5}}, @rthdrdstopts={{0x40, 0x29, 0x37, {0x2f, 0x4, '\x00', [@enc_lim={0x4, 0x1, 0x9}, @enc_lim={0x4, 0x1, 0x6}, @jumbo={0xc2, 0x4, 0x2}, @jumbo={0xc2, 0x4, 0x7fffffff}, @pad1, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @pad1]}}}, @rthdr={{0x38, 0x29, 0x39, {0x4, 0x4, 0x0, 0xb1, 0x0, [@rand_addr=' \x01\x00', @mcast2]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r7}}}, @dontfrag={{0x14}}], 0x2b0}}, {{&(0x7f0000003b00)={0xa, 0x4e21, 0x4, @loopback, 0x1ff}, 0x1c, &(0x7f0000003e40)=[{&(0x7f0000003b40)="9798a3e0799533987cca1f1e4a523b6999f70481fde868bfd4049f4731ae6b6250c959365649939c8456e280a43f188dc40843ddf8aba8899daea400e58d2b9572a86630b232133c0b3475a0dd2973c1c0744276e7b507d17260b3270139d495ae9909b62759f8527c7326c4e60d3b8e3db4d729d000a34cb19ec4d1ab3a965ba605abd1428a113c7979cdfabdb0e417f58ed473f32382001c0db90b3b07ce9a31c45e15fabe6f17f2070d6229e6b1201e9c4e7aa358a9843cfd4f7c6724c7984eb04bfcd79595a14407d58329b69ce9b3a82419d5f6d28557d216350aa72ca8b4f44f0166a30b2ab61bb83f99dfda", 0xef}, {&(0x7f0000003c40)="10c08350605d93c367b6fc41ea0211bc1e0f630cb2f7019992cbf36af67d073a9ee887c44609294e274c276ab51104cd7a40f1c93be2b61821c8de58005a8e99852e150b5b4abc172eb197188dee43b35104f09f62eb828b2ea07b127648514a7b75dc3066ba68a350a05ac8d7aa9461a571ff5b757e10d8629bfb67c2cacf29c9bf52593bae7ee6e4ca9a83788f", 0x8e}, {&(0x7f0000003d00)="9bbac6ae895a6a0176a47b29d4550f75a43a516607b493d081af542448f250a774d51c7f54cd50eeb193adc439871a6a7efb8ba99e13e521f39e3b852fd888707158cb50b13582356291dff6ab39a2eb90af750136c1b4061c9fdfe83b875eee3679659af2cf5fdd5280fab84237175e44228b789775f00f2d3d77cf45d76c", 0x7f}, {&(0x7f0000003d80)="e27932d5e4d9dfbec741ea0f79e342f3de7ede583d6a80d602268ae71d3f5998f8a05f0133bb6842aed79b3d142de5b96474118dbff0bd02a28cb1a93d95d532e4979dd254f58a5d8f013dd979613d6f2e79db1aeadc414877020de0f42bf40a10c9e38488c19af2953271a299e3a25a671b4982af1f934967ca1393285f1f08e6f5bf046067880ab2103c970317774762504b37fe6be704cf109c7cbc4028d64e8e713c2934adaa2315e4bc34c78e2adceef2b5", 0xb4}], 0x4, &(0x7f0000003e80)=[@rthdrdstopts={{0x30, 0x29, 0x37, {0x87, 0x2, '\x00', [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0xba}, @pad1, @pad1, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}, @rthdr={{0x38, 0x29, 0x39, {0x67, 0x4, 0x2, 0x1, 0x0, [@private0={0xfc, 0x0, '\x00', 0x1}, @local]}}}, @tclass={{0x14, 0x29, 0x43, 0xffff739d}}], 0x80}}, {{&(0x7f0000003f00)={0xa, 0x4e22, 0x3, @private2, 0x1}, 0x1c, &(0x7f0000005140)=[{&(0x7f0000003f40)="604004855f909a5b75bbd8897fc3e62ec0943772ebda320c3715506b7df8321868c50f6f", 0x24}, {&(0x7f0000003f80)="8c169389c48e2b2c45ff8a9cdc7f6440bafe192592412b613a0af2cc479113f9f888c54921267b75adb5cfab3ff40a477fddb3b8511af231abd5e904a7a7373e1ddad46b9549d162a478feec4ac258ac1857752b6431b1d73312fea198a153f0e8080717a94ed2d7659fe6f97a1761e7f8311d593d08f7148cc98e7682ceaa4662a6c6ea9f5afecb171c7357ac31119c", 0x90}, {&(0x7f0000004040)="eb13a25b0cf504438a7a688afc634b6c072085726c5170f75cc6fb91ac2689af7f81c865", 0x24}, {&(0x7f0000004080)="5e18f1cce92f71d1a7feda503206ed3a", 0x10}, {&(0x7f00000040c0)="881b04711428e3ac2fb650c076f074991e707552973f85830f9c376587f1", 0x1e}, {&(0x7f0000004100)="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", 0x1000}, {&(0x7f0000005100)="b6fa3c90e736c14452b61bd20fcf75bddefe5591ab832f6e4667c9", 0x1b}], 0x7, &(0x7f00000051c0)=[@rthdr_2292={{0x38, 0x29, 0x39, {0x1d, 0x4, 0x1, 0x3, 0x0, [@loopback, @ipv4={'\x00', '\xff\xff', @local}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x7}}, @rthdrdstopts={{0x100, 0x29, 0x37, {0x2f, 0x1d, '\x00', [@pad1, @ra={0x5, 0x2, 0x328}, @padn={0x1, 0x2, [0x0, 0x0]}, @ra={0x5, 0x2, 0x40}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @generic={0x9, 0xd2, "9c8b06f54c5c68ed9484d16029f92b6bb9e684eea4a1af828f463dffc1609858a8d5b92f3fd40618164b48f7aad4babd6a1a676f0ebb60ea903dbf50c6dab41394c82ec779a6ea9ca75edb307321ebd76bc51b83ecddb77fd61bba07d09baf1fbff6f98c34bb1c78a764135ac8235a4f157196e9bbae1eec520cacc44749c12daf236adea59260405b1ed9f7f2ae690e988a7db71691c8bad684f8aa30c4f9c3665a4491c9f24052597f823af7b1089b9029536af5c46abee9b980e33620566168e095f26d2557ee7ee54ace96a438fb8d0d"}]}}}, @tclass={{0x14}}], 0x168}}], 0x6, 0x40000) [ 1068.723883] FAULT_INJECTION: forcing a failure. [ 1068.723883] name failslab, interval 1, probability 0, space 0, times 0 [ 1068.724932] CPU: 0 UID: 0 PID: 8703 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1068.724948] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1068.724955] Call Trace: [ 1068.724960] [ 1068.724964] dump_stack_lvl+0xfa/0x120 [ 1068.724988] should_fail_ex+0x4d7/0x5e0 [ 1068.725006] should_failslab+0xc2/0x120 [ 1068.725024] __kmalloc_cache_noprof+0x81/0x6b0 [ 1068.725045] ? task_active_pid_ns+0xa9/0xd0 [ 1068.725059] ? alloc_name+0x41/0x110 [ 1068.725076] ? alloc_name+0x41/0x110 [ 1068.725089] alloc_name+0x41/0x110 [ 1068.725102] __x64_sys_memfd_create+0x130/0x280 [ 1068.725121] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1068.725142] do_syscall_64+0xbf/0x390 [ 1068.725163] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1068.725175] RIP: 0033:0x7fd2e6305b19 [ 1068.725185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1068.725196] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1068.725208] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6305b19 [ 1068.725216] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007fd2e635f0fb [ 1068.725223] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1068.725230] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1068.725237] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1068.725256] sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000001780)="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", 0x1000}, {&(0x7f0000000040)="4a1d83a5cd5bf783e66ea853b05f79eec2893059c71eead9addec09fea887f45edcab6e676d65211c3c47f7c38a1aa85df6d29e6eccd211c5f973b8ce165358e83ca3208d40b60d005dc2889732b197f582cd64f576fe57d655b6dc225631feb34cf9f13ef53898e0c1208750f68d1fdba2f886f7e6380ebc73f449d04cb", 0x7e}, {&(0x7f00000000c0)="d55b09332c2935af26f4e38bbb2f4006ab4b23d6", 0x14}], 0x4, &(0x7f00000012c0)=[{0xd0, 0x104, 0x70000000, "1bead4c3d6dba219a0ef8aed953baa2b2d2de671066db67a57cb86f1209425403db7be0c8040bdf93a1c930d88d4cdda0c77ed7dee5cc272e4f07527b2e1cc42caaca96e0b67d1fbf847d478b344c83689948c6ca82123cfcf8e785897e8a76870015e83a02ac7c7d9d06fa9526957f0897db9555975e741da2833ddb772f05da6b09c8bde86f19dd1b64af2cb5e151b14416bc93cdb3ba691feab256fa2f13523d16b67dbe8a059827258c21c4ce24dffd7a29277bbac334c2bb4ac2b2b87"}, {0x108, 0x102, 0x1, "49adb2d58c4df919221a18683370131b9e35900f85a6670649c89f5f17f7bf8ef41694f15756dee089c049e84dc8ae1f997af3f09465ff661d8f6e8c840c0d3b6860d1876ba31f951f9ebabf14cdc1494fe8771c24315ccc2127c710b7832d757588bcbe6bb42f9cea71b8b1dcb07b9c4e349128a37874376d3419503956c829d6e3bb4fbb10208ec1145ddb6c62361b9470b67dcd8d130c07d8ae18a9340e7da14b68aad79555d9721e5e0b17bd067f31bea342cd9f1a4b8f8b4a2e92d0aa30a76792ea2051a7cf593a57957e84c61ba7454e1d59af1cfae3453ea6b3abe2b21f701c23fdf90805642d229c8266eb760617261d13cfc8"}, {0x90, 0x10c, 0x1, "847ccb160434ac24adadd56339f9eeae302488289e11bd999f53b913b94f814585215d31a205fe41d5a90495a67a89c0fdeaa051285bba0912347401cd21dbf6e9d262d612ca5bd4dfb4d1ab7041dcdb7c502410fab0329e95ae22911187f0d1be67db9d10f89c11bf2c9280129702d17ebce9e7a0635690cefd74e11d"}], 0x268}, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'lo\x00'}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000005600)=[{{&(0x7f0000002e80)={0xa, 0x4e24, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8}, 0x1c, &(0x7f00000055c0)=[{&(0x7f00000054c0)="657479ce3cb215f86f", 0x9}, {&(0x7f0000005500)="d8a878b91329edf419b0050b04fa93d5291dd3dd11075d502560c48956f28ce9969b32f46df3f7b0a50e1ecf8a33b6c353f80cc3ce62d6844034542bafa9ca388f7d0b35ce6502a008d958fcc4fef8891f5fc7d21cdaa81cd679aaa87aa49bb684fc54bfae012a1d54abebaefd8156bbfcd8d50b72f25da514299fe5855b8a5304d358dad1ce318b6859af0fc0f5d255e04f5dd8afa9fc205e499621d1e9a04c4d9f9ad530", 0xa5}], 0x2}}], 0x1, 0x0) 01:52:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 1) [ 1068.775364] FAULT_INJECTION: forcing a failure. [ 1068.775364] name failslab, interval 1, probability 0, space 0, times 0 [ 1068.776595] CPU: 1 UID: 0 PID: 8715 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1068.776616] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1068.776626] Call Trace: [ 1068.776632] [ 1068.776638] dump_stack_lvl+0xfa/0x120 [ 1068.776667] should_fail_ex+0x4d7/0x5e0 [ 1068.776690] ? alloc_empty_file+0x58/0x1e0 [ 1068.776714] should_failslab+0xc2/0x120 [ 1068.776737] kmem_cache_alloc_noprof+0x80/0x690 [ 1068.776754] ? d_instantiate+0x79/0xa0 [ 1068.776782] ? alloc_empty_file+0x58/0x1e0 [ 1068.776803] alloc_empty_file+0x58/0x1e0 [ 1068.776829] alloc_file_pseudo+0x12b/0x220 [ 1068.776855] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1068.776889] __shmem_file_setup+0x1a7/0x370 [ 1068.776907] ? alloc_fd+0x2c1/0x560 [ 1068.776928] alloc_file+0x2ae/0x590 [ 1068.776949] __x64_sys_memfd_create+0x193/0x280 [ 1068.776968] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1068.776994] do_syscall_64+0xbf/0x390 [ 1068.777020] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1068.777036] RIP: 0033:0x7f1b64b61b19 [ 1068.777048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1068.777062] RSP: 002b:00007f1b620d6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1068.777077] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b61b19 [ 1068.777087] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f1b64bbb0fb [ 1068.777096] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1068.777105] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1068.777119] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1068.777144] [ 1068.783131] FAULT_INJECTION: forcing a failure. [ 1068.783131] name failslab, interval 1, probability 0, space 0, times 0 [ 1068.792389] CPU: 0 UID: 0 PID: 8716 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1068.792406] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1068.792414] Call Trace: [ 1068.792418] [ 1068.792423] dump_stack_lvl+0xfa/0x120 [ 1068.792446] should_fail_ex+0x4d7/0x5e0 [ 1068.792463] ? __d_alloc+0x31/0xa10 [ 1068.792480] should_failslab+0xc2/0x120 [ 1068.792498] kmem_cache_alloc_lru_noprof+0x84/0x690 [ 1068.792511] ? find_held_lock+0x2b/0x80 [ 1068.792532] ? __d_alloc+0x31/0xa10 [ 1068.792547] __d_alloc+0x31/0xa10 [ 1068.792562] ? mpol_shared_policy_init+0x24f/0x390 [ 1068.792580] d_alloc_pseudo+0x1d/0xc0 [ 1068.792592] alloc_file_pseudo+0xbe/0x220 [ 1068.792614] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1068.792633] ? __shmem_get_inode+0x682/0xe80 [ 1068.792653] __shmem_file_setup+0x1a7/0x370 [ 1068.792667] ? alloc_fd+0x2c1/0x560 [ 1068.792683] alloc_file+0x2ae/0x590 [ 1068.792699] __x64_sys_memfd_create+0x193/0x280 [ 1068.792714] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1068.792736] do_syscall_64+0xbf/0x390 [ 1068.792756] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1068.792768] RIP: 0033:0x7f94bafefb19 [ 1068.792778] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1068.792789] RSP: 002b:00007f94b8564f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1068.792801] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafefb19 [ 1068.792809] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f94bb0490fb [ 1068.792816] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1068.792823] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1068.792830] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1068.792849] 01:52:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 2) 01:52:10 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0xfeffff00000000) 01:52:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 11) [ 1068.885946] loop2: detected capacity change from 0 to 512 [ 1068.897331] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1068.898148] EXT4-fs (loop2): group descriptors corrupted! 01:52:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000100)) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:52:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 9) 01:52:11 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xa000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1068.936504] loop5: detected capacity change from 0 to 512 [ 1068.949081] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1068.950252] EXT4-fs (loop5): group descriptors corrupted! 01:52:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 3) [ 1068.975394] loop7: detected capacity change from 0 to 512 [ 1068.986245] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1068.987060] EXT4-fs (loop7): group descriptors corrupted! [ 1068.998404] FAULT_INJECTION: forcing a failure. [ 1068.998404] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1068.999427] CPU: 0 UID: 0 PID: 8738 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1068.999444] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1068.999451] Call Trace: [ 1068.999455] [ 1068.999460] dump_stack_lvl+0xfa/0x120 [ 1068.999483] should_fail_ex+0x4d7/0x5e0 [ 1068.999502] strncpy_from_user+0x3b/0x2f0 [ 1068.999523] alloc_name+0x78/0x110 [ 1068.999587] __x64_sys_memfd_create+0x130/0x280 [ 1068.999601] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1068.999622] do_syscall_64+0xbf/0x390 [ 1068.999643] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1068.999656] RIP: 0033:0x7fd2e6305b19 [ 1068.999666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1068.999677] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1068.999689] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6305b19 [ 1068.999697] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007fd2e635f0fb [ 1068.999704] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1068.999711] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1068.999718] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1068.999738] 01:52:11 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:52:11 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x100000000000000) 01:52:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 12) 01:52:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000500), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x23}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000300)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_NEW_INTERFACE(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r2, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_IFTYPE={0x8, 0x5, 0xffffffffffffffff}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x2c}}, 0x2000001) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r6, 0x0, r0, 0x0) 01:52:21 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x5b9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x2266aefa, 0x10003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x2}, 0x0, 0x1000, 0xffffffffffffffff, 0x0) r3 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r3, 0x2, r2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x8, 0x0, 0x9, 0x9, 0x0, 0x5b2a, 0x40, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7ff, 0x0, @perf_config_ext={0x6, 0xe6}, 0x4000, 0x7ff, 0x7, 0x9, 0xde, 0x92f9, 0x400, 0x0, 0x8001, 0x0, 0x13a9}, 0x0, 0xc, r2, 0x8) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280), 0x400, 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x10}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000380)=0x0) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r7, 0x2, r6, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x80, 0x8, 0x82, 0x81, 0x0, 0xfffffffffffffffc, 0x8000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x2, 0x3eca76f8}, 0x4903, 0x1ff, 0x8, 0x2, 0x63b, 0x1, 0x7, 0x0, 0xfffffffb, 0x0, 0xffffffff}, r5, 0xe, r6, 0x1) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r9 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) readv(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(0xffffffffffffffff, r10, 0x2) keyctl$KEYCTL_MOVE(0x1e, r9, r1, r8, 0x0) 01:52:21 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xb000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:52:21 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 10) 01:52:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 4) 01:52:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x200000000000000) 01:52:21 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = fork() tkill(r2, 0x31) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r4, 0x2, r3, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x3f, 0x7f, 0x1, 0x8, 0x0, 0x6, 0x2, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000280), 0x6}, 0x4, 0x0, 0x5, 0x7, 0x6, 0x8, 0x2, 0x0, 0xfffffffa, 0x0, 0x9}, r2, 0xb, r3, 0x3) sendmsg$nl_xfrm(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000003c0)=@updsa={0x13c, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private0, @in=@remote}, {@in, 0x0, 0x33}, @in6=@private0, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256-generic\x00'}}}]}, 0x13c}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@newae={0x40, 0x1e, 0x412, 0x70bd28, 0x25dfdbfc, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0xa, 0x33}, @in=@empty, 0x7}}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x24000040) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x20, 0x0, 0x1, 0x0, 0x0, {0x8}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x20, r6, 0x1, 0x0, 0x0, {0x8}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x2c, r6, 0x100, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x1000}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x8}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x81}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8840}, 0x8010) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'ip6erspan0\x00', 0x0}) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x111a02, 0x0) sendmsg$GTP_CMD_DELPDP(r9, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000427bd7000fdcbdf250100000006000600010000000800090001000000"], 0x24}, 0x1, 0x0, 0x0, 0x44050}, 0x1) [ 1079.688941] FAULT_INJECTION: forcing a failure. [ 1079.688941] name failslab, interval 1, probability 0, space 0, times 0 [ 1079.690701] CPU: 1 UID: 0 PID: 8755 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1079.690732] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1079.690744] Call Trace: [ 1079.690753] [ 1079.690762] dump_stack_lvl+0xfa/0x120 [ 1079.690800] should_fail_ex+0x4d7/0x5e0 [ 1079.690832] ? security_file_alloc+0x35/0x130 [ 1079.690864] should_failslab+0xc2/0x120 [ 1079.690898] kmem_cache_alloc_noprof+0x80/0x690 [ 1079.690922] ? __create_object+0x59/0x80 [ 1079.690953] ? security_file_alloc+0x35/0x130 [ 1079.690983] security_file_alloc+0x35/0x130 [ 1079.691017] init_file+0x95/0x4c0 [ 1079.691056] alloc_empty_file+0x76/0x1e0 [ 1079.691095] alloc_file_pseudo+0x12b/0x220 [ 1079.691143] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1079.691194] __shmem_file_setup+0x1a7/0x370 [ 1079.691221] ? alloc_fd+0x2c1/0x560 [ 1079.691263] alloc_file+0x2ae/0x590 [ 1079.691294] __x64_sys_memfd_create+0x193/0x280 [ 1079.691323] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1079.691364] do_syscall_64+0xbf/0x390 [ 1079.691403] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1079.691427] RIP: 0033:0x7f1b64b61b19 [ 1079.691444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1079.691465] RSP: 002b:00007f1b620d6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1079.691487] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b61b19 [ 1079.691503] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f1b64bbb0fb [ 1079.691516] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1079.691530] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1079.691543] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1079.691581] [ 1079.706831] FAULT_INJECTION: forcing a failure. [ 1079.706831] name failslab, interval 1, probability 0, space 0, times 0 [ 1079.715748] CPU: 0 UID: 0 PID: 8763 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1079.715766] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1079.715773] Call Trace: [ 1079.715777] [ 1079.715782] dump_stack_lvl+0xfa/0x120 [ 1079.715803] should_fail_ex+0x4d7/0x5e0 [ 1079.715820] ? shmem_alloc_inode+0x27/0x50 [ 1079.715833] should_failslab+0xc2/0x120 [ 1079.715851] kmem_cache_alloc_lru_noprof+0x84/0x690 [ 1079.715865] ? perf_trace_lock+0xb5/0x5d0 [ 1079.715891] ? shmem_alloc_inode+0x27/0x50 [ 1079.715903] shmem_alloc_inode+0x27/0x50 [ 1079.715916] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 1079.715929] alloc_inode+0x67/0x250 [ 1079.715950] new_inode+0x1e/0x160 [ 1079.715972] __shmem_get_inode+0x17c/0xe80 [ 1079.715994] __shmem_file_setup+0x107/0x370 [ 1079.716009] ? alloc_fd+0x2c1/0x560 [ 1079.716026] alloc_file+0x2ae/0x590 [ 1079.716044] __x64_sys_memfd_create+0x193/0x280 [ 1079.716060] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1079.716084] do_syscall_64+0xbf/0x390 [ 1079.716105] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1079.716122] RIP: 0033:0x7fd2e6305b19 [ 1079.716132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1079.716144] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1079.716157] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6305b19 [ 1079.716165] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007fd2e635f0fb [ 1079.716173] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1079.716182] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1079.716189] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1079.716211] [ 1079.755983] FAULT_INJECTION: forcing a failure. [ 1079.755983] name failslab, interval 1, probability 0, space 0, times 0 [ 1079.757813] CPU: 1 UID: 0 PID: 8769 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1079.757845] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1079.757859] Call Trace: [ 1079.757866] [ 1079.757875] dump_stack_lvl+0xfa/0x120 [ 1079.757915] should_fail_ex+0x4d7/0x5e0 [ 1079.757948] ? alloc_empty_file+0x58/0x1e0 [ 1079.757992] should_failslab+0xc2/0x120 [ 1079.758030] kmem_cache_alloc_noprof+0x80/0x690 [ 1079.758056] ? d_instantiate+0x79/0xa0 [ 1079.758104] ? alloc_empty_file+0x58/0x1e0 [ 1079.758154] alloc_empty_file+0x58/0x1e0 [ 1079.758202] alloc_file_pseudo+0x12b/0x220 [ 1079.758251] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1079.758312] __shmem_file_setup+0x1a7/0x370 [ 1079.758343] ? alloc_fd+0x2c1/0x560 [ 1079.758378] alloc_file+0x2ae/0x590 [ 1079.758413] __x64_sys_memfd_create+0x193/0x280 [ 1079.758445] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1079.758490] do_syscall_64+0xbf/0x390 [ 1079.758536] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1079.758560] RIP: 0033:0x7f94bafefb19 [ 1079.758578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1079.758601] RSP: 002b:00007f94b8564f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1079.758624] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafefb19 [ 1079.758640] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f94bb0490fb [ 1079.758654] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1079.758669] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1079.758683] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1079.758722] 01:52:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000500), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x23}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000300)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_NEW_INTERFACE(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r2, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_IFTYPE={0x8, 0x5, 0xffffffffffffffff}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x2c}}, 0x2000001) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r6, 0x0, r0, 0x0) 01:52:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 5) 01:52:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x300000000000000) [ 1079.887096] Process accounting paused [ 1079.891997] loop2: detected capacity change from 0 to 512 01:52:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 13) [ 1079.909546] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1079.910564] EXT4-fs (loop2): group descriptors corrupted! 01:52:22 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xf000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:52:22 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x6a1, 0x0, 0xffffffff, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:52:22 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 11) [ 1080.045855] loop5: detected capacity change from 0 to 512 [ 1080.071461] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1080.073410] EXT4-fs (loop5): group descriptors corrupted! [ 1080.082188] loop7: detected capacity change from 0 to 512 [ 1080.096299] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1080.097128] EXT4-fs (loop7): group descriptors corrupted! 01:52:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 6) 01:52:32 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x10000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:52:32 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'virt_wifi0\x00', 0x0}) 01:52:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0xff, 0x0, 0x0, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xc}, 0x0, 0x0, 0x10000000, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) 01:52:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x500000000000000) 01:52:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 12) 01:52:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 14) 01:52:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000500), r1) sendmsg$NLBL_MGMT_C_LISTDEF(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x23}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000300)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_NEW_INTERFACE(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r2, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_IFTYPE={0x8, 0x5, 0xffffffffffffffff}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x2c}}, 0x2000001) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r6, 0x0, r0, 0x0) [ 1090.223675] FAULT_INJECTION: forcing a failure. [ 1090.223675] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.224769] CPU: 0 UID: 0 PID: 8816 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1090.224786] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1090.224793] Call Trace: [ 1090.224797] [ 1090.224802] dump_stack_lvl+0xfa/0x120 [ 1090.224826] should_fail_ex+0x4d7/0x5e0 [ 1090.224843] ? security_inode_alloc+0x3e/0x130 [ 1090.224858] should_failslab+0xc2/0x120 [ 1090.224876] kmem_cache_alloc_noprof+0x80/0x690 [ 1090.224888] ? __pfx_map_id_range_down+0x10/0x10 [ 1090.224913] ? security_inode_alloc+0x3e/0x130 [ 1090.224927] security_inode_alloc+0x3e/0x130 [ 1090.224943] inode_init_always_gfp+0xc9d/0xff0 [ 1090.224962] alloc_inode+0x8d/0x250 [ 1090.224981] new_inode+0x1e/0x160 [ 1090.225001] __shmem_get_inode+0x17c/0xe80 [ 1090.225021] __shmem_file_setup+0x107/0x370 [ 1090.225035] ? alloc_fd+0x2c1/0x560 [ 1090.225051] alloc_file+0x2ae/0x590 [ 1090.225068] __x64_sys_memfd_create+0x193/0x280 [ 1090.225083] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1090.225104] do_syscall_64+0xbf/0x390 [ 1090.225129] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1090.225142] RIP: 0033:0x7fd2e6305b19 [ 1090.225151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1090.225163] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1090.225175] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6305b19 [ 1090.225183] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007fd2e635f0fb [ 1090.225190] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1090.225197] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1090.225205] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1090.225224] [ 1090.230870] FAULT_INJECTION: forcing a failure. [ 1090.230870] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1090.246525] CPU: 1 UID: 0 PID: 8813 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1090.246556] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1090.246570] Call Trace: [ 1090.246578] [ 1090.246588] dump_stack_lvl+0xfa/0x120 [ 1090.246631] should_fail_ex+0x4d7/0x5e0 [ 1090.246667] should_fail_alloc_page+0xe0/0x110 [ 1090.246703] prepare_alloc_pages+0x1eb/0x550 [ 1090.246742] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 1090.246778] ? find_held_lock+0x2b/0x80 [ 1090.246808] ? lock_release+0xc8/0x290 [ 1090.246841] ? 0xffffffffa0000000 [ 1090.246862] ? perf_trace_lock_acquire+0xc9/0x700 [ 1090.246898] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1090.246938] ? perf_trace_lock+0xb5/0x5d0 [ 1090.246987] ? __pfx_perf_trace_lock+0x10/0x10 [ 1090.247019] ? lock_is_held_type+0x9e/0x120 [ 1090.247055] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1090.247095] ? policy_nodemask+0xeb/0x4e0 [ 1090.247130] alloc_pages_mpol+0xed/0x340 [ 1090.247152] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1090.247172] ? filemap_get_entry+0x1bb/0x3b0 [ 1090.247206] ? __pfx_filemap_get_entry+0x10/0x10 [ 1090.247247] folio_alloc_mpol_noprof+0x38/0xa0 [ 1090.247278] shmem_alloc_folio+0x11b/0x140 [ 1090.247308] shmem_get_folio_gfp.constprop.0+0x4ea/0x13a0 [ 1090.247356] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 1090.247394] ? __pfx_perf_trace_lock+0x10/0x10 [ 1090.247424] ? simple_xattr_get+0x173/0x1d0 [ 1090.247466] shmem_write_begin+0x147/0x2e0 [ 1090.247499] ? __pfx_shmem_write_begin+0x10/0x10 [ 1090.247527] ? timestamp_truncate+0x1eb/0x2f0 [ 1090.247559] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 1090.247595] ? __pfx_timestamp_truncate+0x10/0x10 [ 1090.247632] generic_perform_write+0x391/0x810 [ 1090.247675] ? __pfx_generic_perform_write+0x10/0x10 [ 1090.247706] ? inode_needs_update_time.part.0+0x170/0x270 [ 1090.247749] shmem_file_write_iter+0x111/0x140 [ 1090.247778] vfs_write+0xbe9/0x1150 [ 1090.247809] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 1090.247835] ? __fget_files+0x34/0x3b0 [ 1090.247862] ? __pfx_vfs_write+0x10/0x10 [ 1090.247922] __x64_sys_pwrite64+0x1f1/0x260 [ 1090.247953] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1090.247984] ? fput+0x6a/0x100 [ 1090.248027] do_syscall_64+0xbf/0x390 [ 1090.248063] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1090.248087] RIP: 0033:0x7f1b64b14ab7 [ 1090.248103] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1090.248124] RSP: 002b:00007f1b620d6f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1090.248145] RAX: ffffffffffffffda RBX: 00007f1b64bab970 RCX: 00007f1b64b14ab7 [ 1090.248160] RDX: 000000000000003a RSI: 0000000020001180 RDI: 0000000000000004 [ 1090.248173] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1090.248187] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1090.248200] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1090.248237] 01:52:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000500), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x23}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000300)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r1, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFTYPE={0x8, 0x5, 0xffffffffffffffff}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x2c}}, 0x2000001) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) [ 1090.321071] FAULT_INJECTION: forcing a failure. [ 1090.321071] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.323081] CPU: 1 UID: 0 PID: 8821 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1090.323122] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1090.323137] Call Trace: [ 1090.323146] [ 1090.323156] dump_stack_lvl+0xfa/0x120 [ 1090.323199] should_fail_ex+0x4d7/0x5e0 [ 1090.323235] ? security_file_alloc+0x35/0x130 [ 1090.323271] should_failslab+0xc2/0x120 [ 1090.323310] kmem_cache_alloc_noprof+0x80/0x690 [ 1090.323337] ? __create_object+0x59/0x80 [ 1090.323372] ? security_file_alloc+0x35/0x130 [ 1090.323405] security_file_alloc+0x35/0x130 [ 1090.323443] init_file+0x95/0x4c0 [ 1090.323486] alloc_empty_file+0x76/0x1e0 [ 1090.323530] alloc_file_pseudo+0x12b/0x220 [ 1090.323575] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1090.323632] __shmem_file_setup+0x1a7/0x370 [ 1090.323663] ? alloc_fd+0x2c1/0x560 [ 1090.323699] alloc_file+0x2ae/0x590 [ 1090.323735] __x64_sys_memfd_create+0x193/0x280 [ 1090.323767] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1090.323813] do_syscall_64+0xbf/0x390 [ 1090.323856] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1090.323882] RIP: 0033:0x7f94bafefb19 [ 1090.323902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1090.323926] RSP: 002b:00007f94b8564f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1090.323950] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafefb19 [ 1090.323967] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f94bb0490fb [ 1090.323983] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1090.323999] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 01:52:32 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0xe9) r2 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000600)=[{&(0x7f0000000280)="e9684c9748960ee4d966f6841c84120e5ea43f2aee1c80f6e86dcd679458dc1d0dd6941cafde956dc5f6761861a1f8dfd2981e7cac45453c8702425eaab98f23398e35b2b809ca21fedac2713736f0d62365fe36b645236588b65be0d91437995069697ed1961367c311b7f7e212d343b35a9a24dd05a328099419c2a3241847f91e64f952c9033dade20cdf99d1de7e0ad4e0089b86ff3656edde66070633d7e5397f8f2b28d8fea6ad2b56b4a6f4212abc4d497bd4f24c4473884916e41ae305dc678f3199c4ab0611d44837dabbe7729372d31c47ab4ed4", 0xd9, 0x9}, {&(0x7f0000000380)="a0e76a40a34c91a21598365ee60943337080296ce5c10154c33b0ae0cdb2441dabced65f67febfebb23c42de3075b6e0d0a9dfc227a80e31b75a9c5c50ca059844354d830b87a28a5fd7f8ad681057690d81eb49bea74a7c09e3", 0x5a, 0x3}, {&(0x7f0000000400)="c1536448afd17190d3b72580787ceefdcc9e47917045af154630b6943145c6538ce3c01046180f78efe0c0fe0d1ab2502bf0bcc934bfc1662f00ffc44ec242b03483e033d271b34b518bb3d01a910f3beda391ad3339ae3b38877d175b61eca38b4f2e9ad84fcb0457c8ef82407fcba4b363f53f3689b0d7778869a1453db78542bafdba57aad3b8805467d8e513dc3d17a9105d2b23597d9b626b0de534c9e4ec3f51ae416e4a25fdabea0851496f8cdba17dabedb871bac52140f73752aa4ceab95ca7d2a14d873a3d2c87688ddef047ba09fdb85bcc41a93611b820316ff42899", 0xe2, 0x200}, {&(0x7f0000000500)="2a4ae9e0869d276ed1e895f38e631a65d51250d879e00e12bf84cc3300462b46e42023e8940f31662f41f1f22acced4005d75265574a63e7dda0541e150ccb4c3aa640a36a93b7d2dd903c017d46567519da2a2888e547a09b5ea284b8dd4762a1bc2d94dbcfb12f26780ff8b58eb0366d5f3dca9d709f5b9a77543788feaabfb408328551a2c20673bd3dd8825f38a103badacf350d31358b529d4cc28e6e6b7c7588f112206697035e80b467d243f78bf02d0cfba210fbd96169d13c8a7bfc3deb633e9ec4f5dad8ae77c5380463b3f03c282fa90b6a", 0xd7, 0x6}], 0x40000, &(0x7f0000000680)={[{@huge_within_size}, {@nr_inodes={'nr_inodes', 0x3d, [0x78, 0x6b]}}, {@huge_advise}], [{@fsname={'fsname', 0x3d, 'syz'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000700)=ANY=[@ANYBLOB="010000220100000018000000", @ANYRES32=r2, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) epoll_ctl$EPOLL_CTL_ADD(r1, 0x2, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x3, 0x6}, 0x0, 0x2100, r0, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r4) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r4) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r6, r4, r5, 0x0) [ 1090.324014] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 add_key(&(0x7f0000000740)='trusted\x00', &(0x7f0000000780)={'syz', 0x1}, &(0x7f00000007c0)="cabb638baa8bc4c2006f1846c159a34cf3d3c1d98f6e0a27f8f8293ecfb66b6e9964ef2da32e6dab1eb6bcb7220f360d8b90ebd20b79b1681c17403f85d8b816c25a7f1a9cd876f3bf85714438aa732f0647e5dbac684712ac6a3a2e10562f33f9def8eaa0cc6db330aee94e3b973cb731cbe027697eb9b53ef1f9ce85123563d24c8ccdb6c7621f36af1e6c2bfb26cafa694a14037bc28e33b93eb738269501996a7412cc05f38513121d0068f99e33bd2e120fa50ac30892589fd707c9edf28fb327797b1c00f3e5f36f07cce20c01a9033035c4d7a64fbd1b24a3de", 0xdd, r4) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r8 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r8, r3, r7, 0x0) [ 1090.324056] [ 1090.358342] loop5: detected capacity change from 0 to 512 [ 1090.399233] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:52:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 7) 01:52:32 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0100001a0001000000000000000000fc000000000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000fc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000004c0014007368613235362d67656e65726963000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007ea854045f315e61d82ed0732de7354eb7f982ea264aaa6d91ee152722b8403cc4daa5f8813b6463b6e88c5ed840bf1282885d87b1b5f463349a669d62dc32d46a9418c56b8e506d4567ae1b17860ddbd57af0c9130a52daa20d48651bca3a289455d6e3062a0b440d85e7c3845164a4f3ccdd57b02a4387c8961b8be8d614b128fa51a91cd22626587a12fd2a"], 0x13c}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=@newspdinfo={0x44, 0x24, 0x20, 0x70bd2b, 0x25dfdbfd, 0x8, [@XFRMA_SPD_IPV6_HTHRESH={0x6}, @XFRMA_SPD_IPV4_HTHRESH={0x6}, @XFRMA_SPD_IPV6_HTHRESH={0x6}, @XFRMA_SPD_IPV6_HTHRESH={0x6}, @XFRMA_SPD_IPV4_HTHRESH={0x6}, @XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000005) 01:52:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0xf00000000000000) [ 1090.491990] loop2: detected capacity change from 0 to 512 01:52:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000500), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x23}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000300)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r1, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFTYPE={0x8, 0x5, 0xffffffffffffffff}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x2c}}, 0x2000001) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) [ 1090.511643] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1090.512497] EXT4-fs (loop2): group descriptors corrupted! 01:52:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 15) 01:52:32 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x11000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1090.648354] FAULT_INJECTION: forcing a failure. [ 1090.648354] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1090.650452] CPU: 1 UID: 0 PID: 8849 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1090.650484] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1090.650497] Call Trace: [ 1090.650506] [ 1090.650516] dump_stack_lvl+0xfa/0x120 [ 1090.650556] should_fail_ex+0x4d7/0x5e0 [ 1090.650582] ? page_copy_sane+0xce/0x2b0 [ 1090.650612] copy_folio_from_iter_atomic+0x3d3/0x18c0 [ 1090.650657] ? simple_xattr_get+0x173/0x1d0 [ 1090.650698] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 1090.650728] ? shmem_write_begin+0x15e/0x2e0 [ 1090.650763] ? __pfx_shmem_write_begin+0x10/0x10 [ 1090.650792] ? timestamp_truncate+0x1eb/0x2f0 [ 1090.650824] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 1090.650862] ? __pfx_timestamp_truncate+0x10/0x10 [ 1090.650900] generic_perform_write+0x1d7/0x810 [ 1090.650945] ? __pfx_generic_perform_write+0x10/0x10 [ 1090.650996] ? inode_needs_update_time.part.0+0x170/0x270 [ 1090.651040] shmem_file_write_iter+0x111/0x140 [ 1090.651071] vfs_write+0xbe9/0x1150 [ 1090.651107] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 1090.651151] ? __fget_files+0x34/0x3b0 [ 1090.651179] ? __pfx_vfs_write+0x10/0x10 [ 1090.651241] __x64_sys_pwrite64+0x1f1/0x260 [ 1090.651274] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1090.651306] ? fput+0x6a/0x100 [ 1090.651350] do_syscall_64+0xbf/0x390 [ 1090.651388] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1090.651412] RIP: 0033:0x7f1b64b14ab7 [ 1090.651430] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1090.651451] RSP: 002b:00007f1b620d6f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1090.651473] RAX: ffffffffffffffda RBX: 00007f1b64bab970 RCX: 00007f1b64b14ab7 [ 1090.651489] RDX: 000000000000003a RSI: 0000000020001180 RDI: 0000000000000004 [ 1090.651503] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1090.651517] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1090.651530] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1090.651568] [ 1090.707359] loop5: detected capacity change from 0 to 512 [ 1090.739195] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1090.740762] EXT4-fs (loop5): group descriptors corrupted! 01:52:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 8) 01:52:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 16) 01:52:42 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'batadv0\x00', &(0x7f0000000000)=@ethtool_eeprom={0xc, 0x4, 0x20, 0x29, "5955bb75f1082f48d69738cc8d1c00da53e401222c12f4ee761713a3283818293e068223b020801a80"}}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth0_to_hsr\x00', &(0x7f00000000c0)=@ethtool_sset_info={0x37, 0x3ff, 0x450, [0x5, 0x2, 0x9, 0x4067, 0x20, 0x80, 0x4, 0x6]}}) sendmmsg(r0, &(0x7f0000000900)=[{{&(0x7f0000000140)=@tipc=@id={0x1e, 0x3, 0x2, {0x4e23, 0x3}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000001c0)="c983becb0046a1858e6856fa801fda848c636587139dbdedab27d2c8f56e9ef317317b4977f7abaa19e15523c6db813aabcdd6b2bec76b6b95428578de2bf941a9690613b2140c043ef97a5de615988918c6fdac41a26b981c871c1d159ae5dab459ec06831f8098a84e7d654ec50d75fa9cbfb64940b6d063710997b7a942bdb5aebcf3d8cd0317c9be0e6c55090c88ad4de988cf43ad14c8e495a5ddc9f9440aef6cec53569d5e5267f90cdac534b9602f7a3a1a9c7facb0d51f9f3718f08cb58b0c6566d876db2e4b6fc02228dac756d16287828e2c1490956c", 0xdb}, {&(0x7f00000002c0)="56e7c7dbe4551b4cc93033c368765f6c1f57bb2914eec5c723a8638e3006b8ff87195501cdde23c1f4efd694fde0192d85e682c5bf696405c449da92c78858e1f7095400914dbc6155b670964d1c7362008d083e53348ab3bb864f1262908729916ac609a61772d04af3c81cf43b6d425f94a747cce346867fa01c046408ae545b003734de83b91c78e588e69a2770ef3cf3221974b640acb4d56f8b54a87092d2935dbd2011", 0xa6}], 0x2, &(0x7f00000003c0)=[{0xa8, 0xff, 0x200, "930889f6fe6973dae0927c62869aab77f6dab4905d6722a404259d6bf15f37f2402646c50217af707a84923b1fbd9c67913a529861d60a2bda15292020d48c224432f3f576b6823071e34f3bceb5cce9762baac6443ece9befacd4c7d7024785a57e9a9859004cd9aa78d06ff21198199bc0a3f620a4606d214e043ff8bcaa25b0de49fa6622ed5c4085f4ed9ef08704e96d8ca2ba87"}, {0xc0, 0x105, 0x4, "00473728ac4df2a9f56961ba52e0842c8536be3e6affe9f3c1ba60908552432bd410d5f35b487a6f85162a1d29176612cd29e70c0d0872ffe52888d8e7649dbbf221760a230d5bae8f960ee254249e63ebadeb56ceb7c4ae1a84f2cd7e61336fdfd8865ac8c53333005fd4801b42df5448a7148e35f8e3d0c1f52b057b4d9757b899454dace58440b99e0b781f4a4b3d7660a7de6d509515be3f920735bc7d53b1d1f022fbd3e0a2e28358e6d6ce91"}, {0xe8, 0x10b, 0x8, "e81b9f55b8bad9bf8e29d37478b8a619d1c66f34d9fc1cf8eac0f959b470ac89cf228bd333373f50a6f6c300a5393f90f583c90f8b88542529b291ae7f6960bb4470520e86789aa1334ff3720135a402bc1d14e3cb4c10685c6fb668086189b8757bf472f14d5a66a1f830efacc04279e6861f224f9505c4caf0455b88b29c109fefd6cf76d3ed31e6a0d0fb57c61f922ce8f5eb7853762d7aba5b7822f2969ceb9378d3ed9f6872a6e01a553644155c9387074be1b0227a23e5b96ea042bf6828620fc29acf26b5aa395dec7e16502c3daf2c1b10d411"}, {0xd0, 0x119, 0x100, "017d22147c4ef8a53d8651122565f3dc8e6ea00474cfb7f4147c22f531bf1764248884083575310fa48102dc76719493952f6c4a3626b1ced89a1624977809b9af5b1fc11e109a3174de46accc466c891c0d85cfa026b1219e15ce5a5f6581a50e427f7dcbdbabe30291cea42f711059c939313edfdf01eae31fd5fc7c0504a3ba6265e46a68a84961e1d8d17cca0e958f3295437b0b0166513eb0003a3690abcf0098906ce6b74d86e17da03b0127f4c03d0375a8b8d07d5f4972bc61c2"}, {0x78, 0x105, 0x2, "50e283ace97c6fbffe09abddd3718fd4db0f96d59aaed7b3db5cb7a37ec29d543f85cb60e9808e74ddec82dc34be1d39421407ef3891da6b1e3c87de353831410f42bf8b3023399caaae6979e33412a7bfc1781e91869963bc67f4facd3902eaf57350"}], 0x398}}, {{&(0x7f0000000780)=@generic={0x27, "2d5802d19aac0758c409eb4b2e75b9f61baaf28777a58e43e1c3462f0f02fe2e6fa5aff0b4704ee289c4c03beefda8cb73065304226db5312df602a020798a3cffa09a697d80a68d4b1066128312f0cd08b376639bc5eecd4274397cb67e5ecf2b6102fdd18e62a19e56e1c8c772e5ea71cf010c8b7d41f5bdffa0375855"}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000800)="ccef4138e4ab53367a38d8a4a9f7ac437e94ee75797fd79e62424218d89232d46cb16c3b226471e2b14b64127fcba27f819c5110bb21cef90270617b6e6e08f9ddf221dc00d8575eebb0dab3c2d48e189009339a1c2086c5e372b3b559ef93aa6301d95b77", 0x65}, {&(0x7f0000000880)="8a4a17db1fc44e67dd04d7d5", 0xc}], 0x2}}], 0x2, 0x20) 01:52:42 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 13) 01:52:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r2, r3, 0x0) keyctl$revoke(0x3, r3) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r0, r1, 0x0) 01:52:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000500), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x23}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000300)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r1, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFTYPE={0x8, 0x5, 0xffffffffffffffff}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x2c}}, 0x2000001) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:52:42 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x14000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:52:42 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0xaafa932b00000000) [ 1100.057958] FAULT_INJECTION: forcing a failure. [ 1100.057958] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1100.059019] CPU: 0 UID: 0 PID: 8862 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1100.059035] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1100.059042] Call Trace: [ 1100.059047] [ 1100.059051] dump_stack_lvl+0xfa/0x120 [ 1100.059074] should_fail_ex+0x4d7/0x5e0 [ 1100.059088] ? page_copy_sane+0xce/0x2b0 [ 1100.059105] copy_folio_from_iter_atomic+0x3d3/0x18c0 [ 1100.059137] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 1100.059153] ? shmem_write_begin+0x15e/0x2e0 [ 1100.059172] ? __pfx_shmem_write_begin+0x10/0x10 [ 1100.059187] ? timestamp_truncate+0x1eb/0x2f0 [ 1100.059204] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 1100.059224] ? __pfx_timestamp_truncate+0x10/0x10 [ 1100.059245] generic_perform_write+0x1d7/0x810 [ 1100.059268] ? __pfx_generic_perform_write+0x10/0x10 [ 1100.059285] ? inode_needs_update_time.part.0+0x170/0x270 [ 1100.059308] shmem_file_write_iter+0x111/0x140 [ 1100.059323] vfs_write+0xbe9/0x1150 [ 1100.059341] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 1100.059354] ? __fget_files+0x34/0x3b0 [ 1100.059368] ? __pfx_vfs_write+0x10/0x10 [ 1100.059401] __x64_sys_pwrite64+0x1f1/0x260 [ 1100.059418] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1100.059434] ? fput+0x6a/0x100 [ 1100.059457] do_syscall_64+0xbf/0x390 [ 1100.059478] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1100.059490] RIP: 0033:0x7f1b64b14ab7 [ 1100.059500] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1100.059511] RSP: 002b:00007f1b620d6f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1100.059523] RAX: ffffffffffffffda RBX: 00007f1b64bab970 RCX: 00007f1b64b14ab7 [ 1100.059530] RDX: 0000000000000001 RSI: 0000000020010200 RDI: 0000000000000004 [ 1100.059537] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1100.059545] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 1100.059552] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1100.059571] [ 1100.113198] FAULT_INJECTION: forcing a failure. [ 1100.113198] name failslab, interval 1, probability 0, space 0, times 0 [ 1100.114848] CPU: 1 UID: 0 PID: 8869 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1100.114879] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1100.114891] Call Trace: [ 1100.114900] [ 1100.114909] dump_stack_lvl+0xfa/0x120 [ 1100.114947] should_fail_ex+0x4d7/0x5e0 [ 1100.114978] ? __d_alloc+0x31/0xa10 [ 1100.115007] should_failslab+0xc2/0x120 [ 1100.115039] kmem_cache_alloc_lru_noprof+0x84/0x690 [ 1100.115063] ? find_held_lock+0x2b/0x80 [ 1100.115098] ? __d_alloc+0x31/0xa10 [ 1100.115134] __d_alloc+0x31/0xa10 [ 1100.115162] ? mpol_shared_policy_init+0x24f/0x390 [ 1100.115194] d_alloc_pseudo+0x1d/0xc0 [ 1100.115216] alloc_file_pseudo+0xbe/0x220 [ 1100.115256] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1100.115292] ? __shmem_get_inode+0x682/0xe80 [ 1100.115330] __shmem_file_setup+0x1a7/0x370 [ 1100.115355] ? alloc_fd+0x2c1/0x560 [ 1100.115385] alloc_file+0x2ae/0x590 [ 1100.115416] __x64_sys_memfd_create+0x193/0x280 [ 1100.115444] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1100.115483] do_syscall_64+0xbf/0x390 [ 1100.115520] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1100.115544] RIP: 0033:0x7fd2e6305b19 [ 1100.115561] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1100.115581] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1100.115603] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6305b19 [ 1100.115617] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007fd2e635f0fb [ 1100.115631] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1100.115644] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1100.115657] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1100.115693] [ 1100.120581] loop5: detected capacity change from 0 to 512 01:52:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000500), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x23}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000300)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r1, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFTYPE={0x8, 0x5, 0xffffffffffffffff}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x2c}}, 0x2000001) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) [ 1100.143513] loop7: detected capacity change from 0 to 512 [ 1100.166696] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1100.168488] EXT4-fs (loop7): group descriptors corrupted! [ 1100.212594] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1100.213536] EXT4-fs (loop5): group descriptors corrupted! 01:52:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 17) 01:52:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 9) 01:52:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000500), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x23}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000300)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r1, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFTYPE={0x8, 0x5, 0xffffffffffffffff}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x2c}}, 0x2000001) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:52:42 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, r0, r2, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x208, 0x101, 0x0, 0x9, 0x1, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r5 = epoll_create(0xe9) add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, r1) epoll_ctl$EPOLL_CTL_ADD(r5, 0x2, r4, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x98, 0x0, 0x5, 0x2, 0x0, 0x0, 0x40, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xad2, 0x4, @perf_config_ext={0x3fc0000000000, 0x9}, 0x1240, 0x8, 0x80000001, 0xd, 0x8, 0x2, 0x2, 0x0, 0x6c, 0x0, 0x7}, 0x0, 0x2, r4, 0x1) r6 = request_key(&(0x7f0000000300)='cifs.idmap\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)='\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r6) 01:52:42 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 14) 01:52:42 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x15000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:52:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) keyctl$search(0xa, r5, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x3}, r1) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 1100.371488] FAULT_INJECTION: forcing a failure. [ 1100.371488] name failslab, interval 1, probability 0, space 0, times 0 [ 1100.373191] CPU: 1 UID: 0 PID: 8890 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1100.373220] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1100.373233] Call Trace: [ 1100.373241] [ 1100.373250] dump_stack_lvl+0xfa/0x120 [ 1100.373286] should_fail_ex+0x4d7/0x5e0 [ 1100.373317] ? getname_flags.part.0+0x48/0x540 [ 1100.373338] should_failslab+0xc2/0x120 [ 1100.373370] kmem_cache_alloc_noprof+0x80/0x690 [ 1100.373405] ? getname_flags.part.0+0x48/0x540 [ 1100.373425] getname_flags.part.0+0x48/0x540 [ 1100.373453] getname_flags+0x95/0xe0 [ 1100.373483] do_sys_openat2+0x9f/0x1b0 [ 1100.373505] ? __pfx_do_sys_openat2+0x10/0x10 [ 1100.373545] __x64_sys_openat+0x142/0x200 [ 1100.373568] ? __pfx___x64_sys_openat+0x10/0x10 [ 1100.373595] ? fput+0x6a/0x100 [ 1100.373637] do_syscall_64+0xbf/0x390 [ 1100.373674] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1100.373697] RIP: 0033:0x7f1b64b14a04 [ 1100.373713] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1100.373733] RSP: 002b:00007f1b620d6ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1100.373754] RAX: ffffffffffffffda RBX: 00007f1b64bab970 RCX: 00007f1b64b14a04 [ 1100.373769] RDX: 0000000000000002 RSI: 00007f1b620d7000 RDI: 00000000ffffff9c [ 1100.373782] RBP: 00007f1b620d7000 R08: 0000000000000000 R09: ffffffffffffffff [ 1100.373796] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1100.373808] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1100.373843] [ 1100.433766] loop2: detected capacity change from 0 to 512 [ 1100.463615] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1100.465303] EXT4-fs (loop2): group descriptors corrupted! 01:52:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000500), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x23}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000300)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r1, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFTYPE={0x8, 0x5, 0xffffffffffffffff}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x2c}}, 0x2000001) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) [ 1100.480040] FAULT_INJECTION: forcing a failure. [ 1100.480040] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1100.481822] CPU: 1 UID: 0 PID: 8902 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1100.481852] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1100.481864] Call Trace: [ 1100.481872] [ 1100.481881] dump_stack_lvl+0xfa/0x120 [ 1100.481918] should_fail_ex+0x4d7/0x5e0 [ 1100.481950] should_fail_alloc_page+0xe0/0x110 [ 1100.481985] prepare_alloc_pages+0x1eb/0x550 [ 1100.482023] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 1100.482058] ? find_held_lock+0x2b/0x80 [ 1100.482086] ? lock_release+0xc8/0x290 [ 1100.482126] ? 0xffffffffa0000000 [ 1100.482147] ? perf_trace_lock_acquire+0xc9/0x700 [ 1100.482181] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1100.482221] ? perf_trace_lock+0xb5/0x5d0 [ 1100.482258] ? __pfx_perf_trace_lock+0x10/0x10 [ 1100.482289] ? lock_is_held_type+0x9e/0x120 [ 1100.482324] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1100.482363] ? policy_nodemask+0xeb/0x4e0 [ 1100.482390] alloc_pages_mpol+0xed/0x340 [ 1100.482414] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1100.482433] ? filemap_get_entry+0x1bb/0x3b0 [ 1100.482465] ? __pfx_filemap_get_entry+0x10/0x10 [ 1100.482507] folio_alloc_mpol_noprof+0x38/0xa0 01:52:42 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x77010000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1100.482537] shmem_alloc_folio+0x11b/0x140 [ 1100.482567] shmem_get_folio_gfp.constprop.0+0x4ea/0x13a0 [ 1100.482614] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 1100.482652] ? __pfx_perf_trace_lock+0x10/0x10 [ 1100.482683] ? simple_xattr_get+0x173/0x1d0 [ 1100.482736] shmem_write_begin+0x147/0x2e0 [ 1100.482770] ? __pfx_shmem_write_begin+0x10/0x10 [ 1100.482797] ? timestamp_truncate+0x1eb/0x2f0 [ 1100.482828] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 1100.482864] ? __pfx_timestamp_truncate+0x10/0x10 [ 1100.482904] generic_perform_write+0x391/0x810 [ 1100.482949] ? __pfx_generic_perform_write+0x10/0x10 [ 1100.482979] ? inode_needs_update_time.part.0+0x170/0x270 [ 1100.483022] shmem_file_write_iter+0x111/0x140 [ 1100.483051] vfs_write+0xbe9/0x1150 [ 1100.483082] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 1100.483108] ? __fget_files+0x34/0x3b0 [ 1100.483134] ? __pfx_vfs_write+0x10/0x10 [ 1100.483194] __x64_sys_pwrite64+0x1f1/0x260 [ 1100.483226] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1100.483270] do_syscall_64+0xbf/0x390 [ 1100.483306] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1100.483328] RIP: 0033:0x7f94bafa2ab7 [ 1100.483344] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1100.483364] RSP: 002b:00007f94b8564f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1100.483385] RAX: ffffffffffffffda RBX: 00007f94bb039970 RCX: 00007f94bafa2ab7 [ 1100.483400] RDX: 000000000000003a RSI: 0000000020001180 RDI: 0000000000000004 [ 1100.483413] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1100.483426] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1100.483439] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1100.483476] 01:52:42 executing program 6: r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x800) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000100), 0x2) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) 01:52:42 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r2, 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000380)=0xc2fb, 0x80) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, r1, r1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r5, 0x29, 0x43, 0x0, &(0x7f00000000c0)) add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, r4) add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "527ee3512ea16b50815c550cd9640b1ebdbe9bbc37eb8cacfc704db304b135d0426000ff18ab73994052c3ebd82cc4ef6adba051b96170e18e099d33807f1e43", 0x3e}, 0x48, r3) keyctl$KEYCTL_MOVE(0x1e, r4, r1, r3, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) [ 1100.653108] loop7: detected capacity change from 0 to 512 [ 1100.668617] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 01:52:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffef7, 0x7b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc, 0x0, 0x4, 0x6ac}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:52:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 15) 01:52:52 executing program 6: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) 01:52:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 18) 01:52:52 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x80ffffff, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:52:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000500), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x23}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000300)={'wpan3\x00'}) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:52:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) 01:52:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 10) [ 1109.948499] FAULT_INJECTION: forcing a failure. [ 1109.948499] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1109.949575] CPU: 0 UID: 0 PID: 8935 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1109.949593] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1109.949600] Call Trace: [ 1109.949604] [ 1109.949609] dump_stack_lvl+0xfa/0x120 [ 1109.949632] should_fail_ex+0x4d7/0x5e0 [ 1109.949646] ? page_copy_sane+0xce/0x2b0 [ 1109.949663] copy_folio_from_iter_atomic+0x3d3/0x18c0 [ 1109.949686] ? simple_xattr_get+0x173/0x1d0 [ 1109.949708] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 1109.949723] ? shmem_write_begin+0x15e/0x2e0 [ 1109.949743] ? __pfx_shmem_write_begin+0x10/0x10 [ 1109.949758] ? timestamp_truncate+0x1eb/0x2f0 [ 1109.949776] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 1109.949796] ? __pfx_timestamp_truncate+0x10/0x10 [ 1109.949816] generic_perform_write+0x1d7/0x810 [ 1109.949839] ? __pfx_generic_perform_write+0x10/0x10 [ 1109.949856] ? inode_needs_update_time.part.0+0x170/0x270 [ 1109.949879] shmem_file_write_iter+0x111/0x140 [ 1109.949894] vfs_write+0xbe9/0x1150 [ 1109.949911] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 1109.949925] ? __fget_files+0x34/0x3b0 [ 1109.949939] ? __pfx_vfs_write+0x10/0x10 [ 1109.949971] __x64_sys_pwrite64+0x1f1/0x260 [ 1109.949989] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1109.950005] ? fput+0x6a/0x100 [ 1109.950028] do_syscall_64+0xbf/0x390 [ 1109.950050] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1109.950063] RIP: 0033:0x7f94bafa2ab7 [ 1109.950072] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1109.950083] RSP: 002b:00007f94b8564f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1109.950095] RAX: ffffffffffffffda RBX: 00007f94bb039970 RCX: 00007f94bafa2ab7 [ 1109.950103] RDX: 000000000000003a RSI: 0000000020001180 RDI: 0000000000000004 [ 1109.950115] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1109.950122] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1109.950129] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1109.950149] [ 1109.968656] loop5: detected capacity change from 0 to 512 [ 1109.984152] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1109.984942] EXT4-fs (loop5): group descriptors corrupted! [ 1110.012467] FAULT_INJECTION: forcing a failure. [ 1110.012467] name failslab, interval 1, probability 0, space 0, times 0 [ 1110.014192] CPU: 1 UID: 0 PID: 8946 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1110.014222] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1110.014234] Call Trace: [ 1110.014242] [ 1110.014251] dump_stack_lvl+0xfa/0x120 [ 1110.014290] should_fail_ex+0x4d7/0x5e0 [ 1110.014322] ? alloc_empty_file+0x58/0x1e0 [ 1110.014357] should_failslab+0xc2/0x120 [ 1110.014389] kmem_cache_alloc_noprof+0x80/0x690 [ 1110.014412] ? d_instantiate+0x79/0xa0 [ 1110.014453] ? alloc_empty_file+0x58/0x1e0 [ 1110.014498] alloc_empty_file+0x58/0x1e0 [ 1110.014536] alloc_file_pseudo+0x12b/0x220 [ 1110.014574] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1110.014623] __shmem_file_setup+0x1a7/0x370 [ 1110.014649] ? alloc_fd+0x2c1/0x560 [ 1110.014680] alloc_file+0x2ae/0x590 [ 1110.014710] __x64_sys_memfd_create+0x193/0x280 [ 1110.014738] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1110.014777] do_syscall_64+0xbf/0x390 [ 1110.014814] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1110.014837] RIP: 0033:0x7fd2e6305b19 [ 1110.014854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1110.014875] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1110.014896] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6305b19 01:52:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000500), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x23}]}, 0x1c}}, 0x0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) [ 1110.014911] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007fd2e635f0fb [ 1110.014924] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1110.014937] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1110.014950] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1110.014986] [ 1110.035735] loop7: detected capacity change from 0 to 512 01:52:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 19) [ 1110.070409] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1110.071406] EXT4-fs (loop7): group descriptors corrupted! [ 1110.092233] Process accounting resumed [ 1110.117202] FAULT_INJECTION: forcing a failure. [ 1110.117202] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1110.118285] CPU: 0 UID: 0 PID: 8953 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1110.118302] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1110.118310] Call Trace: [ 1110.118314] [ 1110.118319] dump_stack_lvl+0xfa/0x120 [ 1110.118342] should_fail_ex+0x4d7/0x5e0 [ 1110.118360] strncpy_from_user+0x3b/0x2f0 [ 1110.118382] getname_flags.part.0+0x8d/0x540 [ 1110.118398] getname_flags+0x95/0xe0 [ 1110.118413] do_sys_openat2+0x9f/0x1b0 [ 1110.118426] ? __pfx_do_sys_openat2+0x10/0x10 [ 1110.118448] __x64_sys_openat+0x142/0x200 [ 1110.118460] ? __pfx___x64_sys_openat+0x10/0x10 [ 1110.118493] do_syscall_64+0xbf/0x390 [ 1110.118513] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1110.118527] RIP: 0033:0x7f1b64b14a04 [ 1110.118536] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1110.118548] RSP: 002b:00007f1b620d6ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1110.118559] RAX: ffffffffffffffda RBX: 00007f1b64bab970 RCX: 00007f1b64b14a04 [ 1110.118567] RDX: 0000000000000002 RSI: 00007f1b620d7000 RDI: 00000000ffffff9c [ 1110.118574] RBP: 00007f1b620d7000 R08: 0000000000000000 R09: ffffffffffffffff [ 1110.118582] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1110.118588] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1110.118607] 01:53:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x2}, r1) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:53:01 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) 01:53:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 11) 01:53:01 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x9effffff, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:53:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 16) 01:53:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 20) 01:53:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000500), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:53:01 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key$user(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="946e8e05f44a5bf4bbeb", 0xa, 0xfffffffffffffff9) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) add_key$user(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)="8f5a78ecef3fba78efb6de3e591afe1f15b129a4860d9e7bdf6bed4b63e508f6ca5a6acc1a02b2adf2c14015f34e2ec0ba8f7b8e9182ed5b4bb0cf5790fc2b7bc2a52ae24fe6c30799342200b34f6d3050ea13124ccf1c9ff0bd39f955f62a120ad7c71497ae3de7bc5ac4a8a081d271778906c845b6e130fa13011f6556f350c475358abef874b3bbd274bab4637544b0ccfc81dc785de27a86b85e8896ed8cedcc5771c571ceee5e5b3d48278ecdc9eba8aa83c82a07be2b9138c049e86097aa1f5982ba78e036a405157b58abfeb23ca0637d199681b477af9e0cc0bead072890e2d726b84daafc5368", 0xeb, r1) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) [ 1119.572378] FAULT_INJECTION: forcing a failure. [ 1119.572378] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.573353] CPU: 0 UID: 0 PID: 8970 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1119.573369] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1119.573377] Call Trace: [ 1119.573381] [ 1119.573386] dump_stack_lvl+0xfa/0x120 [ 1119.573409] should_fail_ex+0x4d7/0x5e0 [ 1119.573427] ? alloc_empty_file+0x58/0x1e0 [ 1119.573446] should_failslab+0xc2/0x120 [ 1119.573465] kmem_cache_alloc_noprof+0x80/0x690 [ 1119.573478] ? __is_insn_slot_addr+0x140/0x290 [ 1119.573499] ? alloc_empty_file+0x58/0x1e0 [ 1119.573517] alloc_empty_file+0x58/0x1e0 [ 1119.573537] path_openat+0xe0/0x2880 [ 1119.573553] ? perf_trace_lock_acquire+0xc9/0x700 [ 1119.573571] ? perf_trace_lock_acquire+0xc9/0x700 [ 1119.573594] ? __pfx_path_openat+0x10/0x10 [ 1119.573609] ? perf_trace_lock_acquire+0xc9/0x700 [ 1119.573632] do_filp_open+0x1e8/0x450 [ 1119.573647] ? __pfx_do_filp_open+0x10/0x10 [ 1119.573671] ? find_held_lock+0x2b/0x80 [ 1119.573683] ? alloc_fd+0x2c1/0x560 [ 1119.573697] ? lock_release+0xc8/0x290 [ 1119.573716] ? _raw_spin_unlock+0x1e/0x40 [ 1119.573731] ? alloc_fd+0x2c1/0x560 [ 1119.573752] do_sys_openat2+0x104/0x1b0 [ 1119.573764] ? __pfx_do_sys_openat2+0x10/0x10 [ 1119.573785] __x64_sys_openat+0x142/0x200 [ 1119.573797] ? __pfx___x64_sys_openat+0x10/0x10 [ 1119.573812] ? fput+0x6a/0x100 [ 1119.573834] do_syscall_64+0xbf/0x390 [ 1119.573853] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1119.573866] RIP: 0033:0x7f1b64b14a04 [ 1119.573875] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1119.573888] RSP: 002b:00007f1b620d6ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1119.573901] RAX: ffffffffffffffda RBX: 00007f1b64bab970 RCX: 00007f1b64b14a04 [ 1119.573911] RDX: 0000000000000002 RSI: 00007f1b620d7000 RDI: 00000000ffffff9c [ 1119.573919] RBP: 00007f1b620d7000 R08: 0000000000000000 R09: ffffffffffffffff [ 1119.573926] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1119.573933] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1119.573952] [ 1119.604868] FAULT_INJECTION: forcing a failure. [ 1119.604868] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1119.606909] CPU: 1 UID: 0 PID: 8975 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1119.606942] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1119.606955] Call Trace: [ 1119.606963] [ 1119.606972] dump_stack_lvl+0xfa/0x120 [ 1119.607011] should_fail_ex+0x4d7/0x5e0 [ 1119.607036] ? page_copy_sane+0xce/0x2b0 [ 1119.607066] copy_folio_from_iter_atomic+0x3d3/0x18c0 [ 1119.607129] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 1119.607160] ? shmem_write_begin+0x15e/0x2e0 [ 1119.607195] ? __pfx_shmem_write_begin+0x10/0x10 [ 1119.607225] ? timestamp_truncate+0x1eb/0x2f0 [ 1119.607258] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 1119.607297] ? __pfx_timestamp_truncate+0x10/0x10 [ 1119.607337] generic_perform_write+0x1d7/0x810 [ 1119.607382] ? __pfx_generic_perform_write+0x10/0x10 [ 1119.607415] ? inode_needs_update_time.part.0+0x170/0x270 [ 1119.607461] shmem_file_write_iter+0x111/0x140 [ 1119.607492] vfs_write+0xbe9/0x1150 [ 1119.607524] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 1119.607552] ? __fget_files+0x34/0x3b0 [ 1119.607580] ? __pfx_vfs_write+0x10/0x10 [ 1119.607643] __x64_sys_pwrite64+0x1f1/0x260 [ 1119.607677] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1119.607709] ? fput+0x6a/0x100 [ 1119.607755] do_syscall_64+0xbf/0x390 [ 1119.607794] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1119.607817] RIP: 0033:0x7f94bafa2ab7 [ 1119.607835] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1119.607857] RSP: 002b:00007f94b8564f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1119.607879] RAX: ffffffffffffffda RBX: 00007f94bb039970 RCX: 00007f94bafa2ab7 [ 1119.607895] RDX: 0000000000000001 RSI: 0000000020010200 RDI: 0000000000000004 [ 1119.607909] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1119.607923] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 1119.607936] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1119.607977] [ 1119.666741] loop2: detected capacity change from 0 to 512 01:53:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 21) 01:53:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:53:01 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xa6ffffff, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1119.687099] loop7: detected capacity change from 0 to 512 [ 1119.690246] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1119.691936] EXT4-fs (loop2): group descriptors corrupted! [ 1119.721400] loop5: detected capacity change from 0 to 512 [ 1119.734078] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1119.735019] EXT4-fs (loop5): group descriptors corrupted! [ 1119.741479] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1119.743267] EXT4-fs (loop7): group descriptors corrupted! 01:53:01 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000003010101000000000000000003000001140005800e0001007369702d32303030300000001400170000000003000000525200000081"], 0x3c}, 0x1, 0x0, 0x0, 0x48014}, 0x4000841) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=@delpolicy={0x78, 0x14, 0x200, 0x70bd25, 0x25dfdbfc, {{@in=@broadcast, @in=@multicast1, 0x4e22, 0x7f, 0x4e24, 0x2, 0xa, 0x20, 0x80, 0x1, 0x0, 0xffffffffffffffff}, 0x6e6bb6}, [@mark={0xc, 0x15, {0x35075c, 0x4}}, @coaddr={0x14, 0xe, @in=@empty}, @replay_thresh={0x8, 0xb, 0x2}]}, 0x78}, 0x1, 0x0, 0x0, 0x40000}, 0xd000) 01:53:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000340), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r3 = request_key(&(0x7f0000000280)='trusted\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='$+-\x00', 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r3, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r0, r4, 0x0) 01:53:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 22) 01:53:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:53:01 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xc00e0000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:53:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 12) [ 1119.873637] FAULT_INJECTION: forcing a failure. [ 1119.873637] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.874582] CPU: 0 UID: 0 PID: 8998 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1119.874598] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1119.874606] Call Trace: [ 1119.874610] [ 1119.874615] dump_stack_lvl+0xfa/0x120 [ 1119.874638] should_fail_ex+0x4d7/0x5e0 [ 1119.874655] ? security_file_alloc+0x35/0x130 [ 1119.874673] should_failslab+0xc2/0x120 [ 1119.874691] kmem_cache_alloc_noprof+0x80/0x690 [ 1119.874704] ? __create_object+0x59/0x80 [ 1119.874720] ? security_file_alloc+0x35/0x130 [ 1119.874736] security_file_alloc+0x35/0x130 [ 1119.874754] init_file+0x95/0x4c0 [ 1119.874775] alloc_empty_file+0x76/0x1e0 [ 1119.874795] path_openat+0xe0/0x2880 [ 1119.874811] ? perf_trace_lock_acquire+0xc9/0x700 [ 1119.874831] ? perf_trace_lock_acquire+0xc9/0x700 [ 1119.874854] ? __pfx_path_openat+0x10/0x10 [ 1119.874869] ? perf_trace_lock_acquire+0xc9/0x700 [ 1119.874891] do_filp_open+0x1e8/0x450 [ 1119.874906] ? __pfx_do_filp_open+0x10/0x10 [ 1119.874930] ? find_held_lock+0x2b/0x80 [ 1119.874942] ? alloc_fd+0x2c1/0x560 [ 1119.874956] ? lock_release+0xc8/0x290 [ 1119.874976] ? _raw_spin_unlock+0x1e/0x40 [ 1119.874990] ? alloc_fd+0x2c1/0x560 [ 1119.875011] do_sys_openat2+0x104/0x1b0 [ 1119.875022] ? __pfx_do_sys_openat2+0x10/0x10 [ 1119.875044] __x64_sys_openat+0x142/0x200 [ 1119.875056] ? __pfx___x64_sys_openat+0x10/0x10 [ 1119.875070] ? fput+0x6a/0x100 [ 1119.875093] do_syscall_64+0xbf/0x390 [ 1119.875116] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1119.875129] RIP: 0033:0x7f1b64b14a04 [ 1119.875138] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1119.875150] RSP: 002b:00007f1b620d6ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1119.875161] RAX: ffffffffffffffda RBX: 00007f1b64bab970 RCX: 00007f1b64b14a04 [ 1119.875169] RDX: 0000000000000002 RSI: 00007f1b620d7000 RDI: 00000000ffffff9c [ 1119.875177] RBP: 00007f1b620d7000 R08: 0000000000000000 R09: ffffffffffffffff [ 1119.875184] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1119.875191] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1119.875210] 01:53:02 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 17) 01:53:02 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xf0ffffff, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1119.959089] FAULT_INJECTION: forcing a failure. [ 1119.959089] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.961556] CPU: 1 UID: 0 PID: 9006 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1119.961589] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1119.961602] Call Trace: [ 1119.961610] [ 1119.961619] dump_stack_lvl+0xfa/0x120 [ 1119.961660] should_fail_ex+0x4d7/0x5e0 [ 1119.961693] ? security_file_alloc+0x35/0x130 [ 1119.961726] should_failslab+0xc2/0x120 [ 1119.961760] kmem_cache_alloc_noprof+0x80/0x690 [ 1119.961784] ? __create_object+0x59/0x80 [ 1119.961815] ? security_file_alloc+0x35/0x130 [ 1119.961846] security_file_alloc+0x35/0x130 [ 1119.961880] init_file+0x95/0x4c0 [ 1119.961920] alloc_empty_file+0x76/0x1e0 [ 1119.961960] alloc_file_pseudo+0x12b/0x220 [ 1119.962001] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1119.962054] __shmem_file_setup+0x1a7/0x370 [ 1119.962082] ? alloc_fd+0x2c1/0x560 [ 1119.962121] alloc_file+0x2ae/0x590 [ 1119.962153] __x64_sys_memfd_create+0x193/0x280 [ 1119.962183] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 1119.962235] do_syscall_64+0xbf/0x390 [ 1119.962275] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1119.962299] RIP: 0033:0x7fd2e6305b19 [ 1119.962318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1119.962339] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1119.962362] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6305b19 [ 1119.962378] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007fd2e635f0fb [ 1119.962392] RBP: 0000000000000002 R08: 0000000000000800 R09: ffffffffffffffff [ 1119.962406] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 1119.962420] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 1119.962459] [ 1119.963098] FAULT_INJECTION: forcing a failure. [ 1119.963098] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.979092] CPU: 0 UID: 0 PID: 9007 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1119.979111] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1119.979118] Call Trace: [ 1119.979122] [ 1119.979126] dump_stack_lvl+0xfa/0x120 [ 1119.979144] should_fail_ex+0x4d7/0x5e0 [ 1119.979160] ? getname_flags.part.0+0x48/0x540 [ 1119.979170] should_failslab+0xc2/0x120 [ 1119.979187] kmem_cache_alloc_noprof+0x80/0x690 [ 1119.979205] ? getname_flags.part.0+0x48/0x540 [ 1119.979216] getname_flags.part.0+0x48/0x540 [ 1119.979230] getname_flags+0x95/0xe0 [ 1119.979245] do_sys_openat2+0x9f/0x1b0 [ 1119.979257] ? __pfx_do_sys_openat2+0x10/0x10 [ 1119.979278] __x64_sys_openat+0x142/0x200 [ 1119.979290] ? __pfx___x64_sys_openat+0x10/0x10 [ 1119.979305] ? fput+0x6a/0x100 [ 1119.979328] do_syscall_64+0xbf/0x390 [ 1119.979347] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1119.979358] RIP: 0033:0x7f94bafa2a04 [ 1119.979367] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1119.979378] RSP: 002b:00007f94b8564ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1119.979389] RAX: ffffffffffffffda RBX: 00007f94bb039970 RCX: 00007f94bafa2a04 [ 1119.979397] RDX: 0000000000000002 RSI: 00007f94b8565000 RDI: 00000000ffffff9c [ 1119.979404] RBP: 00007f94b8565000 R08: 0000000000000000 R09: ffffffffffffffff [ 1119.979411] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1119.979418] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1119.979437] 01:53:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:53:02 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0xbc, 0x0, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'netpci0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'vcan0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:hwclock_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2d, 0x7, 'system_u:object_r:hald_sonypic_exec_t:s0\x00'}]}, 0xbc}, 0x1, 0x0, 0x0, 0x40110}, 0x4000) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) 01:53:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) r3 = add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000280)={0x0, 0x0, @d}, 0x18, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r2, 0x1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, 0x0, &(0x7f00000002c0)) 01:53:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:53:12 executing program 0: copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0x2, 0xffffffffffffffff, &(0x7f0000000500)=0x1, 0x20, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x12, 0x3d, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0xffffffff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = add_key$keyring(&(0x7f0000000540), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$user(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000280)="04b935cf1fb71a614037e29a70847efa1f9a05579a4cb0081bc30367453952ae9eb0909af40bf6a9c4d34175b26620b287e184aa7776cb91eb2f232c2bb0c64ac8e4ed628045cfe2d9f115f1b9e6d2b6c39e8471b50514ab864692410f9b9fe270b9497f294e92f86209e06c56d5aacab44a9d388040e1c63e400b5ef7bb4032d63930d72fac15ec7f476bea56551f63df", 0x91, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r2, r3, 0x0) keyctl$revoke(0x3, r3) add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000340)='big_key\x00', &(0x7f0000000380)={'syz', 0x2}, r5) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 01:53:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 23) 01:53:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 13) 01:53:12 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xfffff000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:53:12 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 18) 01:53:12 executing program 6: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x0, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x1005}, 0x4) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000010201e99c5867b7dd193e0002000003c0a955c237aba8b04d8c55459c227ec9fd6dddeb6fea691eb851f8155a339719cbff88d9be745799642b3e21cfee069d3d12707b9f4dc4af7ad2e2502fdc15f084f8c345160188d18d14f6799fee0cd92dbaa78d4a02926f6c7a1f13140aea534dbbe189d10a858a19abb176"], 0x14}, 0x1, 0x0, 0x0, 0x4004040}, 0x4044000) [ 1130.340310] loop7: detected capacity change from 0 to 512 [ 1130.346536] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1130.347565] EXT4-fs (loop7): group descriptors corrupted! 01:53:12 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 19) [ 1130.402376] loop5: detected capacity change from 0 to 512 [ 1130.404764] loop2: detected capacity change from 0 to 512 [ 1130.427158] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1130.427996] EXT4-fs (loop2): group descriptors corrupted! [ 1130.432979] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1130.434640] EXT4-fs (loop5): group descriptors corrupted! 01:53:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000280)="2c78b4e90c87f74764da5a0d5994d3d8a40fad9f35d8fa1c39aa60a55912f413a61ba380815909fdba6376aba1b3f7be085c7260e52be5c2c5b8ce5b6661b4b7219c65f28b6baeffaa8145bca7bbce39013aeabe841205049e6baaf872ce0b98419c19b15df7d12a542eb261da985be26edfe53aded10f4ceef206014a62389fd2", 0x81, r1) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, r0, r2, 0x0) 01:53:12 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r2, 0x2, r1, 0x0) r3 = syz_open_dev$rtc(&(0x7f0000000340), 0x6, 0x101000) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000380)={0xa0000002}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r4) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r4) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r7 = request_key(&(0x7f0000000280)='logon\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='keyring\x00', 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r6, r4, r5, 0x0) 01:53:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 14) 01:53:12 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xffffff7f, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1130.525024] FAULT_INJECTION: forcing a failure. [ 1130.525024] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1130.526884] CPU: 1 UID: 0 PID: 9048 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1130.526916] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1130.526929] Call Trace: [ 1130.526937] [ 1130.526947] dump_stack_lvl+0xfa/0x120 [ 1130.526987] should_fail_ex+0x4d7/0x5e0 [ 1130.527021] strncpy_from_user+0x3b/0x2f0 [ 1130.527063] getname_flags.part.0+0x8d/0x540 [ 1130.527092] getname_flags+0x95/0xe0 [ 1130.527130] do_sys_openat2+0x9f/0x1b0 [ 1130.527153] ? __pfx_do_sys_openat2+0x10/0x10 [ 1130.527196] __x64_sys_openat+0x142/0x200 [ 1130.527220] ? __pfx___x64_sys_openat+0x10/0x10 [ 1130.527248] ? fput+0x6a/0x100 [ 1130.527293] do_syscall_64+0xbf/0x390 [ 1130.527332] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1130.527356] RIP: 0033:0x7f94bafa2a04 [ 1130.527375] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1130.527396] RSP: 002b:00007f94b8564ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1130.527419] RAX: ffffffffffffffda RBX: 00007f94bb039970 RCX: 00007f94bafa2a04 [ 1130.527435] RDX: 0000000000000002 RSI: 00007f94b8565000 RDI: 00000000ffffff9c [ 1130.527449] RBP: 00007f94b8565000 R08: 0000000000000000 R09: ffffffffffffffff [ 1130.527463] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1130.527477] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1130.527515] [ 1130.548280] FAULT_INJECTION: forcing a failure. [ 1130.548280] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1130.549625] CPU: 0 UID: 0 PID: 9055 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1130.549642] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1130.549648] Call Trace: [ 1130.549652] [ 1130.549657] dump_stack_lvl+0xfa/0x120 [ 1130.549676] should_fail_ex+0x4d7/0x5e0 [ 1130.549694] should_fail_alloc_page+0xe0/0x110 [ 1130.549713] prepare_alloc_pages+0x1eb/0x550 [ 1130.549734] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 1130.549753] ? find_held_lock+0x2b/0x80 [ 1130.549770] ? lock_release+0xc8/0x290 [ 1130.549788] ? 0xffffffffa0000000 [ 1130.549799] ? perf_trace_lock_acquire+0xc9/0x700 [ 1130.549817] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1130.549838] ? perf_trace_lock+0xb5/0x5d0 [ 1130.549858] ? __pfx_perf_trace_lock+0x10/0x10 [ 1130.549875] ? lock_is_held_type+0x9e/0x120 [ 1130.549894] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1130.549915] ? policy_nodemask+0xeb/0x4e0 [ 1130.549931] alloc_pages_mpol+0xed/0x340 [ 1130.549943] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1130.549954] ? filemap_get_entry+0x1bb/0x3b0 [ 1130.549983] ? __pfx_filemap_get_entry+0x10/0x10 [ 1130.550006] folio_alloc_mpol_noprof+0x38/0xa0 [ 1130.550021] shmem_alloc_folio+0x11b/0x140 [ 1130.550038] shmem_get_folio_gfp.constprop.0+0x4ea/0x13a0 [ 1130.550063] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 1130.550083] ? __pfx_perf_trace_lock+0x10/0x10 [ 1130.550100] ? simple_xattr_get+0x173/0x1d0 [ 1130.550127] shmem_write_begin+0x147/0x2e0 [ 1130.550145] ? __pfx_shmem_write_begin+0x10/0x10 [ 1130.550160] ? timestamp_truncate+0x1eb/0x2f0 [ 1130.550177] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 1130.550196] ? __pfx_timestamp_truncate+0x10/0x10 [ 1130.550217] generic_perform_write+0x391/0x810 [ 1130.550239] ? __pfx_generic_perform_write+0x10/0x10 [ 1130.550256] ? inode_needs_update_time.part.0+0x170/0x270 [ 1130.550279] shmem_file_write_iter+0x111/0x140 [ 1130.550295] vfs_write+0xbe9/0x1150 [ 1130.550311] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 1130.550325] ? __fget_files+0x34/0x3b0 [ 1130.550339] ? __pfx_vfs_write+0x10/0x10 [ 1130.550371] __x64_sys_pwrite64+0x1f1/0x260 [ 1130.550388] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1130.550404] ? fput+0x6a/0x100 [ 1130.550427] do_syscall_64+0xbf/0x390 [ 1130.550446] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1130.550458] RIP: 0033:0x7fd2e62b8ab7 [ 1130.550467] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1130.550478] RSP: 002b:00007fd2e387af20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1130.550489] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e62b8ab7 [ 1130.550497] RDX: 000000000000003a RSI: 0000000020001180 RDI: 0000000000000004 [ 1130.550504] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1130.550511] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1130.550518] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1130.550538] [ 1130.612466] loop2: detected capacity change from 0 to 512 [ 1130.646260] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 01:53:23 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xffffff80, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:53:23 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) keyctl$revoke(0x3, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r6) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r8, r6, r7, 0x0) keyctl$revoke(0x3, r7) keyctl$KEYCTL_MOVE(0x1e, r4, r7, r5, 0x1) 01:53:23 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r4, 0x2, r3, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xce, 0xb5, 0x2, 0x30, 0x0, 0x100000000, 0x88, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x81, 0x7ff}, 0x8, 0x5, 0x7fff, 0x4, 0x10000, 0x8, 0x4, 0x0, 0x3, 0x0, 0x1}, 0xffffffffffffffff, 0x8, r3, 0x18) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) r5 = request_key(&(0x7f0000000300)='id_legacy\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='keyring\x00', r1) r6 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r6) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r8, r6, r7, 0x0) keyctl$revoke(0x3, r7) keyctl$unlink(0x9, r7, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r5) 01:53:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:53:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 24) 01:53:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 20) 01:53:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 15) [ 1141.461910] FAULT_INJECTION: forcing a failure. [ 1141.461910] name failslab, interval 1, probability 0, space 0, times 0 [ 1141.462816] CPU: 0 UID: 0 PID: 9072 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1141.462832] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1141.462840] Call Trace: [ 1141.462845] [ 1141.462850] dump_stack_lvl+0xfa/0x120 [ 1141.462874] should_fail_ex+0x4d7/0x5e0 [ 1141.462893] ? alloc_empty_file+0x58/0x1e0 [ 1141.462911] should_failslab+0xc2/0x120 [ 1141.462930] kmem_cache_alloc_noprof+0x80/0x690 [ 1141.462943] ? __is_insn_slot_addr+0x140/0x290 [ 1141.462963] ? alloc_empty_file+0x58/0x1e0 [ 1141.462981] alloc_empty_file+0x58/0x1e0 [ 1141.463002] path_openat+0xe0/0x2880 [ 1141.463017] ? perf_trace_lock_acquire+0xc9/0x700 [ 1141.463036] ? perf_trace_lock_acquire+0xc9/0x700 [ 1141.463059] ? __pfx_path_openat+0x10/0x10 [ 1141.463074] ? perf_trace_lock_acquire+0xc9/0x700 [ 1141.463097] do_filp_open+0x1e8/0x450 [ 1141.463116] ? __pfx_do_filp_open+0x10/0x10 [ 1141.463139] ? find_held_lock+0x2b/0x80 [ 1141.463152] ? alloc_fd+0x2c1/0x560 [ 1141.463166] ? lock_release+0xc8/0x290 [ 1141.463185] ? _raw_spin_unlock+0x1e/0x40 [ 1141.463199] ? alloc_fd+0x2c1/0x560 [ 1141.463220] do_sys_openat2+0x104/0x1b0 [ 1141.463232] ? __pfx_do_sys_openat2+0x10/0x10 [ 1141.463253] __x64_sys_openat+0x142/0x200 [ 1141.463265] ? __pfx___x64_sys_openat+0x10/0x10 [ 1141.463279] ? fput+0x6a/0x100 [ 1141.463302] do_syscall_64+0xbf/0x390 [ 1141.463322] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1141.463335] RIP: 0033:0x7f94bafa2a04 [ 1141.463344] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1141.463355] RSP: 002b:00007f94b8564ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1141.463367] RAX: ffffffffffffffda RBX: 00007f94bb039970 RCX: 00007f94bafa2a04 [ 1141.463375] RDX: 0000000000000002 RSI: 00007f94b8565000 RDI: 00000000ffffff9c [ 1141.463382] RBP: 00007f94b8565000 R08: 0000000000000000 R09: ffffffffffffffff [ 1141.463389] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1141.463396] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1141.463415] 01:53:23 executing program 6: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @private}}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) getsockname$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r3, 0x890c, &(0x7f0000000000)={0x0, @xdp={0x2c, 0x0, 0x0, 0x34}, @in={0x2, 0x4e24, @empty}, @qipcrtr={0x2a, 0x0, 0x8000}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x10000000007f, 0x2}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x3}}, 0x0, r6}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000180)={'syztnl1\x00', r6, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback, 0x0, 0x20}}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000740)=0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000980)={&(0x7f0000000c80)=ANY=[@ANYBLOB="dc0100001800000125bd7000fedbdf25000000000000000000000000000000000a0101020000000000000000000000004e2404014e2300000000000000000012005232c5631a1d434f42f8ca6687aacaf5d7eb630080743b56b9bf4c6651c3acf892efcc9e6878d11a5d78000000226f3d17103ea23501b5dad13754c00ea648501359a29af75a551c5e3b60b89ad6ac95000000000000000000000000000000006dff4b89cf9b535ed03b96c561f21cd6086e7b5afc211e1e6c227c79e50ef42b9eab243308444b698acab9572ddcb382e41280", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0a010100000000000000000000000000000004d33300000064010100000000000000000000000000c5ffffffffffffff05000000000000000104000000000000210000000000000000000000000000004000000000000000030000000000000000fcffffffffffff0104000000000000d10200000000000009000000000000000800000000000000000800bb0200000002000027bd70000740bf49916e7bb313eb5f1b3500000a0006060200000000000000b500000000000000e4000600fe800000000000000000000000000037000000000000000000000000000000004e20009b4e23", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="ac1414aa000000000000000000000000000004d46c00000000000000000000000000000000000000dd0e0000000000004d0000000000000000010000000000000200000000000000060000000000000005000000000000010000000000000000000005000000000000005f9300000000000008000000000000002000000007000000500f000028bd700007350000060002d64700"/168], 0x1dc}, 0x1, 0x0, 0x0, 0x4000011}, 0x40084) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10201880}, 0xc, &(0x7f0000000640)={&(0x7f0000000f00)=@newpolicy={0x364, 0x13, 0x102, 0x70bd29, 0x25dfdbfd, {{@in6=@mcast1, @in=@rand_addr=0x64010100, 0x4e24, 0x20, 0x4e24, 0x1, 0x2, 0x0, 0x80, 0x32, 0x0, r1}, {0x25362347, 0x0, 0x0, 0x9, 0x1, 0x3, 0x3fb, 0x8}, {0x9, 0xffffffff, 0x8, 0x4}, 0x9, 0x6e6bb4, 0x2, 0x0, 0x1, 0x3}, [@tfcpad={0x8, 0x16, 0x8}, @sa={0xe4, 0x6, {{@in=@multicast1, @in6=@dev={0xfe, 0x80, '\x00', 0x26}, 0x4e20, 0x7, 0x4e23, 0x7, 0x0, 0x80, 0x80, 0x88, r2, r7}, {@in=@empty, 0x4d5, 0x2b}, @in=@local, {0x0, 0x3, 0xffffffff, 0x4, 0x0, 0x3, 0x4}, {0x3ff, 0x9, 0x6, 0x98}, {0x6, 0x8000, 0x8000}, 0x70bd25, 0x0, 0x2, 0x0, 0x3, 0x6}}, @migrate={0x134, 0x11, [{@in=@multicast2, @in6=@mcast1, @in=@remote, @in=@loopback, 0xff, 0x3, 0x0, 0x3500, 0x2, 0x2}, {@in=@multicast1, @in=@empty, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3c, 0x0, 0x0, 0x3507, 0xa, 0x2}, {@in6=@mcast1, @in=@private=0xa010100, @in6=@empty, @in6=@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x34}}, 0xff, 0x1, 0x0, 0x3501, 0x1c, 0xa}, {@in=@broadcast, @in6=@dev={0xfe, 0x80, '\x00', 0xf}, @in6=@private2, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x33, 0x0, 0x0, 0x3504, 0x14, 0x2}]}, @sec_ctx={0x8a, 0x8, {0x86, 0x8, 0x1, 0x74, 0x7e, "dd1c8af6d9ea9242647fd56142c81c922034f96a92abc32bc75cfe6209eb363f2e78ef5d6257572624c83955043ec18e044f1c13a058b3bc9541e2d7e678570f9704aa212a5a938c5c9a4e4b0e12f1bf8015624682f8ee0a463ae69c4d3ef982542f31d9fbf121d735dd270c786dbe2b143720e5ccb51015f8beb66ca9bb"}}]}, 0x364}, 0x1, 0x0, 0x0, 0x4000}, 0x8014) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'ip6erspan0\x00', 0x0}) r8 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r8) r9 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x200) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r8, 0xc0189378, &(0x7f0000000880)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r9, @ANYRES32=r0, @ANYBLOB="000000002e2f66696c653000af0eb36a0873ebdae23893b859b2324832d26326828ed7939497115e467218c1f0bf282f608bbe4701903a3865b38aeae6580600f96dcd66cb84e0fc2973c472f74ab1a6085f8d8aea2a51be52910f992adc6c43372708514830f80c1e96f7dae287a6841215e430e48426f518731a2d0fec77edd22a887f1a5faff3295295f75696b8f2883b641f7866835b8728caf5f31acb5236b293af6af9be102a8b9f7a1e1a81500b488a0000000000000000"]) [ 1141.503790] FAULT_INJECTION: forcing a failure. [ 1141.503790] name failslab, interval 1, probability 0, space 0, times 0 [ 1141.504260] Process accounting paused [ 1141.505499] CPU: 1 UID: 0 PID: 9078 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1141.505529] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1141.505542] Call Trace: [ 1141.505550] [ 1141.505559] dump_stack_lvl+0xfa/0x120 [ 1141.505600] should_fail_ex+0x4d7/0x5e0 [ 1141.505633] ? __kernfs_new_node+0xd3/0x870 [ 1141.505668] should_failslab+0xc2/0x120 [ 1141.505702] kmem_cache_alloc_noprof+0x80/0x690 [ 1141.505750] ? perf_trace_lock_acquire+0xc9/0x700 [ 1141.505812] ? __kernfs_new_node+0xd3/0x870 [ 1141.505852] __kernfs_new_node+0xd3/0x870 [ 1141.505894] ? __pfx___kernfs_new_node+0x10/0x10 [ 1141.505936] ? lock_acquire+0x15e/0x2f0 [ 1141.505965] ? kernfs_root+0x23/0x2a0 [ 1141.505999] ? find_held_lock+0x2b/0x80 [ 1141.506023] ? kernfs_root+0xee/0x2a0 [ 1141.506056] ? lock_release+0xc8/0x290 [ 1141.506083] ? lock_is_held_type+0x9e/0x120 [ 1141.506131] kernfs_new_node+0x13c/0x1e0 [ 1141.506164] kernfs_create_dir_ns+0x4d/0x1a0 [ 1141.506194] internal_create_group+0xa7f/0xeb0 [ 1141.506232] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1141.506275] ? __pfx_internal_create_group+0x10/0x10 [ 1141.506310] ? blk_validate_limits+0xc27/0x15c0 [ 1141.506351] ? lock_is_held_type+0x9e/0x120 [ 1141.506386] loop_configure+0xc46/0x15a0 [ 1141.506453] ? __pfx_loop_configure+0x10/0x10 [ 1141.506507] ? avc_has_extended_perms+0x107/0xf20 [ 1141.506543] ? find_held_lock+0x2b/0x80 [ 1141.506567] ? avc_has_extended_perms+0x23b/0xf20 [ 1141.506601] ? lock_release+0xc8/0x290 [ 1141.506636] lo_ioctl+0x66d/0x1ca0 [ 1141.506674] ? __pfx_lo_ioctl+0x10/0x10 [ 1141.506703] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1141.506739] ? __pfx_perf_trace_lock+0x10/0x10 [ 1141.506777] ? lock_acquire+0x15e/0x2f0 [ 1141.506806] ? __virt_addr_valid+0x1c6/0x5d0 [ 1141.506832] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1141.506866] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1141.506895] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1141.506924] ? lock_release+0xc8/0x290 [ 1141.506958] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1141.507038] ? down_write_nested+0x130/0x1f0 [ 1141.507071] ? __fget_files+0x34/0x3b0 [ 1141.507099] ? find_held_lock+0x2b/0x80 [ 1141.507122] ? __fget_files+0x203/0x3b0 [ 1141.507152] ? __pfx_lo_ioctl+0x10/0x10 [ 1141.507182] blkdev_ioctl+0x365/0x6d0 [ 1141.507217] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1141.507253] ? selinux_file_ioctl+0xb9/0x280 [ 1141.507283] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1141.507320] __x64_sys_ioctl+0x18f/0x210 [ 1141.507349] do_syscall_64+0xbf/0x390 [ 1141.507385] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1141.507408] RIP: 0033:0x7f1b64b618d7 [ 1141.507425] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1141.507445] RSP: 002b:00007f1b620d6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1141.507467] RAX: ffffffffffffffda RBX: 00007f1b64bab970 RCX: 00007f1b64b618d7 [ 1141.507481] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1141.507494] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1141.507507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1141.507520] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1141.507557] [ 1141.507612] loop5: detected capacity change from 0 to 512 [ 1141.510672] FAULT_INJECTION: forcing a failure. [ 1141.510672] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1141.532835] CPU: 0 UID: 0 PID: 9079 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1141.532853] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1141.532860] Call Trace: [ 1141.532864] [ 1141.532869] dump_stack_lvl+0xfa/0x120 [ 1141.532890] should_fail_ex+0x4d7/0x5e0 [ 1141.532904] ? page_copy_sane+0xce/0x2b0 [ 1141.532920] copy_folio_from_iter_atomic+0x3d3/0x18c0 [ 1141.532943] ? simple_xattr_get+0x173/0x1d0 [ 1141.532965] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 1141.532981] ? shmem_write_begin+0x15e/0x2e0 [ 1141.533000] ? __pfx_shmem_write_begin+0x10/0x10 [ 1141.533015] ? timestamp_truncate+0x1eb/0x2f0 [ 1141.533034] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 1141.533054] ? __pfx_timestamp_truncate+0x10/0x10 [ 1141.533074] generic_perform_write+0x1d7/0x810 [ 1141.533097] ? __pfx_generic_perform_write+0x10/0x10 [ 1141.533118] ? inode_needs_update_time.part.0+0x170/0x270 [ 1141.533142] shmem_file_write_iter+0x111/0x140 [ 1141.533157] vfs_write+0xbe9/0x1150 [ 1141.533174] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 1141.533188] ? __fget_files+0x34/0x3b0 [ 1141.533202] ? __pfx_vfs_write+0x10/0x10 [ 1141.533235] __x64_sys_pwrite64+0x1f1/0x260 [ 1141.533252] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1141.533268] ? fput+0x6a/0x100 [ 1141.533291] do_syscall_64+0xbf/0x390 [ 1141.533311] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1141.533324] RIP: 0033:0x7fd2e62b8ab7 [ 1141.533333] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1141.533344] RSP: 002b:00007fd2e387af20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1141.533355] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e62b8ab7 [ 1141.533363] RDX: 000000000000003a RSI: 0000000020001180 RDI: 0000000000000004 [ 1141.533370] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1141.533378] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1141.533384] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1141.533404] 01:53:23 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xffffff9e, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1141.584485] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1141.586097] EXT4-fs (loop5): group descriptors corrupted! [ 1141.593806] loop2: detected capacity change from 0 to 512 [ 1141.610517] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1141.611316] EXT4-fs (loop2): group descriptors corrupted! 01:53:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), 0xffffffffffffffff) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:53:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 21) 01:53:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 16) 01:53:23 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xffffffa6, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1141.704160] loop7: detected capacity change from 0 to 512 01:53:23 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r5 = fork() tkill(r5, 0x31) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01bef265ce32c0e73302000076", @ANYRES32=r3, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x4, 0x0, 0x3, 0x7f, 0x0, 0x1, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x101, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x80, 0x1000, 0x7, 0x9, 0x100000000, 0x7f, 0x1ff, 0x0, 0x9}, r5, 0x10, r6, 0x8) r7 = request_key(&(0x7f0000000300)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='keyring\x00', 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r7) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r0, r2, 0x0) [ 1141.735928] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1141.737081] EXT4-fs (loop7): group descriptors corrupted! 01:53:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 25) 01:53:23 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 1141.867803] FAULT_INJECTION: forcing a failure. [ 1141.867803] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1141.869347] CPU: 0 UID: 0 PID: 9107 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1141.869364] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1141.869372] Call Trace: [ 1141.869376] [ 1141.869381] dump_stack_lvl+0xfa/0x120 [ 1141.869404] should_fail_ex+0x4d7/0x5e0 [ 1141.869419] ? page_copy_sane+0xce/0x2b0 [ 1141.869435] copy_folio_from_iter_atomic+0x3d3/0x18c0 [ 1141.869463] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 1141.869478] ? shmem_write_begin+0x15e/0x2e0 [ 1141.869497] ? __pfx_shmem_write_begin+0x10/0x10 [ 1141.869512] ? timestamp_truncate+0x1eb/0x2f0 [ 1141.869530] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 1141.869551] ? __pfx_timestamp_truncate+0x10/0x10 [ 1141.869571] generic_perform_write+0x1d7/0x810 [ 1141.869594] ? __pfx_generic_perform_write+0x10/0x10 [ 1141.869610] ? inode_needs_update_time.part.0+0x170/0x270 [ 1141.869634] shmem_file_write_iter+0x111/0x140 [ 1141.869649] vfs_write+0xbe9/0x1150 [ 1141.869666] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 1141.869680] ? __fget_files+0x34/0x3b0 [ 1141.869694] ? __pfx_vfs_write+0x10/0x10 [ 1141.869739] __x64_sys_pwrite64+0x1f1/0x260 [ 1141.869756] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 1141.869772] ? fput+0x6a/0x100 [ 1141.869795] do_syscall_64+0xbf/0x390 [ 1141.869815] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1141.869828] RIP: 0033:0x7fd2e62b8ab7 [ 1141.869838] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1141.869850] RSP: 002b:00007fd2e387af20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1141.869862] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e62b8ab7 [ 1141.869870] RDX: 0000000000000001 RSI: 0000000020010200 RDI: 0000000000000004 [ 1141.869877] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 1141.869884] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 1141.869891] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1141.869910] [ 1141.888082] loop2: detected capacity change from 0 to 512 [ 1141.893261] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1141.894006] EXT4-fs (loop2): group descriptors corrupted! [ 1141.933581] loop5: detected capacity change from 0 to 512 [ 1141.961469] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1141.963079] EXT4-fs (loop5): group descriptors corrupted! 01:53:35 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 22) 01:53:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 17) 01:53:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000300)='id_legacy\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)="d542abf4d63d804dedc1cb1bfde57f0c937d612dd971fe24d2fe6d036461780f832570aed6ca57f971fd4f67eac094d822fb7ab7e12fb56ec65bee70acbf372c5e62b9f751be926d81d050112bf17ddbd0854546ecb47924f7fc939f71f1ba7471b110f5b57fc9f12c9de6f7dfb369002e367f86681afdca33b3b21093010c05ff157e32e23b88e07d110c97bb9d0ae9de4682cfbad5e14573364d27bdfc18f906b10dd6949d298ef0af7bbfc1477b35494252aa67d3", 0xb6, r1) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x64, 0x31, 0x35, 0x37, 0x61, 0x63, 0x33, 0x34, 0x34, 0x32, 0x31, 0x66, 0x35, 0x36, 0x66, 0x39]}, &(0x7f0000000280)={0x0, "92c46ae0d583008ec6e9da3c3ed16b0245b9f11c8552eb27c6ab3de538aeb7229c00addcecda40f46d3535eeca3280f5e1864b436e4558a2fbe4481578a6c35b", 0x2c}, 0x48, r3) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:53:35 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xfffffff0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:53:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 26) 01:53:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001080)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000f80)=[{{&(0x7f0000000340), 0x6e, &(0x7f0000000400)=[{&(0x7f00000003c0)=""/13, 0xd}], 0x1, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x120}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/1, 0x1}, {&(0x7f00000005c0)=""/87, 0x57}], 0x2, &(0x7f0000000680)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa0}}, {{&(0x7f0000000740), 0x6e, &(0x7f0000000940)=[{&(0x7f00000007c0)=""/119, 0x77}, {&(0x7f0000000840)=""/230, 0xe6}], 0x2}}, {{&(0x7f0000000980)=@abs, 0x6e, &(0x7f0000000ec0)=[{&(0x7f0000000a00)=""/47, 0x2f}, {&(0x7f0000000a40)=""/125, 0x7d}, {&(0x7f0000000ac0)=""/157, 0x9d}, {&(0x7f0000000b80)=""/133, 0x85}, {&(0x7f0000000c40)=""/85, 0x55}, {&(0x7f0000000cc0)=""/155, 0x9b}, {&(0x7f0000000d80)=""/198, 0xc6}, {&(0x7f0000000e80)=""/17, 0x11}], 0x8, &(0x7f0000000f40)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}], 0x4, 0x40000102, &(0x7f00000010c0)={r0, r1+60000000}) syz_open_procfs(r2, &(0x7f0000001100)='net/rt6_stats\x00') r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r6 = request_key(&(0x7f0000000280)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)='&.\'-\x00', r5) keyctl$search(0xa, r4, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x3}, r6) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) 01:53:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), 0xffffffffffffffff) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:53:35 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = fork() r2 = fork() tkill(r2, 0x31) recvmmsg$unix(0xffffffffffffffff, &(0x7f000000cf00)=[{{&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/20, 0x14}, {&(0x7f0000000300)=""/100, 0x64}, {&(0x7f0000000380)=""/178, 0xb2}], 0x3, &(0x7f0000000480)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}, {{&(0x7f0000000500), 0x6e, &(0x7f0000000580), 0x0, &(0x7f00000005c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0xf0}}, {{0x0, 0x0, &(0x7f0000002a00)=[{&(0x7f00000006c0)=""/119, 0x77}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/240, 0xf0}, {&(0x7f0000002840)=""/100, 0x64}, {&(0x7f00000028c0)}, {&(0x7f0000002900)=""/242, 0xf2}], 0x7, &(0x7f0000002a80)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd0}}, {{0x0, 0x0, &(0x7f0000002c00)=[{&(0x7f0000002b80)=""/123, 0x7b}], 0x1, &(0x7f0000002c40)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}}, {{&(0x7f0000002d00)=@abs, 0x6e, &(0x7f0000004f40)=[{&(0x7f0000002d80)=""/44, 0x2c}, {&(0x7f0000002dc0)=""/4096, 0x1000}, {&(0x7f0000003dc0)=""/197, 0xc5}, {&(0x7f0000003ec0)=""/100, 0x64}, {&(0x7f0000003f40)=""/4096, 0x1000}], 0x5, &(0x7f0000004fc0)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000005000), 0x6e, &(0x7f0000006340)=[{&(0x7f0000005080)=""/124, 0x7c}, {&(0x7f0000005100)=""/49, 0x31}, {&(0x7f0000005140)=""/252, 0xfc}, {&(0x7f0000005240)=""/4096, 0x1000}, {&(0x7f0000006240)=""/199, 0xc7}], 0x5, &(0x7f00000063c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}}, {{0x0, 0x0, &(0x7f00000074c0)=[{&(0x7f0000006440)=""/98, 0x62}, {&(0x7f00000064c0)=""/4096, 0x1000}], 0x2}}, {{&(0x7f0000007500), 0x6e, &(0x7f0000008740)=[{&(0x7f0000007580)=""/23, 0x17}, {&(0x7f00000075c0)=""/90, 0x5a}, {&(0x7f0000007640)=""/240, 0xf0}, {&(0x7f0000007740)=""/4096, 0x1000}], 0x4, &(0x7f0000008780)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x190}}, {{&(0x7f0000008940), 0x6e, &(0x7f000000cd40)=[{&(0x7f00000089c0)=""/249, 0xf9}, {&(0x7f0000008ac0)=""/4096, 0x1000}, {&(0x7f0000009ac0)=""/4096, 0x1000}, {&(0x7f000000aac0)=""/227, 0xe3}, {&(0x7f000000abc0)=""/174, 0xae}, {&(0x7f000000ac80)=""/176, 0xb0}, {&(0x7f000000ad40)=""/4096, 0x1000}, {&(0x7f000000bd40)=""/4096, 0x1000}], 0x8, &(0x7f000000cdc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x110}}], 0x9, 0x1, &(0x7f000000d140)={0x77359400}) recvmsg$unix(0xffffffffffffffff, &(0x7f000000e6c0)={0x0, 0x0, &(0x7f000000e580)=[{&(0x7f000000d180)=""/192, 0xc0}, {&(0x7f000000d240)=""/72, 0x48}, {&(0x7f000000d2c0)=""/4096, 0x1000}, {&(0x7f000000e2c0)=""/2, 0x2}, {&(0x7f000000e300)=""/254, 0xfe}, {&(0x7f000000e400)=""/13, 0xd}, {&(0x7f000000e440)=""/111, 0x6f}, {&(0x7f000000e4c0)=""/67, 0x43}, {&(0x7f000000e540)=""/26, 0x1a}], 0x9, &(0x7f000000e640)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}, 0x60000062) recvmmsg$unix(0xffffffffffffffff, &(0x7f000000edc0)=[{{&(0x7f000000e740)=@abs, 0x6e, &(0x7f000000e9c0)=[{&(0x7f000000e7c0)=""/45, 0x2d}, {&(0x7f000000e800)=""/235, 0xeb}, {&(0x7f000000e900)=""/158, 0x9e}], 0x3, &(0x7f000000ea00)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe0}}, {{&(0x7f000000eb00), 0x6e, &(0x7f000000ecc0)=[{&(0x7f000000eb80)=""/253, 0xfd}, {&(0x7f000000ec80)}], 0x2, &(0x7f000000ed00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb0}}], 0x2, 0x0, 0x0) clone3(&(0x7f000000ee40)={0x2000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0), {0x26}, &(0x7f0000000100)=""/122, 0x7a, &(0x7f0000000180)=""/148, &(0x7f000000e700)=[0xffffffffffffffff, r1, 0x0, r2, r3, 0x0, r4], 0x7, {r5}}, 0x58) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) [ 1153.022901] FAULT_INJECTION: forcing a failure. [ 1153.022901] name failslab, interval 1, probability 0, space 0, times 0 [ 1153.023813] CPU: 0 UID: 0 PID: 9131 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1153.023830] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1153.023837] Call Trace: [ 1153.023843] [ 1153.023848] dump_stack_lvl+0xfa/0x120 [ 1153.023874] should_fail_ex+0x4d7/0x5e0 [ 1153.023891] ? getname_flags.part.0+0x48/0x540 [ 1153.023904] should_failslab+0xc2/0x120 [ 1153.023922] kmem_cache_alloc_noprof+0x80/0x690 [ 1153.023941] ? getname_flags.part.0+0x48/0x540 [ 1153.023952] getname_flags.part.0+0x48/0x540 [ 1153.023965] getname_flags+0x95/0xe0 [ 1153.023981] do_sys_openat2+0x9f/0x1b0 [ 1153.023994] ? __pfx_do_sys_openat2+0x10/0x10 [ 1153.024015] __x64_sys_openat+0x142/0x200 [ 1153.024027] ? __pfx___x64_sys_openat+0x10/0x10 [ 1153.024041] ? fput+0x6a/0x100 [ 1153.024064] do_syscall_64+0xbf/0x390 [ 1153.024085] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1153.024098] RIP: 0033:0x7fd2e62b8a04 [ 1153.024111] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1153.024122] RSP: 002b:00007fd2e387aed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1153.024134] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e62b8a04 [ 1153.024142] RDX: 0000000000000002 RSI: 00007fd2e387b000 RDI: 00000000ffffff9c [ 1153.024149] RBP: 00007fd2e387b000 R08: 0000000000000000 R09: ffffffffffffffff [ 1153.024156] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1153.024163] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1153.024182] [ 1153.051852] FAULT_INJECTION: forcing a failure. [ 1153.051852] name failslab, interval 1, probability 0, space 0, times 0 [ 1153.054021] CPU: 1 UID: 0 PID: 9133 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1153.054054] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1153.054068] Call Trace: [ 1153.054076] [ 1153.054086] dump_stack_lvl+0xfa/0x120 [ 1153.054132] should_fail_ex+0x4d7/0x5e0 [ 1153.054166] ? security_file_alloc+0x35/0x130 [ 1153.054199] should_failslab+0xc2/0x120 [ 1153.054233] kmem_cache_alloc_noprof+0x80/0x690 [ 1153.054258] ? __create_object+0x59/0x80 [ 1153.054290] ? security_file_alloc+0x35/0x130 [ 1153.054322] security_file_alloc+0x35/0x130 [ 1153.054357] init_file+0x95/0x4c0 [ 1153.054396] alloc_empty_file+0x76/0x1e0 [ 1153.054436] path_openat+0xe0/0x2880 [ 1153.054467] ? perf_trace_lock_acquire+0xc9/0x700 [ 1153.054503] ? perf_trace_lock_acquire+0xc9/0x700 [ 1153.054548] ? __pfx_path_openat+0x10/0x10 [ 1153.054578] ? perf_trace_lock_acquire+0xc9/0x700 [ 1153.054623] do_filp_open+0x1e8/0x450 [ 1153.054653] ? __pfx_do_filp_open+0x10/0x10 [ 1153.054700] ? find_held_lock+0x2b/0x80 [ 1153.054724] ? alloc_fd+0x2c1/0x560 [ 1153.054752] ? lock_release+0xc8/0x290 [ 1153.054790] ? _raw_spin_unlock+0x1e/0x40 [ 1153.054817] ? alloc_fd+0x2c1/0x560 [ 1153.054858] do_sys_openat2+0x104/0x1b0 [ 1153.054881] ? __pfx_do_sys_openat2+0x10/0x10 [ 1153.054923] __x64_sys_openat+0x142/0x200 [ 1153.054947] ? __pfx___x64_sys_openat+0x10/0x10 [ 1153.054976] ? fput+0x6a/0x100 [ 1153.055021] do_syscall_64+0xbf/0x390 [ 1153.055059] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1153.055083] RIP: 0033:0x7f94bafa2a04 [ 1153.055101] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1153.055122] RSP: 002b:00007f94b8564ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1153.055145] RAX: ffffffffffffffda RBX: 00007f94bb039970 RCX: 00007f94bafa2a04 [ 1153.055161] RDX: 0000000000000002 RSI: 00007f94b8565000 RDI: 00000000ffffff9c [ 1153.055175] RBP: 00007f94b8565000 R08: 0000000000000000 R09: ffffffffffffffff [ 1153.055189] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1153.055202] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1153.055240] 01:53:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) r6 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r6) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r8, r6, r7, 0x0) keyctl$link(0x8, r5, r8) r9 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r9, r0, r2, 0x0) [ 1153.141571] loop5: detected capacity change from 0 to 512 01:53:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 18) [ 1153.162649] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1153.164550] EXT4-fs (loop5): group descriptors corrupted! 01:53:35 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0xffffffff, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:53:35 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 23) [ 1153.260484] loop2: detected capacity change from 0 to 512 01:53:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), 0xffffffffffffffff) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:53:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 27) [ 1153.303641] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1153.304620] EXT4-fs (loop2): group descriptors corrupted! [ 1153.379715] loop7: detected capacity change from 0 to 512 [ 1153.390558] loop5: detected capacity change from 0 to 512 [ 1153.397159] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1153.398760] EXT4-fs (loop7): group descriptors corrupted! [ 1153.421339] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1153.422300] EXT4-fs (loop5): group descriptors corrupted! 01:53:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 28) 01:53:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 24) 01:53:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 19) 01:53:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:53:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) add_key$user(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000280)="78a3ddfb40720099e4200c3ea6744935f09add69dd10f1b62495bf3d10022c5f7f5842a81c3f4e308ff3c2e78a2f9c84710634a11219d68693a797b38aaa1f998375470099343c76159eb904f8acbc258ec302cdc1fda020fdfee1a38c9d71ba50a882624ea2c2e0057e35c0bbbb8d36c43ec0ebc8f7b3cb2e53d754f25a331ccc4e40689bfdf6c3f91a0085ce7129a18e26845525b284c78a117f8baaa52dcbefc7f43d61091e37fc3f1aeceb2690527a756e8244666a0f400561f5f17468d277e50f79f55d4f4bf1c608b7404c44871a328686f503ec42a43631a1f1", 0xdd, r3) 01:53:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:53:46 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="0f0000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:53:46 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'lo\x00'}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x18, r2, 0x1, 0x0, 0x0, {0x8}, [@HEADER={0xffffff42}]}, 0x18}}, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='8\b\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002bbd7000fcdbdf250a000000080001007063690011000200303030303a30303a31302e30000000000800030003000000"], 0x38}, 0x1, 0x0, 0x0, 0x84}, 0x44831) [ 1164.610699] FAULT_INJECTION: forcing a failure. [ 1164.610699] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1164.611658] CPU: 0 UID: 0 PID: 9182 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1164.611675] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1164.611682] Call Trace: [ 1164.611687] [ 1164.611692] dump_stack_lvl+0xfa/0x120 [ 1164.611715] should_fail_ex+0x4d7/0x5e0 [ 1164.611734] strncpy_from_user+0x3b/0x2f0 [ 1164.611756] getname_flags.part.0+0x8d/0x540 [ 1164.611772] getname_flags+0x95/0xe0 [ 1164.611788] do_sys_openat2+0x9f/0x1b0 [ 1164.611800] ? __pfx_do_sys_openat2+0x10/0x10 [ 1164.611822] __x64_sys_openat+0x142/0x200 [ 1164.611834] ? __pfx___x64_sys_openat+0x10/0x10 [ 1164.611849] ? fput+0x6a/0x100 [ 1164.611872] do_syscall_64+0xbf/0x390 [ 1164.611892] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1164.611906] RIP: 0033:0x7fd2e62b8a04 [ 1164.611915] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1164.611927] RSP: 002b:00007fd2e387aed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1164.611939] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e62b8a04 [ 1164.611947] RDX: 0000000000000002 RSI: 00007fd2e387b000 RDI: 00000000ffffff9c [ 1164.611955] RBP: 00007fd2e387b000 R08: 0000000000000000 R09: ffffffffffffffff [ 1164.611962] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1164.611969] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1164.611988] 01:53:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 20) [ 1164.664062] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1164.666587] FAULT_INJECTION: forcing a failure. [ 1164.666587] name failslab, interval 1, probability 0, space 0, times 0 [ 1164.667515] CPU: 0 UID: 0 PID: 9189 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1164.667532] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1164.667540] Call Trace: [ 1164.667547] [ 1164.667553] dump_stack_lvl+0xfa/0x120 [ 1164.667577] should_fail_ex+0x4d7/0x5e0 [ 1164.667595] ? __kernfs_new_node+0xd3/0x870 [ 1164.667614] should_failslab+0xc2/0x120 [ 1164.667632] kmem_cache_alloc_noprof+0x80/0x690 [ 1164.667647] ? perf_trace_lock_acquire+0xc9/0x700 [ 1164.667670] ? __kernfs_new_node+0xd3/0x870 [ 1164.667688] __kernfs_new_node+0xd3/0x870 [ 1164.667710] ? __pfx___kernfs_new_node+0x10/0x10 [ 1164.667733] ? lock_acquire+0x15e/0x2f0 [ 1164.667749] ? kernfs_root+0x23/0x2a0 [ 1164.667767] ? find_held_lock+0x2b/0x80 [ 1164.667780] ? kernfs_root+0xee/0x2a0 [ 1164.667798] ? lock_release+0xc8/0x290 [ 1164.667812] ? lock_is_held_type+0x9e/0x120 [ 1164.667835] kernfs_new_node+0x13c/0x1e0 [ 1164.667854] kernfs_create_dir_ns+0x4d/0x1a0 [ 1164.667870] internal_create_group+0xa7f/0xeb0 [ 1164.667890] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1164.667913] ? __pfx_internal_create_group+0x10/0x10 [ 1164.667933] ? blk_validate_limits+0xc27/0x15c0 [ 1164.667955] ? lock_is_held_type+0x9e/0x120 [ 1164.667974] loop_configure+0xc46/0x15a0 [ 1164.668011] ? __pfx_loop_configure+0x10/0x10 [ 1164.668040] ? avc_has_extended_perms+0x107/0xf20 [ 1164.668060] ? find_held_lock+0x2b/0x80 [ 1164.668073] ? avc_has_extended_perms+0x23b/0xf20 [ 1164.668091] ? lock_release+0xc8/0x290 [ 1164.668114] lo_ioctl+0x66d/0x1ca0 [ 1164.668135] ? __pfx_lo_ioctl+0x10/0x10 [ 1164.668151] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1164.668170] ? __pfx_perf_trace_lock+0x10/0x10 [ 1164.668191] ? lock_acquire+0x15e/0x2f0 [ 1164.668207] ? __virt_addr_valid+0x1c6/0x5d0 [ 1164.668222] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1164.668240] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1164.668257] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1164.668272] ? lock_release+0xc8/0x290 [ 1164.668291] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1164.668335] ? down_write_nested+0x130/0x1f0 [ 1164.668353] ? __fget_files+0x34/0x3b0 [ 1164.668368] ? find_held_lock+0x2b/0x80 [ 1164.668381] ? __fget_files+0x203/0x3b0 [ 1164.668397] ? __pfx_lo_ioctl+0x10/0x10 [ 1164.668412] blkdev_ioctl+0x365/0x6d0 [ 1164.668432] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1164.668451] ? selinux_file_ioctl+0xb9/0x280 [ 1164.668469] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1164.668489] __x64_sys_ioctl+0x18f/0x210 [ 1164.668504] do_syscall_64+0xbf/0x390 [ 1164.668523] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1164.668536] RIP: 0033:0x7f94bafef8d7 [ 1164.668545] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1164.668557] RSP: 002b:00007f94b8564f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1164.668569] RAX: ffffffffffffffda RBX: 00007f94bb039970 RCX: 00007f94bafef8d7 [ 1164.668577] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1164.668585] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1164.668592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1164.668599] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1164.668618] [ 1164.687166] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1164.687308] loop7: detected capacity change from 0 to 512 [ 1164.705310] loop5: detected capacity change from 0 to 512 [ 1164.727712] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1164.728621] EXT4-fs (loop5): group descriptors corrupted! [ 1164.732048] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1164.734054] EXT4-fs (loop7): group descriptors corrupted! [ 1164.750870] FAULT_INJECTION: forcing a failure. [ 1164.750870] name failslab, interval 1, probability 0, space 0, times 0 [ 1164.751958] CPU: 0 UID: 0 PID: 9201 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1164.751975] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1164.751983] Call Trace: [ 1164.751987] [ 1164.751992] dump_stack_lvl+0xfa/0x120 [ 1164.752016] should_fail_ex+0x4d7/0x5e0 [ 1164.752034] ? alloc_empty_file+0x58/0x1e0 [ 1164.752055] should_failslab+0xc2/0x120 [ 1164.752076] kmem_cache_alloc_noprof+0x80/0x690 [ 1164.752090] ? __is_insn_slot_addr+0x140/0x290 [ 1164.752115] ? alloc_empty_file+0x58/0x1e0 [ 1164.752134] alloc_empty_file+0x58/0x1e0 [ 1164.752154] path_openat+0xe0/0x2880 [ 1164.752170] ? perf_trace_lock_acquire+0xc9/0x700 [ 1164.752189] ? perf_trace_lock_acquire+0xc9/0x700 [ 1164.752212] ? __pfx_path_openat+0x10/0x10 [ 1164.752227] ? perf_trace_lock_acquire+0xc9/0x700 [ 1164.752250] do_filp_open+0x1e8/0x450 [ 1164.752265] ? __pfx_do_filp_open+0x10/0x10 [ 1164.752289] ? find_held_lock+0x2b/0x80 [ 1164.752301] ? alloc_fd+0x2c1/0x560 [ 1164.752315] ? lock_release+0xc8/0x290 [ 1164.752335] ? _raw_spin_unlock+0x1e/0x40 [ 1164.752350] ? alloc_fd+0x2c1/0x560 [ 1164.752370] do_sys_openat2+0x104/0x1b0 [ 1164.752382] ? __pfx_do_sys_openat2+0x10/0x10 [ 1164.752404] __x64_sys_openat+0x142/0x200 [ 1164.752416] ? __pfx___x64_sys_openat+0x10/0x10 [ 1164.752430] ? fput+0x6a/0x100 [ 1164.752453] do_syscall_64+0xbf/0x390 [ 1164.752473] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1164.752485] RIP: 0033:0x7fd2e62b8a04 [ 1164.752495] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1164.752507] RSP: 002b:00007fd2e387aed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1164.752518] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e62b8a04 [ 1164.752527] RDX: 0000000000000002 RSI: 00007fd2e387b000 RDI: 00000000ffffff9c [ 1164.752534] RBP: 00007fd2e387b000 R08: 0000000000000000 R09: ffffffffffffffff [ 1164.752542] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1164.752549] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1164.752568] 01:53:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:53:46 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="800100001200010e000000000000000028001a"], 0x38}}, 0x0) 01:53:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:53:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 29) 01:53:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x2, 0x1, 0x7, 0x0, 0x0, 0x0, 0x20400, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xffffffff, 0x1, @perf_config_ext={0x1}, 0x10008, 0x8, 0x10000, 0x5, 0x7b823ca1, 0x4, 0x200, 0x0, 0x1, 0x0, 0x2d}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x1) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key$user(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000280)="a150eea2afcdb5215488314e9d387e79669e9dd9ab302dc559607059ed2f972bb4363342b37fbacb", 0x28, r1) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) keyctl$revoke(0x3, r4) r6 = add_key(&(0x7f0000000340)='asymmetric\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)="600ba0ff0a83afff73c2e8745cac9b71e7c9a32b544e4dd69aa7d5b965dbaad0f760620c2cbf3b3d3ede2cad15407b034d3af973ef27c77e0258502a43933da46d6b43e0b6289b9f0e614141cbfbd1140ec9838db850eaa001380cef1023e2f1fb368af03bc11b7ed0828610d2c2eec0367950dcc4897fe19319e9e6db68528b1310329fec589d5edcaf07901d0bf6c3ff7f20797851933324e559453d70e5538e0850fdc545eb19587517b447fed5e271d024ff199e838bf0c25300cffab633b0fbb81d", 0xc4, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r6, 0xfffffffffffffffd, 0x0) r7 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r7, r0, r2, 0x0) 01:53:46 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = dup(r0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@getsadinfo={0x5c, 0x23, 0x400, 0x70bd28, 0x25dfdbfb, 0x0, [@algo_crypt={0x48, 0x2, {{'ctr(serpent)\x00'}}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8800}, 0x40000) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x141802, 0x0) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r4, 0x1, &(0x7f00000003c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000)="fa", 0x600}]) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) r9 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r9, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000500)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) io_submit(r4, 0x3, &(0x7f0000001640)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x3, 0x7ff, r9, &(0x7f00000005c0)="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", 0x1000, 0x2, 0x0, 0x1, r1}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x0, r3, &(0x7f0000000440)="e3096673f06ad616b9cf99fce5d8863f57b9801c40ef1232ba96e24737bfc218ace5df2e8a84c9d964df3cf29162c01ca37b17deacea9ef30e35eaf1b12c54db4ac2fa15", 0x44, 0x63fb, 0x0, 0x2, r1}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x1af, r10, &(0x7f00000015c0)="ded28013079dd109205123c6897adb8895dc2237ccc893bbc603f353b6cd8195260452fbea5b380e2b7d4dbd6177b51d43ca7d9634e44341d8ada673ed0a47511131470b4062fc9f45f377f97cd63172d4e2442b3563e706e407550ce7f5b43abb", 0x61, 0x4, 0x0, 0x1}]) sendmsg$ETHTOOL_MSG_COALESCE_GET(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01000000000000000000080000000c00018008000100be2d8f944a2ea981e9d4ae4f353532b2796744be5730c91d153fe18830e74a74089ddb978cc80a155e01e98321a501cb07033c660781c10b9d064edb27696d3bc9f7bf82bd9b218b12ce2b1b131b15c77e3873d1ce8fa6e1e9458b0000", @ANYRES32=r8, @ANYBLOB], 0x20}}, 0x0) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) sendmsg$NL80211_CMD_TDLS_MGMT(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r11, 0x4, 0x70bd2c, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x62}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008090}, 0x20000000) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r1, 0x4018f50b, &(0x7f0000000380)={0x1, 0x80000000, 0x81}) 01:53:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 25) 01:53:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 21) [ 1164.928776] loop2: detected capacity change from 0 to 512 01:53:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8007}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 1164.946592] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1164.947404] EXT4-fs (loop2): group descriptors corrupted! [ 1164.953056] loop7: detected capacity change from 0 to 512 [ 1164.960191] loop5: detected capacity change from 0 to 512 [ 1164.976384] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1164.977469] I/O error, dev sr0, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 3 prio class 2 [ 1164.978725] buffer_io_error: 2070 callbacks suppressed [ 1164.978739] Buffer I/O error on dev sr0, logical block 0, lost async page write [ 1164.980734] Buffer I/O error on dev sr0, logical block 1, lost async page write [ 1164.981965] Buffer I/O error on dev sr0, logical block 2, lost async page write [ 1164.986212] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1164.987018] EXT4-fs (loop7): group descriptors corrupted! [ 1164.994451] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1164.996195] EXT4-fs (loop5): group descriptors corrupted! 01:53:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 22) 01:53:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:53:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 26) 01:53:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:53:47 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="e03f03001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1165.088810] FAULT_INJECTION: forcing a failure. [ 1165.088810] name failslab, interval 1, probability 0, space 0, times 0 [ 1165.089738] CPU: 0 UID: 0 PID: 9229 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1165.089755] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1165.089763] Call Trace: [ 1165.089770] [ 1165.089776] dump_stack_lvl+0xfa/0x120 [ 1165.089801] should_fail_ex+0x4d7/0x5e0 [ 1165.089819] ? security_file_alloc+0x35/0x130 [ 1165.089836] should_failslab+0xc2/0x120 [ 1165.089856] kmem_cache_alloc_noprof+0x80/0x690 [ 1165.089869] ? __create_object+0x59/0x80 [ 1165.089885] ? security_file_alloc+0x35/0x130 [ 1165.089902] security_file_alloc+0x35/0x130 [ 1165.089919] init_file+0x95/0x4c0 [ 1165.089940] alloc_empty_file+0x76/0x1e0 [ 1165.089960] path_openat+0xe0/0x2880 [ 1165.089977] ? perf_trace_lock_acquire+0xc9/0x700 [ 1165.089996] ? perf_trace_lock_acquire+0xc9/0x700 [ 1165.090019] ? __pfx_path_openat+0x10/0x10 [ 1165.090034] ? perf_trace_lock_acquire+0xc9/0x700 [ 1165.090056] do_filp_open+0x1e8/0x450 [ 1165.090072] ? __pfx_do_filp_open+0x10/0x10 [ 1165.090095] ? find_held_lock+0x2b/0x80 [ 1165.090112] ? alloc_fd+0x2c1/0x560 [ 1165.090126] ? lock_release+0xc8/0x290 [ 1165.090145] ? _raw_spin_unlock+0x1e/0x40 [ 1165.090160] ? alloc_fd+0x2c1/0x560 [ 1165.090180] do_sys_openat2+0x104/0x1b0 [ 1165.090192] ? __pfx_do_sys_openat2+0x10/0x10 [ 1165.090213] __x64_sys_openat+0x142/0x200 [ 1165.090225] ? __pfx___x64_sys_openat+0x10/0x10 [ 1165.090240] ? fput+0x6a/0x100 [ 1165.090262] do_syscall_64+0xbf/0x390 [ 1165.090282] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1165.090295] RIP: 0033:0x7fd2e62b8a04 [ 1165.090305] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1165.090317] RSP: 002b:00007fd2e387aed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1165.090328] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e62b8a04 [ 1165.090337] RDX: 0000000000000002 RSI: 00007fd2e387b000 RDI: 00000000ffffff9c [ 1165.090344] RBP: 00007fd2e387b000 R08: 0000000000000000 R09: ffffffffffffffff [ 1165.090352] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1165.090359] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1165.090378] 01:53:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 30) 01:53:58 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 27) 01:53:58 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="effdffff1200010e000000000000000028001a"], 0x38}}, 0x0) 01:53:58 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x80, 0x8e, 0x4, 0x9, 0x0, 0xff, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x531a, 0x0, @perf_config_ext={0x9, 0x1}, 0x1, 0x3f, 0xda8a, 0x9, 0x76, 0x101, 0x1f, 0x0, 0x2, 0x0, 0x7}, 0x0, 0x0, r0, 0x8) r1 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r1, 0x2, r0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x8, 0x6, 0x5, 0x7, 0x0, 0x8000, 0x20, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xf98a, 0x0, @perf_bp={&(0x7f0000000580)}, 0x5125, 0xfffffffffffffff9, 0x3, 0x8, 0x0, 0x5, 0x1, 0x0, 0x4, 0x0, 0x9}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x3f, 0x0, 0x2, 0xfd, 0x0, 0x0, 0x42cab9f4a9ac2316, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0xa82, 0x0, 0x2, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x400}, 0x0, 0x40000000, r0, 0x0) r4 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r6 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r4) r7 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000280)={'fscrypt:', @desc3}, &(0x7f00000002c0)={0x0, "127ed1177daec28015a987e1e3d120f0e9916677e90c908204fe51e1e77120bc54ec303ed6f2c42d1beb3cdd6cb6f22991df253d86c1007314696200888b33d0", 0x22}, 0x48, r6) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r7, 0x0) add_key(&(0x7f0000000340)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="4d9ba23bf1", 0x5, 0xfffffffffffffffd) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000480)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r9 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r9, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r8, 0x2, r9) 01:53:58 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r1, 0x2, r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0xe0000008}) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r2, r3, 0x0) 01:53:58 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:53:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 23) 01:53:58 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x4c, &(0x7f0000000000)=0xfffffffe, 0x4) write(r1, 0x0, 0x0) recvmsg$unix(r1, &(0x7f00000003c0)={&(0x7f00000000c0), 0x6e, &(0x7f0000000300)=[{&(0x7f0000000200)=""/201, 0xc9}, {&(0x7f0000000400)=""/203, 0xcb}, {&(0x7f0000000040)}], 0x3, &(0x7f0000000340)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}, 0x12141) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3be}}, './file0\x00'}) socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8922, &(0x7f0000000080)={'veth0_to_bond\x00', 0x0}) [ 1176.305327] loop2: detected capacity change from 0 to 512 [ 1176.308405] loop7: detected capacity change from 0 to 512 [ 1176.317027] FAULT_INJECTION: forcing a failure. [ 1176.317027] name failslab, interval 1, probability 0, space 0, times 0 [ 1176.318806] CPU: 1 UID: 0 PID: 9263 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1176.318837] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1176.318850] Call Trace: [ 1176.318858] [ 1176.318867] dump_stack_lvl+0xfa/0x120 [ 1176.318905] should_fail_ex+0x4d7/0x5e0 [ 1176.318937] ? __kernfs_new_node+0xd3/0x870 [ 1176.318971] should_failslab+0xc2/0x120 [ 1176.319004] kmem_cache_alloc_noprof+0x80/0x690 [ 1176.319030] ? perf_trace_lock_acquire+0xc9/0x700 [ 1176.319071] ? __kernfs_new_node+0xd3/0x870 [ 1176.319104] __kernfs_new_node+0xd3/0x870 [ 1176.319152] ? __pfx___kernfs_new_node+0x10/0x10 [ 1176.319193] ? lock_acquire+0x15e/0x2f0 [ 1176.319223] ? kernfs_root+0x23/0x2a0 [ 1176.319256] ? find_held_lock+0x2b/0x80 [ 1176.319279] ? kernfs_root+0xee/0x2a0 [ 1176.319313] ? lock_release+0xc8/0x290 [ 1176.319340] ? lock_is_held_type+0x9e/0x120 [ 1176.319379] kernfs_new_node+0x13c/0x1e0 [ 1176.319411] __kernfs_create_file+0x55/0x360 [ 1176.319446] sysfs_add_file_mode_ns+0x21c/0x440 [ 1176.319484] ? __pfx_dev_attr_store+0x10/0x10 [ 1176.319519] internal_create_group+0x571/0xeb0 [ 1176.319568] ? __pfx_internal_create_group+0x10/0x10 [ 1176.319604] ? blk_validate_limits+0xc27/0x15c0 [ 1176.319645] ? lock_is_held_type+0x9e/0x120 [ 1176.319679] loop_configure+0xc46/0x15a0 [ 1176.319745] ? __pfx_loop_configure+0x10/0x10 [ 1176.319799] ? avc_has_extended_perms+0x107/0xf20 [ 1176.319834] ? find_held_lock+0x2b/0x80 [ 1176.319857] ? avc_has_extended_perms+0x23b/0xf20 [ 1176.319891] ? lock_release+0xc8/0x290 [ 1176.319926] lo_ioctl+0x66d/0x1ca0 [ 1176.319964] ? __pfx_lo_ioctl+0x10/0x10 [ 1176.319993] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1176.320029] ? __pfx_perf_trace_lock+0x10/0x10 [ 1176.320067] ? lock_acquire+0x15e/0x2f0 [ 1176.320096] ? __virt_addr_valid+0x1c6/0x5d0 [ 1176.320122] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1176.320156] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1176.320184] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1176.320214] ? lock_release+0xc8/0x290 [ 1176.320248] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1176.320327] ? down_write_nested+0x130/0x1f0 [ 1176.320361] ? __fget_files+0x34/0x3b0 [ 1176.320388] ? find_held_lock+0x2b/0x80 [ 1176.320411] ? __fget_files+0x203/0x3b0 [ 1176.320441] ? __pfx_lo_ioctl+0x10/0x10 [ 1176.320470] blkdev_ioctl+0x365/0x6d0 [ 1176.320506] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1176.320541] ? selinux_file_ioctl+0xb9/0x280 [ 1176.320572] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1176.320609] __x64_sys_ioctl+0x18f/0x210 [ 1176.320636] do_syscall_64+0xbf/0x390 [ 1176.320673] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1176.320696] RIP: 0033:0x7f1b64b618d7 [ 1176.320712] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1176.320734] RSP: 002b:00007f1b620d6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1176.320755] RAX: ffffffffffffffda RBX: 00007f1b64bab970 RCX: 00007f1b64b618d7 [ 1176.320770] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1176.320783] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1176.320797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1176.320809] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1176.320846] [ 1176.396588] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1176.397737] Process accounting resumed [ 1176.398269] EXT4-fs (loop7): group descriptors corrupted! [ 1176.465762] loop5: detected capacity change from 0 to 512 [ 1176.475585] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1176.477411] EXT4-fs (loop2): group descriptors corrupted! [ 1176.507400] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1176.510470] EXT4-fs (loop5): group descriptors corrupted! 01:54:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 31) 01:54:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 24) 01:54:10 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x40000, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r1, 0x2, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x8, 0x7, 0x63, 0x4, 0x0, 0x3, 0x14000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffff8, 0x1, @perf_config_ext={0x7, 0x7}, 0x11040, 0x5, 0x0, 0x3, 0x8, 0x1ff, 0x2, 0x0, 0xffffffc0, 0x0, 0x9}, 0xffffffffffffffff, 0xd, r0, 0x8) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000340)=ANY=[@ANYBLOB="030000000000016a6b6c6d6e6f707172737456065ef51725d44bd43a343cd32f5e75767778797a30313233343536dcc3e7f673c48aff7344ec13ce635d8fb7c520aa6437edb81f2b7001b3a8a92cf79ef55c5e0975b0e6aeddb9ab6c5ea59410af3ba42342a41c6d7cb79a06684d93ff706d93843ebd00c0080dd814ef985841fb2281456b"], 0x29, r2) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r2, r3, 0x0) 01:54:10 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000000f00010e000000000000000028001a"], 0x38}}, 0x0) 01:54:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 28) 01:54:10 executing program 6: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="00000000000000002e2f66696c6530009d1cebbf2ddd00c4385457bf0400766104c64d8bd11489ae5010217ef56ee0b0"]) ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000100)={'\x00', 0x80, 0x1, 0x4}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r3) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000180)=0x4, 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8922, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r4) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) 01:54:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, r1) r4 = add_key(&(0x7f0000000280)='logon\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="e41bae95175ad01155bcec3193bc882a44e657b68a0f3e1e3442cad7040d9820aaff85cc4f02482e92c0a5f3d340ee2458a1df2792b763eb378a9e0d69620206a58e48f3133e1d405117f6fd5730f362847c08708f943f8a968545cd39656560da826f701b563943b94ffb1fbe1f440a6a9d8daf4a930bd32912845f949548213b8fb3b4168373178c7a5131b99b171cd8f1d24d688e021777c263f5a3adbbfe", 0xa0, r2) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r4) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r6, 0x2, r5, 0x0) r7 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000003c0), 0x80000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f0000000400)={0x70000010}) keyctl$KEYCTL_MOVE(0x1e, r3, r0, r2, 0x0) 01:54:10 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) [ 1188.295980] loop5: detected capacity change from 0 to 512 [ 1188.297035] FAULT_INJECTION: forcing a failure. [ 1188.297035] name failslab, interval 1, probability 0, space 0, times 0 [ 1188.299095] CPU: 1 UID: 0 PID: 9282 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1188.299140] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1188.299157] Call Trace: [ 1188.299167] [ 1188.299179] dump_stack_lvl+0xfa/0x120 [ 1188.299227] should_fail_ex+0x4d7/0x5e0 [ 1188.299268] ? __kernfs_new_node+0xd3/0x870 [ 1188.299319] should_failslab+0xc2/0x120 [ 1188.299366] kmem_cache_alloc_noprof+0x80/0x690 [ 1188.299398] ? perf_trace_lock_acquire+0xc9/0x700 [ 1188.299456] ? __kernfs_new_node+0xd3/0x870 [ 1188.299507] __kernfs_new_node+0xd3/0x870 [ 1188.299568] ? __pfx___kernfs_new_node+0x10/0x10 [ 1188.299629] ? lock_acquire+0x15e/0x2f0 [ 1188.299672] ? kernfs_root+0x23/0x2a0 [ 1188.299723] ? find_held_lock+0x2b/0x80 [ 1188.299755] ? kernfs_root+0xee/0x2a0 [ 1188.299806] ? lock_release+0xc8/0x290 [ 1188.299847] ? lock_is_held_type+0x9e/0x120 [ 1188.299902] kernfs_new_node+0x13c/0x1e0 [ 1188.299945] kernfs_create_dir_ns+0x4d/0x1a0 [ 1188.299986] internal_create_group+0xa7f/0xeb0 [ 1188.300042] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1188.300102] ? __pfx_internal_create_group+0x10/0x10 [ 1188.300155] ? blk_validate_limits+0xc27/0x15c0 [ 1188.300213] ? lock_is_held_type+0x9e/0x120 [ 1188.300263] loop_configure+0xc46/0x15a0 [ 1188.300350] ? __pfx_loop_configure+0x10/0x10 [ 1188.300423] ? avc_has_extended_perms+0x107/0xf20 [ 1188.300474] ? find_held_lock+0x2b/0x80 [ 1188.300506] ? avc_has_extended_perms+0x23b/0xf20 [ 1188.300556] ? lock_release+0xc8/0x290 [ 1188.300607] lo_ioctl+0x66d/0x1ca0 [ 1188.300661] ? __pfx_lo_ioctl+0x10/0x10 [ 1188.300717] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1188.300771] ? __pfx_perf_trace_lock+0x10/0x10 [ 1188.300826] ? lock_acquire+0x15e/0x2f0 [ 1188.300869] ? __virt_addr_valid+0x1c6/0x5d0 [ 1188.300903] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1188.300950] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1188.300993] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1188.301035] ? lock_release+0xc8/0x290 [ 1188.301084] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1188.301190] ? down_write_nested+0x130/0x1f0 [ 1188.301242] ? __fget_files+0x34/0x3b0 [ 1188.301280] ? find_held_lock+0x2b/0x80 [ 1188.301311] ? __fget_files+0x203/0x3b0 [ 1188.301353] ? __pfx_lo_ioctl+0x10/0x10 [ 1188.301396] blkdev_ioctl+0x365/0x6d0 [ 1188.301451] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1188.301507] ? selinux_file_ioctl+0xb9/0x280 [ 1188.301549] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1188.301605] __x64_sys_ioctl+0x18f/0x210 [ 1188.301640] do_syscall_64+0xbf/0x390 [ 1188.301693] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1188.301723] RIP: 0033:0x7fd2e63058d7 [ 1188.301745] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1188.301773] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1188.301800] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e63058d7 [ 1188.301820] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1188.301837] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1188.301854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1188.301871] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1188.301917] [ 1188.354029] loop2: detected capacity change from 0 to 512 [ 1188.403889] FAULT_INJECTION: forcing a failure. [ 1188.403889] name failslab, interval 1, probability 0, space 0, times 0 [ 1188.405982] CPU: 1 UID: 0 PID: 9292 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1188.406019] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1188.406036] Call Trace: [ 1188.406046] 01:54:10 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) [ 1188.406057] dump_stack_lvl+0xfa/0x120 [ 1188.406104] should_fail_ex+0x4d7/0x5e0 [ 1188.406152] ? __kernfs_new_node+0xd3/0x870 [ 1188.406202] should_failslab+0xc2/0x120 [ 1188.406248] kmem_cache_alloc_noprof+0x80/0x690 [ 1188.406280] ? perf_trace_lock_acquire+0xc9/0x700 [ 1188.406338] ? __kernfs_new_node+0xd3/0x870 [ 1188.406387] __kernfs_new_node+0xd3/0x870 [ 1188.406446] ? __pfx___kernfs_new_node+0x10/0x10 [ 1188.406506] ? lock_acquire+0x15e/0x2f0 01:54:10 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() tkill(r1, 0x31) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x7f, 0xfe, 0x9, 0x0, 0x0, 0x20, 0x1064, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x1, @perf_config_ext={0x4, 0x100000001}, 0x50200, 0x8, 0xb1a, 0x7, 0x2, 0x5, 0x0, 0x0, 0xffffff00, 0x0, 0x2}, r1, 0x4, r0, 0x3) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r2, r3, 0x0) [ 1188.406549] ? kernfs_root+0x23/0x2a0 [ 1188.406600] ? find_held_lock+0x2b/0x80 [ 1188.406631] ? kernfs_root+0xee/0x2a0 [ 1188.406681] ? lock_release+0xc8/0x290 [ 1188.406721] ? lock_is_held_type+0x9e/0x120 [ 1188.406775] kernfs_new_node+0x13c/0x1e0 [ 1188.406816] __kernfs_create_file+0x55/0x360 [ 1188.406864] sysfs_add_file_mode_ns+0x21c/0x440 [ 1188.406918] ? __pfx_dev_attr_store+0x10/0x10 [ 1188.406967] internal_create_group+0x571/0xeb0 [ 1188.407037] ? __pfx_internal_create_group+0x10/0x10 [ 1188.407089] ? blk_validate_limits+0xc27/0x15c0 [ 1188.407146] ? lock_is_held_type+0x9e/0x120 [ 1188.407194] loop_configure+0xc46/0x15a0 [ 1188.407278] ? __pfx_loop_configure+0x10/0x10 [ 1188.407350] ? avc_has_extended_perms+0x107/0xf20 [ 1188.407399] ? find_held_lock+0x2b/0x80 [ 1188.407430] ? avc_has_extended_perms+0x23b/0xf20 [ 1188.407479] ? lock_release+0xc8/0x290 [ 1188.407529] lo_ioctl+0x66d/0x1ca0 [ 1188.407581] ? __pfx_lo_ioctl+0x10/0x10 [ 1188.407622] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1188.407675] ? __pfx_perf_trace_lock+0x10/0x10 [ 1188.407729] ? lock_acquire+0x15e/0x2f0 [ 1188.407771] ? __virt_addr_valid+0x1c6/0x5d0 [ 1188.407804] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1188.407851] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1188.407892] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1188.407934] ? lock_release+0xc8/0x290 [ 1188.407982] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1188.408086] ? down_write_nested+0x130/0x1f0 [ 1188.408136] ? __fget_files+0x34/0x3b0 [ 1188.408174] ? find_held_lock+0x2b/0x80 [ 1188.408206] ? __fget_files+0x203/0x3b0 [ 1188.408246] ? __pfx_lo_ioctl+0x10/0x10 [ 1188.408288] blkdev_ioctl+0x365/0x6d0 [ 1188.408340] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1188.408392] ? selinux_file_ioctl+0xb9/0x280 [ 1188.408433] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1188.408488] __x64_sys_ioctl+0x18f/0x210 [ 1188.408523] do_syscall_64+0xbf/0x390 [ 1188.408575] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1188.408603] RIP: 0033:0x7f94bafef8d7 [ 1188.408624] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1188.408654] RSP: 002b:00007f94b8564f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1188.408697] RAX: ffffffffffffffda RBX: 00007f94bb039970 RCX: 00007f94bafef8d7 [ 1188.408715] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1188.408732] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1188.408749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1188.408765] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1188.408811] [ 1188.476791] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=15 sclass=netlink_xfrm_socket pid=9297 comm=syz-executor.1 [ 1188.494464] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1188.495656] EXT4-fs (loop5): group descriptors corrupted! [ 1188.541229] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1188.543136] EXT4-fs (loop2): group descriptors corrupted! 01:54:10 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001000010e000000000000000028001a"], 0x38}}, 0x0) 01:54:10 executing program 0: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000380)='devices.allow\x00', 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0), 0x2000, 0x0) fcntl$dupfd(r0, 0x0, r1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc2}, &(0x7f0000000300)={0x0, "f51fd06a3b1d180ae9dd0216f471535b01e0aafe1fded59f12b827f4cef81aefa0a1b02691bad98df17ff5ad64335c9be9339fe68d0837571d8177586d13a4a0", 0x15}, 0x48, r4) keyctl$KEYCTL_MOVE(0x1e, r3, r3, r4, 0x1) [ 1188.647812] loop7: detected capacity change from 0 to 512 01:54:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 32) [ 1188.695059] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1188.696849] EXT4-fs (loop7): group descriptors corrupted! 01:54:10 executing program 3: perf_event_open(0x0, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) [ 1188.748953] FAULT_INJECTION: forcing a failure. [ 1188.748953] name failslab, interval 1, probability 0, space 0, times 0 [ 1188.750065] CPU: 0 UID: 0 PID: 9316 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1188.750085] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1188.750094] Call Trace: [ 1188.750099] [ 1188.750108] dump_stack_lvl+0xfa/0x120 [ 1188.750134] should_fail_ex+0x4d7/0x5e0 [ 1188.750155] ? __kernfs_new_node+0xd3/0x870 [ 1188.750179] should_failslab+0xc2/0x120 [ 1188.750202] kmem_cache_alloc_noprof+0x80/0x690 [ 1188.750218] ? perf_trace_lock_acquire+0xc9/0x700 [ 1188.750251] ? __kernfs_new_node+0xd3/0x870 [ 1188.750274] __kernfs_new_node+0xd3/0x870 [ 1188.750301] ? __pfx___kernfs_new_node+0x10/0x10 [ 1188.750328] ? lock_acquire+0x15e/0x2f0 [ 1188.750348] ? kernfs_root+0x23/0x2a0 [ 1188.750372] ? find_held_lock+0x2b/0x80 [ 1188.750386] ? kernfs_root+0xee/0x2a0 [ 1188.750409] ? lock_release+0xc8/0x290 [ 1188.750428] ? lock_is_held_type+0x9e/0x120 [ 1188.750454] kernfs_new_node+0x13c/0x1e0 [ 1188.750473] __kernfs_create_file+0x55/0x360 [ 1188.750496] sysfs_add_file_mode_ns+0x21c/0x440 [ 1188.750521] ? __pfx_dev_attr_store+0x10/0x10 [ 1188.750546] internal_create_group+0x571/0xeb0 [ 1188.750578] ? __pfx_internal_create_group+0x10/0x10 [ 1188.750602] ? blk_validate_limits+0xc27/0x15c0 [ 1188.750629] ? lock_is_held_type+0x9e/0x120 [ 1188.750651] loop_configure+0xc46/0x15a0 [ 1188.750690] ? __pfx_loop_configure+0x10/0x10 [ 1188.750722] ? avc_has_extended_perms+0x107/0xf20 [ 1188.750747] ? find_held_lock+0x2b/0x80 [ 1188.750761] ? avc_has_extended_perms+0x23b/0xf20 [ 1188.750784] ? lock_release+0xc8/0x290 [ 1188.750806] lo_ioctl+0x66d/0x1ca0 [ 1188.750830] ? __pfx_lo_ioctl+0x10/0x10 [ 1188.750849] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1188.750873] ? __pfx_perf_trace_lock+0x10/0x10 [ 1188.750898] ? lock_acquire+0x15e/0x2f0 [ 1188.750918] ? __virt_addr_valid+0x1c6/0x5d0 [ 1188.750934] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1188.750957] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1188.750976] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1188.750996] ? lock_release+0xc8/0x290 [ 1188.751018] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1188.751066] ? down_write_nested+0x130/0x1f0 [ 1188.751089] ? __fget_files+0x34/0x3b0 [ 1188.751107] ? find_held_lock+0x2b/0x80 [ 1188.751121] ? __fget_files+0x203/0x3b0 [ 1188.751140] ? __pfx_lo_ioctl+0x10/0x10 [ 1188.751159] blkdev_ioctl+0x365/0x6d0 [ 1188.751184] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1188.751207] ? selinux_file_ioctl+0xb9/0x280 [ 1188.751227] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1188.751252] __x64_sys_ioctl+0x18f/0x210 [ 1188.751268] do_syscall_64+0xbf/0x390 [ 1188.751293] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1188.751306] RIP: 0033:0x7f1b64b618d7 [ 1188.751316] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1188.751329] RSP: 002b:00007f1b620d6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1188.751342] RAX: ffffffffffffffda RBX: 00007f1b64bab970 RCX: 00007f1b64b618d7 [ 1188.751351] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1188.751359] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1188.751366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1188.751374] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1188.751395] 01:54:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 25) 01:54:10 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001100010e000000000000000028001a"], 0x38}}, 0x0) [ 1188.837849] loop5: detected capacity change from 0 to 512 01:54:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 29) [ 1188.892571] loop2: detected capacity change from 0 to 512 [ 1188.896833] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1188.897622] EXT4-fs (loop5): group descriptors corrupted! [ 1188.903238] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1188.904026] EXT4-fs (loop2): group descriptors corrupted! 01:54:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r2, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r0, r4, 0x0) 01:54:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 33) 01:54:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 26) 01:54:11 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 1189.004512] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1189.031742] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1189.041882] loop2: detected capacity change from 0 to 512 [ 1189.060741] loop5: detected capacity change from 0 to 512 [ 1189.081018] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1189.081821] EXT4-fs (loop2): group descriptors corrupted! [ 1189.084744] loop7: detected capacity change from 0 to 512 [ 1189.085753] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1189.086681] EXT4-fs (loop5): group descriptors corrupted! [ 1189.107466] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1189.108271] EXT4-fs (loop7): group descriptors corrupted! 01:54:23 executing program 3: perf_event_open(0x0, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:54:23 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r2, &(0x7f0000000340)='asymmetric\x00', &(0x7f0000000380)={'syz', 0x2}, r1) r4 = request_key(&(0x7f0000000280)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='keyring\x00', r1) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$KEYCTL_MOVE(0x1e, r3, r0, r2, 0x0) 01:54:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 30) 01:54:23 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$sg(&(0x7f00000005c0), 0x6, 0x103402) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) add_key$keyring(&(0x7f0000000600), &(0x7f0000000640)={'syz', 0x1}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7f, 0xc5, 0x2, 0x9, 0x0, 0x7, 0x15f1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x2, 0xb22a}, 0x400, 0x200, 0x0, 0x3, 0x88a, 0x40, 0x401, 0x0, 0x7, 0x0, 0x5a64}, r7, 0x0, r0, 0x8) r8 = add_key$fscrypt_v1(&(0x7f00000004c0), &(0x7f0000000500)={'fscrypt:', @desc1}, &(0x7f0000000540)={0x0, "71e97cf8e6459a52c1eb95ef54ebba92980a043d08c08af55411ba6be2b1aa0b6501d067c53f736c9e6b926123d01d6ab60a3ccf031c4b95f22db856302d7559", 0x35}, 0x48, r6) add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) r10 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r10, r2, r9, 0x0) add_key$fscrypt_v1(&(0x7f0000000340), &(0x7f0000000380)={'fscrypt:', @desc3}, &(0x7f00000003c0)={0x0, "7fce78b6b9ac2204dea3a36e3b507e9a89b2b31ad9b9b639c75d0a0ddfe2ff2ae6da490a5946748a61eb4df585e427bd4d5fdbae1b4dec78725c5efb00b546ee", 0x3b}, 0x48, 0xfffffffffffffffa) 01:54:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 27) 01:54:23 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380200001200010e000000000000000028001a"], 0x38}}, 0x0) 01:54:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 34) 01:54:23 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r2, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000002f80)=0x0) r4 = clone3(&(0x7f00000032c0)={0x10001000, &(0x7f0000003140), &(0x7f0000003180), &(0x7f00000031c0), {0x15}, &(0x7f0000003200)=""/14, 0xe, &(0x7f0000003240)=""/14, &(0x7f0000003280)=[0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) r5 = socket(0x29, 0x3, 0x81) sendmsg$nl_xfrm(r5, &(0x7f0000004a40)={&(0x7f0000004700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000004a00)={&(0x7f0000004740)=@acquire={0x2bc, 0x17, 0x200, 0x70bd2d, 0x25dfdbfd, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4d2, 0x32}, @in=@broadcast, {@in6=@local, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x101, 0x4e23, 0x20, 0xa, 0x80, 0x80, 0x32, 0x0, r1}, {{@in6=@dev={0xfe, 0x80, '\x00', 0x39}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x4e24, 0xf5e0, 0x4e24, 0x4, 0x0, 0x20, 0x0, 0x0, 0x0, r1}, {0x5, 0x400, 0xfff, 0x4, 0x29ee, 0x0, 0x806, 0x7fff}, {0x4, 0xfffffffffffffffb, 0x1, 0xc86}, 0x7, 0x6e6bb6, 0x0, 0x0, 0x1}, 0x4, 0x0, 0x8001, 0x70bd2c}, [@replay_thresh={0x8, 0xb, 0x3ff}, @tmpl={0x184, 0x5, [{{@in=@dev={0xac, 0x14, 0x14, 0x1f}, 0x4d6, 0x33}, 0xa, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x34ff, 0x1, 0x2, 0x7, 0x1ff, 0x4211, 0x3ff}, {{@in=@multicast2, 0x4d6, 0x2b}, 0x2, @in6=@local, 0x3502, 0x0, 0x1, 0x3f, 0x5, 0x6}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0x33}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x32}, 0x0, 0x1, 0x2, 0xff, 0x8a3e, 0x8, 0x1}, {{@in=@multicast1, 0x4d6, 0x33}, 0xa, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3503, 0x4, 0x2, 0x1, 0x96, 0x1, 0xfdc}, {{@in6=@remote, 0x4d2, 0x6c}, 0x2, @in6=@loopback, 0x3500, 0x4, 0x3, 0x7c, 0x4, 0xc0000}, {{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, 0x4d5, 0x2b}, 0x2, @in6=@private1, 0x3504, 0x1, 0x1, 0x81, 0x6, 0x1f, 0x6}]}, @XFRMA_SET_MARK={0x8, 0x1d, 0x6}]}, 0x2bc}, 0x1, 0x0, 0x0, 0x48000}, 0x40010) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r6, 0x0, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r7, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) ioctl$sock_SIOCGSKNS(r7, 0x894c, &(0x7f00000046c0)=0x20) r8 = syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000004600)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004680)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000004580)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="2d000500273d6e58f2e17ed4ae6e0200000000000000056cd3cc579d1296c12b6c0721a9f8923ce50f59e1dc68000000040000"], 0x4ac}, {&(0x7f00000005c0)={0x1180, 0x5, 0x108, 0x70bd26, 0x25dfdbfe, "", [@nested={0x114d, 0x1f, 0x0, 0x1, [@generic="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", @typed={0x8, 0x35, 0x0, 0x0, @u32=0x2}, @typed={0x4, 0x82}, @typed={0x5, 0x35, 0x0, 0x0, @str='\x00'}, @typed={0xc, 0x96, 0x0, 0x0, @u64=0x280000000000}, @generic="67227d3974b64cbfcbc06b02a2fada5f40aa23121dc691606ca995bd8acb15838b5193f6f407f92d80d78e0687f657fc9b0e7dff95", @typed={0xe9, 0x56, 0x0, 0x0, @binary="918a7c20a6b49570346f11a749fe426e949dcc47abb46a4058576d10502e3a7c59404fef1004c4fd8cdca1adb15ae0d2c34382f302995cc67048a2db95fb6b2fed67f7e007f8fe4b2b88ddd4d57586b918ce66f3753d0d046588256c31cce13688d0c159872c4cb3ae73dd0f5722d1165b3ea032e50f16c20ed684881c67eaaa2423e10ef46e73005e003ef2e54fce437b78afa1a9d19149b0d5f3eef7bfa090502d921c268646f7652be2a64ebc6960ebc6016294c7c8003c189e9d93dda34c12a5047c81590eb9e84230a69b99b952ee11c2e1c3f921e53c349ef6bdef852839d0b96156"}, @typed={0x8, 0x7e, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x35}}]}, @nested={0x20, 0x6a, 0x0, 0x1, [@typed={0x8, 0x53, 0x0, 0x0, @pid}, @typed={0x14, 0x5b, 0x0, 0x0, @ipv6=@remote}]}]}, 0x1180}, {&(0x7f0000001740)={0x1650, 0x41, 0x20, 0x70bd2c, 0x25dfdbfc, "", [@generic="a55eadf650aa14f32ed3e43b9ce557d3e8e8cb9cd8b94349985e8ff1a9a9b96a0ed7932a3fc3d0797279e055c5b64dbb517d664b75d29f231d6c603ae1d6840e304fb9405ea5e83cb370eff6df16c87f10fcda2363882d92005039460a", @nested={0x124, 0x1b, 0x0, 0x1, [@generic="35f2900774191d3dec09c3c071be8410ecc53d34c328e9a1afcfe9375a4f384837bbb2c69782c07c8d82d286f90e47bebaf100abcedd844b6e985616a6b6c6703030fa719b35f5dfc84af70ed9a02ccfcc0eb82cf9715858a0598345c438735d436672f4f466b94cf70c7b5f8d603282b9354147d4800b8d17a03c745c775be65a17c8a9310b65fb1c39a07ffc76bf74afe085599fd4ac741157", @generic="421d3d2d56eaf1c56f0b2e4a9288db27349ae368556f0bf7ff1ce72a393076868af44cc9d04a0016cabb3c1210837f12bf8a763ddee1a158fa6dab5d380fb9549325b7c927ab2a7860a42cbae92dc59cc843ab6f3b2267f49c548683943b31ee21073d5d3dab933d11d441ea313f707d239e1ce7e9a003e48371400f02640260a4a49327afd4"]}, @nested={0x1166, 0x6d, 0x0, 0x1, [@typed={0x1004, 0x66, 0x0, 0x0, @binary="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"}, @generic="699e0447098e6215f17da26a63530b86c76d1c36d7a54145d79992122be1060cf3ca9ed15baa1d99facca0d423da1e867ccb4e85be5ccd293962bb502d58f9f445f4ca1a1838b4ba6d9b574d7b810cdba43b79ba26631da743b734e3bc38006443e14b1cfae577bdbf7ed20cfeadd64f145873f62bfd99fc05ce0693cd748cbde70f7fba3ff791f2ee6e9ba0ba7d41b20d955080d64a1167249f0cecebb7285e2b2ddcd8ab323efd8177ff35f66592a32752500be2cf4f5c3bba61e32be229e5890edf4a389a60081a05b4b75218177b2804e3ae7e53530067e2ec3651a079e9f9017472f9d59c0d71e1049215d8", @typed={0x8, 0x6, 0x0, 0x0, @u32=0xff}, @typed={0x57, 0x91, 0x0, 0x0, @binary="1058759c341bbfa16e7e7167049ebc4e8de7ae1af2ec59e7f4759129332913ecb32d2781ca3ba0724d0523f2f02b0a4ef865cd76e1dcddbcc125f0a1de3b8265edff94a8c02d37ff16fe6e73edd31d32243a09"}, @typed={0x8, 0x58, 0x0, 0x0, @u32=0x4}, @typed={0x5, 0x33, 0x0, 0x0, @str='\x00'}]}, @nested={0xb6, 0x3a, 0x0, 0x1, [@generic="4b3cd058805c5ca736d4834e73fcc4e93432419d663420720ed4a43832989fcbe4efc12cb606d29211b6cd67eb74edf31d4a7c13917b5e0d7cef2ba9aa0e5aba2afc9b3c6676223b2768754ef3587f32e11364e80bb35f123daad59525db8ab672d74ba213a39ef88a4f4dedf0f55d68b648705b733eec672a218fb55666b538ee284c7345d1cf98fd3fef0805796d43311041090dd6c82564f0a179217d268cae7aa0ea651fc53eff419cf7d474e770c379"]}, @nested={0x23a, 0x74, 0x0, 0x1, [@generic="dfc49cca817dd86f6b92d7f0817aae97d6035d08fcd502c59ad58e9e5d476eb50c15ca8abd8f2f62721580e18377904d461c3c45d9aeb8d58f90fc75189d785e262d43a66b77a200638f80dc0b4431164c4b7675dfeb8ef0e9ca49406a400de5d9dfee46d52c7be8f0667b5b04e453050e0223cc7788748ce5bd81eba1f399916b0472890b16ec3177b0a2282eb6b9834be5316133b85b64bc8ff839af", @generic="7e5c33365c4f12f93531c7756e9b3577d0f07c492ac94ccf64f02a53cd48eb98adc44ace37797eca6fb74ae01a170ed681241c08335d48090dba30bf5b498c6a0df1844779b8f0085b0db4782d27649aebda92bf149b4e0ed8d906fc497b63763a3a1888d7fce15c7d2691b9c39063be98", @generic="0dd9ff2c80c30874249d394f065475c50d9a9251528283a99149a055a981a6f4bde6a21c15a03d01acbe17039a4c3f2f3605b807cef55d7256f57b35204b1ee584a7fa08ee6324289c397c312c4bb9e962b308c11524d4852758df067a8bf73c306005fe55a608eddf5e60d070f731b3ec524b63b436fb00dd834e784e53131c02d217c1612663ed65ff0e3adfa88d6736b706cf6080782d6cf1bf2ba69ecf420a01884492d4fcab6430c7ec7da3828d00f730384352e3479d495b7c130bd1c6be622228d9ca7274ddb654754ca4604371a9ab3b628ced12d2c032981d6c03c2f14e4e15e3e5c4264f78ca773d89d21c0e61", @generic="3641bc", @typed={0x4, 0x67}, @generic="a88f67", @typed={0x8, 0x90, 0x0, 0x0, @u32=0x8001}, @typed={0x8, 0x59, 0x0, 0x0, @u32=0x3}, @typed={0x8, 0x57, 0x0, 0x0, @u32=0x2}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback}]}, @generic="5d16659ac554a5a34bd052348a53b6bf6478a396a4c331cd950eec1b4516b5cb60c27814d5878c6570aba7edac3c0b62a528daf3b0ac149e56e175a591f97f94a5d27b50e1026e3297155b85551d6d52c5a7f099aac0e36e79d7980b94e4a46e86e9"]}, 0x1650}, {&(0x7f0000002dc0)={0x18, 0x22, 0x200, 0x70bd2c, 0x25dfdbfc, "", [@typed={0x8, 0x1a, 0x0, 0x0, @ipv4=@private=0xa010102}]}, 0x18}, {&(0x7f0000002e00)={0x44, 0x23, 0x8, 0x70bd25, 0x25dfdbfe, "", [@generic="22ef0d137997f0e585cdac70fe7e7a06eebfd6ac638311d0b338aa15f392a6b66fc182f23c5988cc1fe0072ed3418468b7"]}, 0x44}, {&(0x7f0000002e80)={0xc4, 0x25, 0x300, 0x70bd2a, 0x25dfdbfb, "", [@typed={0x8, 0x49, 0x0, 0x0, @fd=r2}, @typed={0xa9, 0x70, 0x0, 0x0, @binary="0548dd89a48d548398f262f42c7522ed379045d9134718661cd8addc5c6d88283dd62367dd9952b4b701be4727d357be02c124d2fed54465611875f7140156e9c1ad33e3aab22dcd7ecae01c99e8a38fc8fc1df34c66fccad0ca2c234fc1cd7c8ed2beecd181f67ebad943a1dd267ff2d11a5a1abe53c2ce19568321f3bb3c8e287a088c673260bd78aedf8d20a6b2b00b2124456d5f1a00dfee607c5b38917275a5d9529c"}]}, 0xc4}, {&(0x7f0000002fc0)={0x150, 0x15, 0x20, 0x70bd2b, 0x25dfdbfb, "", [@typed={0x8, 0x83, 0x0, 0x0, @pid=r3}, @nested={0xc, 0x1e, 0x0, 0x1, [@typed={0x8, 0x3f, 0x0, 0x0, @pid=0xffffffffffffffff}]}, @nested={0x12b, 0x47, 0x0, 0x1, [@typed={0xc, 0x17, 0x0, 0x0, @u64=0x80000000}, @generic="c08588bef25f88526c05f35c9ccedd81d27d665dd8dce800385d8f18a8ed07f45fdc6cafe333422aa9450b55857a9f9cb037ca26370d1992024092c227e4bf4bb2f367d4bcb72e72dd3c19b833d37ac5a27ff5fe33f77a353f7494f3c48dc2e4d708ee53e808038f56fdcf596280ce7549019077c52504c02ad99afa6d23a80eab113527bd3d5cea24698c343c78d878c240a39ff33f05ac57c6da642cd7cb449678a2853756f271f0a107cfac521de91dcab33cda83a42d42162d12c44cc01251c050653dff3421a61569d9a6c290648e266c4989d7edb24d0e9be3cdd170f6b2b6cbcae1425978469ca7", @typed={0x30, 0x25, 0x0, 0x0, @binary="535f3ae4735d22c3eb9e48067baacf873e20fd2fd2b280567345693fbb3e21ad60e3bbd644140905946967f8"}]}]}, 0x150}, {&(0x7f0000003340)={0x1228, 0x2b, 0x20, 0x70bd2a, 0x3, "", [@generic="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", @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @pid=r4}]}, @generic="e27a325d3532e45fbf5edb2ba8ec48ce5f9bbe6f5f942a81776984c44bf7be6909e1283d207afa73a2e0df063f65dbaa71b3ebea6b5b13f3b80c189baaf82680b887def1af4e43e78bd74b05985ccd80a42a35d9427ed3d7bd3ee2dc", @generic="0396f1727c683247a3f3b35907173a809c888c672a590b2cfa62156c72486840b1ad26ee2da417932a816d4811eea237db0c38ef9feceb403fc799b1e5592fc4e07ec5306aadd76cf8b87ddc511489fbddcaa10c5978b8afe13603cffc32844b49df810e138d6655ef160f3d85e15cf56fec2275ec9410dce5cf657357c3ad5663ca76e35e175a170e24c2c039f1eedb51278117a421b53a98dc8d11ca25039428ef9211e040d8f8a39a9d1b8f7749795ab5e736ee", @typed={0x14, 0x3, 0x0, 0x0, @ipv6=@loopback}, @generic="eac38efa41a825df2745b1229c8d0c08535e2a02b7967753386944f3af76afa0643ba8866e7e694b797ff50101a7773183a5aa7317e8c70492f0a7f6a4ffc070ebbcaeba13fe0b01c42b452e65f74c7db0b248d7510929d528b02107fe869df7bad8073890673ee483a9a4df631cebd85b9ead9f252124ce0edd723701f854ba0df185f88ef8f62d7f3e5b2f57f6e4d4e80f6959087e4ed265a0a066521513addfd49bcc13148ad5805000ada4b14d3f392062a1060d74d2fac8e9a135477fd04712abb9e9ca1e491fc4f6a928ac73bbec8820b20aee51282013bf92b4c66bc0fde8206dea372e"]}, 0x1228}], 0x8, &(0x7f0000004640)=[@rights={{0x30, 0x1, 0x1, [r0, r6, r8, r0, r9, r0, r0, r0]}}], 0x30, 0x10}, 0x4040000) [ 1201.571787] loop2: detected capacity change from 0 to 512 [ 1201.587514] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1201.588408] EXT4-fs (loop2): group descriptors corrupted! [ 1201.610012] FAULT_INJECTION: forcing a failure. [ 1201.610012] name failslab, interval 1, probability 0, space 0, times 0 [ 1201.612096] CPU: 1 UID: 0 PID: 9361 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1201.612137] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1201.612151] Call Trace: [ 1201.612160] [ 1201.612169] dump_stack_lvl+0xfa/0x120 [ 1201.612209] should_fail_ex+0x4d7/0x5e0 [ 1201.612243] ? __kernfs_new_node+0xd3/0x870 [ 1201.612279] should_failslab+0xc2/0x120 [ 1201.612314] kmem_cache_alloc_noprof+0x80/0x690 [ 1201.612341] ? perf_trace_lock_acquire+0xc9/0x700 [ 1201.612385] ? __kernfs_new_node+0xd3/0x870 [ 1201.612432] __kernfs_new_node+0xd3/0x870 [ 1201.612476] ? __pfx___kernfs_new_node+0x10/0x10 [ 1201.612520] ? lock_acquire+0x15e/0x2f0 [ 1201.612553] ? kernfs_root+0x23/0x2a0 [ 1201.612590] ? find_held_lock+0x2b/0x80 [ 1201.612616] ? kernfs_root+0xee/0x2a0 [ 1201.612651] ? lock_release+0xc8/0x290 [ 1201.612680] ? lock_is_held_type+0x9e/0x120 [ 1201.612723] kernfs_new_node+0x13c/0x1e0 [ 1201.612757] __kernfs_create_file+0x55/0x360 [ 1201.612794] sysfs_add_file_mode_ns+0x21c/0x440 [ 1201.612835] ? __pfx_dev_attr_store+0x10/0x10 [ 1201.612873] internal_create_group+0x571/0xeb0 [ 1201.612926] ? __pfx_internal_create_group+0x10/0x10 [ 1201.612963] ? blk_validate_limits+0xc27/0x15c0 [ 1201.613007] ? lock_is_held_type+0x9e/0x120 [ 1201.613044] loop_configure+0xc46/0x15a0 [ 1201.613115] ? __pfx_loop_configure+0x10/0x10 [ 1201.613173] ? avc_has_extended_perms+0x107/0xf20 [ 1201.613211] ? find_held_lock+0x2b/0x80 [ 1201.613236] ? avc_has_extended_perms+0x23b/0xf20 [ 1201.613272] ? lock_release+0xc8/0x290 [ 1201.613310] lo_ioctl+0x66d/0x1ca0 [ 1201.613350] ? __pfx_lo_ioctl+0x10/0x10 [ 1201.613381] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1201.613420] ? __pfx_perf_trace_lock+0x10/0x10 [ 1201.613461] ? lock_acquire+0x15e/0x2f0 [ 1201.613492] ? __virt_addr_valid+0x1c6/0x5d0 [ 1201.613519] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1201.613555] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 01:54:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 28) [ 1201.613586] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1201.613617] ? lock_release+0xc8/0x290 [ 1201.613654] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1201.613739] ? down_write_nested+0x130/0x1f0 [ 1201.613775] ? __fget_files+0x34/0x3b0 [ 1201.613804] ? find_held_lock+0x2b/0x80 [ 1201.613828] ? __fget_files+0x203/0x3b0 [ 1201.613860] ? __pfx_lo_ioctl+0x10/0x10 [ 1201.613891] blkdev_ioctl+0x365/0x6d0 [ 1201.613929] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1201.613966] ? selinux_file_ioctl+0xb9/0x280 [ 1201.613999] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1201.614039] __x64_sys_ioctl+0x18f/0x210 [ 1201.614068] do_syscall_64+0xbf/0x390 [ 1201.614106] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1201.614131] RIP: 0033:0x7f1b64b618d7 [ 1201.614149] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1201.614172] RSP: 002b:00007f1b620d6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1201.614194] RAX: ffffffffffffffda RBX: 00007f1b64bab970 RCX: 00007f1b64b618d7 [ 1201.614210] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1201.614224] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1201.614238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1201.614252] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1201.614291] [ 1201.688810] FAULT_INJECTION: forcing a failure. [ 1201.688810] name failslab, interval 1, probability 0, space 0, times 0 [ 1201.690969] CPU: 1 UID: 0 PID: 9369 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1201.691002] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1201.691016] Call Trace: [ 1201.691024] [ 1201.691033] dump_stack_lvl+0xfa/0x120 [ 1201.691073] should_fail_ex+0x4d7/0x5e0 [ 1201.691114] ? __kernfs_new_node+0xd3/0x870 [ 1201.691150] should_failslab+0xc2/0x120 [ 1201.691184] kmem_cache_alloc_noprof+0x80/0x690 [ 1201.691212] ? perf_trace_lock_acquire+0xc9/0x700 [ 1201.691255] ? __kernfs_new_node+0xd3/0x870 [ 1201.691291] __kernfs_new_node+0xd3/0x870 [ 1201.691335] ? __pfx___kernfs_new_node+0x10/0x10 [ 1201.691379] ? lock_acquire+0x15e/0x2f0 [ 1201.691410] ? kernfs_root+0x23/0x2a0 [ 1201.691447] ? find_held_lock+0x2b/0x80 [ 1201.691472] ? kernfs_root+0xee/0x2a0 [ 1201.691508] ? lock_release+0xc8/0x290 [ 1201.691537] ? lock_is_held_type+0x9e/0x120 [ 1201.691579] kernfs_new_node+0x13c/0x1e0 [ 1201.691613] __kernfs_create_file+0x55/0x360 [ 1201.691650] sysfs_add_file_mode_ns+0x21c/0x440 [ 1201.691691] ? __pfx_dev_attr_store+0x10/0x10 [ 1201.691731] internal_create_group+0x571/0xeb0 [ 1201.691784] ? __pfx_internal_create_group+0x10/0x10 [ 1201.691822] ? blk_validate_limits+0xc27/0x15c0 [ 1201.691866] ? lock_is_held_type+0x9e/0x120 [ 1201.691903] loop_configure+0xc46/0x15a0 [ 1201.691973] ? __pfx_loop_configure+0x10/0x10 [ 1201.692031] ? avc_has_extended_perms+0x107/0xf20 [ 1201.692068] ? find_held_lock+0x2b/0x80 [ 1201.692093] ? avc_has_extended_perms+0x23b/0xf20 [ 1201.692129] ? lock_release+0xc8/0x290 [ 1201.692167] lo_ioctl+0x66d/0x1ca0 [ 1201.692208] ? __pfx_lo_ioctl+0x10/0x10 [ 1201.692238] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1201.692277] ? __pfx_perf_trace_lock+0x10/0x10 [ 1201.692318] ? lock_acquire+0x15e/0x2f0 [ 1201.692349] ? __virt_addr_valid+0x1c6/0x5d0 [ 1201.692376] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1201.692425] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1201.692457] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1201.692488] ? lock_release+0xc8/0x290 [ 1201.692525] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1201.692609] ? down_write_nested+0x130/0x1f0 [ 1201.692645] ? __fget_files+0x34/0x3b0 [ 1201.692674] ? find_held_lock+0x2b/0x80 [ 1201.692699] ? __fget_files+0x203/0x3b0 [ 1201.692731] ? __pfx_lo_ioctl+0x10/0x10 [ 1201.692762] blkdev_ioctl+0x365/0x6d0 [ 1201.692799] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1201.692838] ? selinux_file_ioctl+0xb9/0x280 [ 1201.692870] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1201.692910] __x64_sys_ioctl+0x18f/0x210 [ 1201.692939] do_syscall_64+0xbf/0x390 [ 1201.692978] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1201.693002] RIP: 0033:0x7f94bafef8d7 [ 1201.693021] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1201.693043] RSP: 002b:00007f94b8564f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1201.693066] RAX: ffffffffffffffda RBX: 00007f94bb039970 RCX: 00007f94bafef8d7 [ 1201.693082] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1201.693096] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1201.693110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1201.693124] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1201.693163] [ 1201.721859] FAULT_INJECTION: forcing a failure. [ 1201.721859] name failslab, interval 1, probability 0, space 0, times 0 01:54:23 executing program 3: perf_event_open(0x0, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:54:23 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380300001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1201.731193] loop5: detected capacity change from 0 to 512 [ 1201.731490] CPU: 0 UID: 0 PID: 9371 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1201.731509] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1201.731517] Call Trace: [ 1201.731522] [ 1201.731528] dump_stack_lvl+0xfa/0x120 [ 1201.731553] should_fail_ex+0x4d7/0x5e0 [ 1201.731573] ? __kernfs_new_node+0xd3/0x870 [ 1201.731597] should_failslab+0xc2/0x120 [ 1201.731620] kmem_cache_alloc_noprof+0x80/0x690 [ 1201.731635] ? perf_trace_lock_acquire+0xc9/0x700 [ 1201.731662] ? __kernfs_new_node+0xd3/0x870 [ 1201.731685] __kernfs_new_node+0xd3/0x870 [ 1201.731712] ? __pfx___kernfs_new_node+0x10/0x10 [ 1201.731739] ? lock_acquire+0x15e/0x2f0 [ 1201.731759] ? kernfs_root+0x23/0x2a0 [ 1201.731781] ? find_held_lock+0x2b/0x80 [ 1201.731796] ? kernfs_root+0xee/0x2a0 [ 1201.731818] ? lock_release+0xc8/0x290 [ 1201.731837] ? lock_is_held_type+0x9e/0x120 [ 1201.731863] kernfs_new_node+0x13c/0x1e0 [ 1201.731882] __kernfs_create_file+0x55/0x360 [ 1201.731904] sysfs_add_file_mode_ns+0x21c/0x440 [ 1201.731929] ? __pfx_dev_attr_store+0x10/0x10 [ 1201.731952] internal_create_group+0x571/0xeb0 [ 1201.731984] ? __pfx_internal_create_group+0x10/0x10 [ 1201.732008] ? blk_validate_limits+0xc27/0x15c0 [ 1201.732034] ? lock_is_held_type+0x9e/0x120 [ 1201.732057] loop_configure+0xc46/0x15a0 [ 1201.732096] ? __pfx_loop_configure+0x10/0x10 [ 1201.732134] ? avc_has_extended_perms+0x107/0xf20 [ 1201.732158] ? find_held_lock+0x2b/0x80 [ 1201.732172] ? avc_has_extended_perms+0x23b/0xf20 [ 1201.732195] ? lock_release+0xc8/0x290 [ 1201.732218] lo_ioctl+0x66d/0x1ca0 [ 1201.732241] ? __pfx_lo_ioctl+0x10/0x10 [ 1201.732260] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1201.732284] ? __pfx_perf_trace_lock+0x10/0x10 [ 1201.732309] ? lock_acquire+0x15e/0x2f0 [ 1201.732329] ? __virt_addr_valid+0x1c6/0x5d0 [ 1201.732344] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1201.732366] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1201.732385] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1201.732404] ? lock_release+0xc8/0x290 [ 1201.732435] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1201.732482] ? down_write_nested+0x130/0x1f0 [ 1201.732502] ? __fget_files+0x34/0x3b0 [ 1201.732519] ? find_held_lock+0x2b/0x80 [ 1201.732532] ? __fget_files+0x203/0x3b0 [ 1201.732550] ? __pfx_lo_ioctl+0x10/0x10 [ 1201.732567] blkdev_ioctl+0x365/0x6d0 [ 1201.732588] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1201.732609] ? selinux_file_ioctl+0xb9/0x280 [ 1201.732627] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1201.732651] __x64_sys_ioctl+0x18f/0x210 [ 1201.732667] do_syscall_64+0xbf/0x390 [ 1201.732688] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1201.732702] RIP: 0033:0x7fd2e63058d7 [ 1201.732712] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1201.732724] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1201.732737] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e63058d7 [ 1201.732746] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1201.732754] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1201.732761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1201.732769] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1201.732790] [ 1201.738792] loop2: detected capacity change from 0 to 512 [ 1201.764464] loop7: detected capacity change from 0 to 512 [ 1201.801536] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1201.802529] EXT4-fs (loop7): group descriptors corrupted! [ 1201.812729] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1201.814292] EXT4-fs (loop5): group descriptors corrupted! [ 1201.828701] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1201.830439] EXT4-fs (loop2): group descriptors corrupted! 01:54:23 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000280)="50e5f27be528f36b217db0851ea457e1aa1bef9085acb3734b47ca71e5d19c7efd54da3f53bea511ca93e695e191ad5e21d4dc02226fd44146df24f624f28fc36a501903fa3cda75a2b26abab96dc5d31d78a4de51f04c701042eba32bca1edf50d1f1f7fe1f201c488c2bf68153190e2238e2d3d672572dd0d1943a7e2430217872bff1911b6d78532717318e5cf2c58a87cbdc5a8b6a2ec2ce011a13bbdbfe140942f0a215826d72518ebcdb12c865f7990ad16523fdb04c30f54a43d6f7b89d47adfa444e9a011775b8963454e37c494ab996c13fa3a4b3618ecb71376f270b21c71444a0b4ff5f3a55a74a2bb9951cb8e1438768", 0xf6, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:54:24 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 31) 01:54:24 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000280)="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", 0x1000, 0xffffffffffffffff) keyctl$revoke(0x3, r4) keyctl$revoke(0x3, r4) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:54:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x64}, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r1) add_key$user(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000280)="1bf5d0f6c51b2316fb54bad08c867d3f102d1a7851e37803a1760c2f1694b44c011e5fd2909214e792f523240f4e588a2e9145ccf385c41cae390b02c76b21156d436fa2a0e6095863d468ee82ea24b6303a10435c92c9e1cb8fc969aa86433090", 0x61, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r0, r3, 0x0) 01:54:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 35) [ 1202.031912] loop5: detected capacity change from 0 to 512 [ 1202.038484] loop7: detected capacity change from 0 to 512 [ 1202.049205] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1202.050719] EXT4-fs (loop7): group descriptors corrupted! [ 1202.053422] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1202.054377] EXT4-fs (loop5): group descriptors corrupted! 01:54:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 29) 01:54:35 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 32) 01:54:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 36) 01:54:35 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=@allocspi={0x18c, 0x16, 0x200, 0x70bd26, 0x25dfdbff, {{{@in=@multicast2, @in=@local, 0x4e21, 0x0, 0x4e24, 0x200, 0x2, 0x20, 0x20, 0x67, 0x0, 0xee01}, {@in=@empty, 0x4d2, 0x6c}, @in6=@private0, {0x6, 0x4, 0x4, 0x3, 0xf316, 0x9, 0x9, 0x9}, {0x5, 0x1, 0x9, 0x400000000000000}, {0x1, 0x2, 0x4}, 0x70bd29, 0x3504, 0xa, 0x3, 0x4, 0x20}, 0xffffa5e8, 0xfffffffd}, [@lastused={0xc, 0xf, 0x4}, @algo_auth={0x87, 0x1, {{'rmd128-generic\x00'}, 0x1f8, "e10e2629cd0dc659d4e99c494d2d7e982823d18512adcab4db44694277479384ca9bd3e959d73141912d8434dd0ec5a8eca65a5076092896b0494bdde46a56"}}]}, 0x18c}, 0x1, 0x0, 0x0, 0x600c404}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) 01:54:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:54:35 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380400001200010e000000000000000028001a"], 0x38}}, 0x0) 01:54:35 executing program 4: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r0, 0x20, 0x70bd2b, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x20084004}, 0x40) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000640), r4) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_INTERFACE(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="21410000000000000000070000000a0004007770616e3300000008000500000000000800010000000000"], 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x60, r6, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0xe}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0x20}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0x4}]}, 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x41) sendmsg$NLBL_MGMT_C_REMOVE(r5, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x78, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev={0xfe, 0x80, '\x00', 0x3c}}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @local}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x1d}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}]}, 0x78}}, 0x800) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r2, 0x0) 01:54:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) r4 = syz_io_uring_complete(0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x50010, r4, 0x66e19000) keyctl$get_persistent(0x16, 0xee01, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r0, r2, 0x0) [ 1213.915564] loop2: detected capacity change from 0 to 512 [ 1213.923257] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1213.924068] EXT4-fs (loop2): group descriptors corrupted! 01:54:36 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r1) sendmsg$IPCTNL_MSG_CT_GET_STATS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x5, 0x1, 0x201, 0x0, 0x0, {0x7, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x80000) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'geneve0\x00', 0x0}) 01:54:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 30) [ 1213.986394] FAULT_INJECTION: forcing a failure. [ 1213.986394] name failslab, interval 1, probability 0, space 0, times 0 [ 1213.987323] CPU: 1 UID: 0 PID: 9419 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1213.987341] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1213.987349] Call Trace: [ 1213.987354] [ 1213.987359] dump_stack_lvl+0xfa/0x120 [ 1213.987383] should_fail_ex+0x4d7/0x5e0 [ 1213.987402] ? __kernfs_new_node+0xd3/0x870 [ 1213.987422] should_failslab+0xc2/0x120 [ 1213.987441] kmem_cache_alloc_noprof+0x80/0x690 [ 1213.987456] ? perf_trace_lock_acquire+0xc9/0x700 [ 1213.987481] ? __kernfs_new_node+0xd3/0x870 [ 1213.987498] __kernfs_new_node+0xd3/0x870 [ 1213.987521] ? __pfx___kernfs_new_node+0x10/0x10 [ 1213.987543] ? lock_acquire+0x15e/0x2f0 [ 1213.987559] ? kernfs_root+0x23/0x2a0 [ 1213.987578] ? find_held_lock+0x2b/0x80 [ 1213.987591] ? kernfs_root+0xee/0x2a0 [ 1213.987609] ? lock_release+0xc8/0x290 [ 1213.987624] ? lock_is_held_type+0x9e/0x120 [ 1213.987647] kernfs_new_node+0x13c/0x1e0 [ 1213.987665] __kernfs_create_file+0x55/0x360 [ 1213.987684] sysfs_add_file_mode_ns+0x21c/0x440 [ 1213.987705] ? __pfx_dev_attr_store+0x10/0x10 [ 1213.987727] internal_create_group+0x571/0xeb0 [ 1213.987754] ? __pfx_internal_create_group+0x10/0x10 [ 1213.987773] ? blk_validate_limits+0xc27/0x15c0 [ 1213.987797] ? lock_is_held_type+0x9e/0x120 [ 1213.987815] loop_configure+0xc46/0x15a0 [ 1213.987851] ? __pfx_loop_configure+0x10/0x10 [ 1213.987881] ? avc_has_extended_perms+0x107/0xf20 [ 1213.987900] ? find_held_lock+0x2b/0x80 [ 1213.987913] ? avc_has_extended_perms+0x23b/0xf20 [ 1213.987931] ? lock_release+0xc8/0x290 [ 1213.987950] lo_ioctl+0x66d/0x1ca0 [ 1213.987971] ? __pfx_lo_ioctl+0x10/0x10 [ 1213.987986] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1213.988006] ? __pfx_perf_trace_lock+0x10/0x10 [ 1213.988027] ? lock_acquire+0x15e/0x2f0 [ 1213.988043] ? __virt_addr_valid+0x1c6/0x5d0 [ 1213.988058] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1213.988077] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1213.988093] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1213.988113] ? lock_release+0xc8/0x290 [ 1213.988131] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1213.988189] ? down_write_nested+0x130/0x1f0 [ 1213.988208] ? __fget_files+0x34/0x3b0 [ 1213.988224] ? find_held_lock+0x2b/0x80 [ 1213.988236] ? __fget_files+0x203/0x3b0 [ 1213.988252] ? __pfx_lo_ioctl+0x10/0x10 [ 1213.988268] blkdev_ioctl+0x365/0x6d0 [ 1213.988288] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1213.988307] ? selinux_file_ioctl+0xb9/0x280 [ 1213.988324] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1213.988344] __x64_sys_ioctl+0x18f/0x210 [ 1213.988359] do_syscall_64+0xbf/0x390 [ 1213.988379] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1213.988392] RIP: 0033:0x7f1b64b618d7 [ 1213.988402] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1213.988414] RSP: 002b:00007f1b620d6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1213.988426] RAX: ffffffffffffffda RBX: 00007f1b64bab970 RCX: 00007f1b64b618d7 [ 1213.988434] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1213.988441] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1213.988449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1213.988455] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1213.988475] [ 1214.000453] FAULT_INJECTION: forcing a failure. [ 1214.000453] name failslab, interval 1, probability 0, space 0, times 0 [ 1214.027226] CPU: 0 UID: 0 PID: 9421 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1214.027259] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1214.027273] Call Trace: [ 1214.027282] [ 1214.027293] dump_stack_lvl+0xfa/0x120 [ 1214.027331] should_fail_ex+0x4d7/0x5e0 [ 1214.027364] ? __kernfs_new_node+0xd3/0x870 [ 1214.027400] should_failslab+0xc2/0x120 [ 1214.027433] kmem_cache_alloc_noprof+0x80/0x690 [ 1214.027460] ? perf_trace_lock_acquire+0xc9/0x700 [ 1214.027504] ? __kernfs_new_node+0xd3/0x870 [ 1214.027539] __kernfs_new_node+0xd3/0x870 [ 1214.027583] ? __pfx___kernfs_new_node+0x10/0x10 [ 1214.027627] ? lock_acquire+0x15e/0x2f0 [ 1214.027658] ? kernfs_root+0x23/0x2a0 [ 1214.027694] ? find_held_lock+0x2b/0x80 [ 1214.027719] ? kernfs_root+0xee/0x2a0 [ 1214.027755] ? lock_release+0xc8/0x290 [ 1214.027784] ? lock_is_held_type+0x9e/0x120 [ 1214.027825] kernfs_new_node+0x13c/0x1e0 [ 1214.027859] __kernfs_create_file+0x55/0x360 [ 1214.027896] sysfs_add_file_mode_ns+0x21c/0x440 [ 1214.027937] ? __pfx_dev_attr_store+0x10/0x10 [ 1214.027975] internal_create_group+0x571/0xeb0 [ 1214.028051] ? __pfx_internal_create_group+0x10/0x10 [ 1214.028090] ? blk_validate_limits+0xc27/0x15c0 [ 1214.028141] ? lock_is_held_type+0x9e/0x120 [ 1214.028191] loop_configure+0xc46/0x15a0 [ 1214.028260] ? __pfx_loop_configure+0x10/0x10 [ 1214.028318] ? avc_has_extended_perms+0x107/0xf20 [ 1214.028354] ? find_held_lock+0x2b/0x80 [ 1214.028383] ? avc_has_extended_perms+0x23b/0xf20 [ 1214.028427] ? lock_release+0xc8/0x290 [ 1214.028464] lo_ioctl+0x66d/0x1ca0 [ 1214.028505] ? __pfx_lo_ioctl+0x10/0x10 [ 1214.028535] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1214.028574] ? __pfx_perf_trace_lock+0x10/0x10 [ 1214.028614] ? lock_acquire+0x15e/0x2f0 [ 1214.028645] ? __virt_addr_valid+0x1c6/0x5d0 [ 1214.028672] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1214.028707] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1214.028738] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1214.028769] ? lock_release+0xc8/0x290 [ 1214.028805] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1214.028892] ? down_write_nested+0x130/0x1f0 [ 1214.028928] ? __fget_files+0x34/0x3b0 [ 1214.028956] ? find_held_lock+0x2b/0x80 [ 1214.028982] ? __fget_files+0x203/0x3b0 [ 1214.029030] ? __pfx_lo_ioctl+0x10/0x10 [ 1214.029069] blkdev_ioctl+0x365/0x6d0 [ 1214.029107] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1214.029145] ? selinux_file_ioctl+0xb9/0x280 [ 1214.029177] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1214.029217] __x64_sys_ioctl+0x18f/0x210 [ 1214.029246] do_syscall_64+0xbf/0x390 [ 1214.029284] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1214.029308] RIP: 0033:0x7f94bafef8d7 [ 1214.029327] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1214.029350] RSP: 002b:00007f94b8564f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1214.029373] RAX: ffffffffffffffda RBX: 00007f94bb039970 RCX: 00007f94bafef8d7 [ 1214.029389] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1214.029403] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1214.029417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1214.029431] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1214.029470] [ 1214.082928] Process accounting paused [ 1214.083756] loop5: detected capacity change from 0 to 512 [ 1214.104073] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1214.104906] EXT4-fs (loop5): group descriptors corrupted! [ 1214.127878] FAULT_INJECTION: forcing a failure. [ 1214.127878] name failslab, interval 1, probability 0, space 0, times 0 [ 1214.129818] CPU: 0 UID: 0 PID: 9429 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1214.129854] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1214.129867] Call Trace: [ 1214.129876] [ 1214.129886] dump_stack_lvl+0xfa/0x120 [ 1214.129925] should_fail_ex+0x4d7/0x5e0 [ 1214.129958] ? __kernfs_new_node+0xd3/0x870 [ 1214.130001] should_failslab+0xc2/0x120 [ 1214.130052] kmem_cache_alloc_noprof+0x80/0x690 [ 1214.130080] ? perf_trace_lock_acquire+0xc9/0x700 [ 1214.130136] ? __kernfs_new_node+0xd3/0x870 [ 1214.130171] __kernfs_new_node+0xd3/0x870 [ 1214.130215] ? __pfx___kernfs_new_node+0x10/0x10 [ 1214.130259] ? lock_acquire+0x15e/0x2f0 [ 1214.130290] ? kernfs_root+0x23/0x2a0 [ 1214.130326] ? find_held_lock+0x2b/0x80 [ 1214.130351] ? kernfs_root+0xee/0x2a0 [ 1214.130387] ? lock_release+0xc8/0x290 [ 1214.130416] ? lock_is_held_type+0x9e/0x120 [ 1214.130458] kernfs_new_node+0x13c/0x1e0 [ 1214.130492] __kernfs_create_file+0x55/0x360 [ 1214.130529] sysfs_add_file_mode_ns+0x21c/0x440 [ 1214.130570] ? __pfx_dev_attr_store+0x10/0x10 [ 1214.130610] internal_create_group+0x571/0xeb0 [ 1214.130663] ? __pfx_internal_create_group+0x10/0x10 [ 1214.130700] ? blk_validate_limits+0xc27/0x15c0 [ 1214.130743] ? lock_is_held_type+0x9e/0x120 [ 1214.130780] loop_configure+0xc46/0x15a0 [ 1214.130849] ? __pfx_loop_configure+0x10/0x10 [ 1214.130907] ? avc_has_extended_perms+0x107/0xf20 [ 1214.130944] ? find_held_lock+0x2b/0x80 [ 1214.130968] ? avc_has_extended_perms+0x23b/0xf20 [ 1214.131018] ? lock_release+0xc8/0x290 [ 1214.131067] lo_ioctl+0x66d/0x1ca0 [ 1214.131107] ? __pfx_lo_ioctl+0x10/0x10 [ 1214.131138] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1214.131177] ? __pfx_perf_trace_lock+0x10/0x10 [ 1214.131218] ? lock_acquire+0x15e/0x2f0 [ 1214.131249] ? __virt_addr_valid+0x1c6/0x5d0 [ 1214.131276] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1214.131311] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1214.131343] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1214.131374] ? lock_release+0xc8/0x290 [ 1214.131410] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1214.131495] ? down_write_nested+0x130/0x1f0 [ 1214.131531] ? __fget_files+0x34/0x3b0 [ 1214.131560] ? find_held_lock+0x2b/0x80 [ 1214.131584] ? __fget_files+0x203/0x3b0 [ 1214.131616] ? __pfx_lo_ioctl+0x10/0x10 [ 1214.131647] blkdev_ioctl+0x365/0x6d0 [ 1214.131685] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1214.131723] ? selinux_file_ioctl+0xb9/0x280 [ 1214.131755] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1214.131795] __x64_sys_ioctl+0x18f/0x210 [ 1214.131825] do_syscall_64+0xbf/0x390 [ 1214.131863] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1214.131887] RIP: 0033:0x7fd2e63058d7 [ 1214.131906] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1214.131929] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1214.131952] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e63058d7 [ 1214.131969] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1214.131985] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1214.132007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1214.132028] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1214.132088] 01:54:36 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380500001200010e000000000000000028001a"], 0x38}}, 0x0) 01:54:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 37) [ 1214.236612] loop2: detected capacity change from 0 to 512 [ 1214.253769] loop7: detected capacity change from 0 to 512 [ 1214.337566] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1214.339663] EXT4-fs (loop7): group descriptors corrupted! 01:54:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) [ 1214.381919] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1214.384047] EXT4-fs (loop2): group descriptors corrupted! 01:54:36 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000280)="849afe163868542afb552c", 0xb, r1) keyctl$reject(0x13, r1, 0x6, 0x5, r3) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r1, r2, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r5) r7 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r7, r5, r6, 0x0) r8 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r8) r10 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r10, r8, r9, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0) [ 1214.543849] loop5: detected capacity change from 0 to 512 [ 1214.550883] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1214.552694] EXT4-fs (loop5): group descriptors corrupted! 01:54:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r0, r3, 0x0) 01:54:36 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 33) 01:54:36 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380600001200010e000000000000000028001a"], 0x38}}, 0x0) 01:54:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:54:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 31) 01:54:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 38) 01:54:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) [ 1214.857995] loop7: detected capacity change from 0 to 512 [ 1214.897874] loop2: detected capacity change from 0 to 512 [ 1214.904324] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1214.906353] EXT4-fs (loop7): group descriptors corrupted! [ 1215.004041] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors 01:54:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 1215.005683] EXT4-fs (loop2): group descriptors corrupted! 01:54:37 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, r0, r2, 0x0) r4 = add_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000280)="9bce02f3003397310f314ab1c608756ac8845f7749915f4154dbddce160d83f01fd363d7452aeb02dc9e10939e9d504be0906c7825f2aea0c78161ff28668a905be0f13e726d8ad662ea36cbcaac9f255252cf8c4885e04eefa0ddd4219652b6dd2a04550eb3c284579d24d074808f46f8b35ac19d23ce1328bb8825eefa54764f2b197f956b46d1eb2cdee7332cd4192ba7e838b8dcc05ac202fe8ef19cdbf3c9854af2dcf00234c45710ff11228bdead22417878b2e379726d186e08b217237a152d42feb1f9430c61c73b365826ac64239871a1201a73822290", 0xdb, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0x1e, r4, r1, r1, 0x1) [ 1215.045375] FAULT_INJECTION: forcing a failure. [ 1215.045375] name failslab, interval 1, probability 0, space 0, times 0 [ 1215.047001] CPU: 0 UID: 0 PID: 9467 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1215.047031] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1215.047044] Call Trace: [ 1215.047052] [ 1215.047062] dump_stack_lvl+0xfa/0x120 [ 1215.047100] should_fail_ex+0x4d7/0x5e0 [ 1215.047140] ? __kernfs_new_node+0xd3/0x870 [ 1215.047175] should_failslab+0xc2/0x120 [ 1215.047208] kmem_cache_alloc_noprof+0x80/0x690 [ 1215.047234] ? perf_trace_lock_acquire+0xc9/0x700 [ 1215.047277] ? __kernfs_new_node+0xd3/0x870 [ 1215.047311] __kernfs_new_node+0xd3/0x870 [ 1215.047353] ? __pfx___kernfs_new_node+0x10/0x10 [ 1215.047394] ? lock_acquire+0x15e/0x2f0 [ 1215.047424] ? kernfs_root+0x23/0x2a0 [ 1215.047458] ? find_held_lock+0x2b/0x80 [ 1215.047482] ? kernfs_root+0xee/0x2a0 [ 1215.047515] ? lock_release+0xc8/0x290 [ 1215.047543] ? lock_is_held_type+0x9e/0x120 [ 1215.047583] kernfs_new_node+0x13c/0x1e0 [ 1215.047616] __kernfs_create_file+0x55/0x360 [ 1215.047651] sysfs_add_file_mode_ns+0x21c/0x440 [ 1215.047690] ? __pfx_dev_attr_store+0x10/0x10 [ 1215.047728] internal_create_group+0x571/0xeb0 [ 1215.047778] ? __pfx_internal_create_group+0x10/0x10 [ 1215.047813] ? blk_validate_limits+0xc27/0x15c0 [ 1215.047855] ? lock_is_held_type+0x9e/0x120 [ 1215.047889] loop_configure+0xc46/0x15a0 [ 1215.047954] ? __pfx_loop_configure+0x10/0x10 [ 1215.048009] ? avc_has_extended_perms+0x107/0xf20 [ 1215.048045] ? find_held_lock+0x2b/0x80 [ 1215.048069] ? avc_has_extended_perms+0x23b/0xf20 [ 1215.048103] ? lock_release+0xc8/0x290 [ 1215.048138] lo_ioctl+0x66d/0x1ca0 [ 1215.048189] ? __pfx_lo_ioctl+0x10/0x10 [ 1215.048217] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1215.048254] ? __pfx_perf_trace_lock+0x10/0x10 [ 1215.048292] ? lock_acquire+0x15e/0x2f0 [ 1215.048321] ? __virt_addr_valid+0x1c6/0x5d0 [ 1215.048347] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1215.048382] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1215.048411] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1215.048441] ? lock_release+0xc8/0x290 [ 1215.048475] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1215.048555] ? down_write_nested+0x130/0x1f0 [ 1215.048588] ? __fget_files+0x34/0x3b0 [ 1215.048616] ? find_held_lock+0x2b/0x80 [ 1215.048639] ? __fget_files+0x203/0x3b0 [ 1215.048669] ? __pfx_lo_ioctl+0x10/0x10 [ 1215.048699] blkdev_ioctl+0x365/0x6d0 [ 1215.048735] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1215.048770] ? selinux_file_ioctl+0xb9/0x280 [ 1215.048801] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1215.048840] __x64_sys_ioctl+0x18f/0x210 [ 1215.048867] do_syscall_64+0xbf/0x390 [ 1215.048903] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1215.048926] RIP: 0033:0x7f1b64b618d7 [ 1215.048943] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1215.048965] RSP: 002b:00007f1b620d6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1215.048987] RAX: ffffffffffffffda RBX: 00007f1b64bab970 RCX: 00007f1b64b618d7 [ 1215.049002] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1215.049015] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1215.049029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1215.049042] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1215.049079] [ 1215.137484] loop5: detected capacity change from 0 to 512 01:54:37 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380700001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1215.181428] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1215.183230] EXT4-fs (loop5): group descriptors corrupted! 01:54:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$join(0x1, &(0x7f0000000100)={'syz', 0x1}) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:54:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffff81202ff0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:54:46 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000000)) 01:54:46 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380800001200010e000000000000000028001a"], 0x38}}, 0x0) 01:54:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:54:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 32) 01:54:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 39) 01:54:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 34) [ 1224.332006] FAULT_INJECTION: forcing a failure. [ 1224.332006] name failslab, interval 1, probability 0, space 0, times 0 [ 1224.333080] CPU: 0 UID: 0 PID: 9493 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1224.333097] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1224.333108] Call Trace: [ 1224.333112] [ 1224.333117] dump_stack_lvl+0xfa/0x120 [ 1224.333140] should_fail_ex+0x4d7/0x5e0 [ 1224.333161] ? __kernfs_new_node+0xd3/0x870 [ 1224.333180] should_failslab+0xc2/0x120 [ 1224.333198] kmem_cache_alloc_noprof+0x80/0x690 [ 1224.333213] ? perf_trace_lock_acquire+0xc9/0x700 [ 1224.333237] ? __kernfs_new_node+0xd3/0x870 [ 1224.333255] __kernfs_new_node+0xd3/0x870 [ 1224.333277] ? __pfx___kernfs_new_node+0x10/0x10 [ 1224.333299] ? lock_acquire+0x15e/0x2f0 [ 1224.333316] ? kernfs_root+0x23/0x2a0 [ 1224.333334] ? find_held_lock+0x2b/0x80 [ 1224.333347] ? kernfs_root+0xee/0x2a0 [ 1224.333365] ? lock_release+0xc8/0x290 [ 1224.333380] ? lock_is_held_type+0x9e/0x120 [ 1224.333402] kernfs_new_node+0x13c/0x1e0 [ 1224.333420] __kernfs_create_file+0x55/0x360 [ 1224.333439] sysfs_add_file_mode_ns+0x21c/0x440 [ 1224.333463] ? __pfx_dev_attr_store+0x10/0x10 [ 1224.333486] internal_create_group+0x571/0xeb0 [ 1224.333512] ? __pfx_internal_create_group+0x10/0x10 [ 1224.333531] ? blk_validate_limits+0xc27/0x15c0 [ 1224.333554] ? lock_is_held_type+0x9e/0x120 [ 1224.333573] loop_configure+0xc46/0x15a0 [ 1224.333608] ? __pfx_loop_configure+0x10/0x10 [ 1224.333637] ? avc_has_extended_perms+0x107/0xf20 [ 1224.333657] ? find_held_lock+0x2b/0x80 [ 1224.333669] ? avc_has_extended_perms+0x23b/0xf20 [ 1224.333687] ? lock_release+0xc8/0x290 [ 1224.333706] lo_ioctl+0x66d/0x1ca0 [ 1224.333727] ? __pfx_lo_ioctl+0x10/0x10 [ 1224.333742] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1224.333762] ? __pfx_perf_trace_lock+0x10/0x10 [ 1224.333782] ? lock_acquire+0x15e/0x2f0 [ 1224.333798] ? __virt_addr_valid+0x1c6/0x5d0 [ 1224.333813] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1224.333832] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1224.333847] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1224.333863] ? lock_release+0xc8/0x290 [ 1224.333881] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1224.333925] ? down_write_nested+0x130/0x1f0 [ 1224.333943] ? __fget_files+0x34/0x3b0 [ 1224.333959] ? find_held_lock+0x2b/0x80 [ 1224.333971] ? __fget_files+0x203/0x3b0 [ 1224.333987] ? __pfx_lo_ioctl+0x10/0x10 [ 1224.334004] blkdev_ioctl+0x365/0x6d0 [ 1224.334023] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1224.334043] ? selinux_file_ioctl+0xb9/0x280 [ 1224.334060] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1224.334080] __x64_sys_ioctl+0x18f/0x210 [ 1224.334096] do_syscall_64+0xbf/0x390 [ 1224.334115] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1224.334127] RIP: 0033:0x7fd2e63058d7 [ 1224.334137] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1224.334149] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1224.334161] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e63058d7 [ 1224.334169] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1224.334176] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1224.334184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1224.334191] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1224.334211] [ 1224.372551] FAULT_INJECTION: forcing a failure. [ 1224.372551] name failslab, interval 1, probability 0, space 0, times 0 [ 1224.374273] CPU: 1 UID: 0 PID: 9497 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1224.374303] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1224.374317] Call Trace: [ 1224.374325] [ 1224.374334] dump_stack_lvl+0xfa/0x120 [ 1224.374377] should_fail_ex+0x4d7/0x5e0 [ 1224.374412] ? __kernfs_new_node+0xd3/0x870 [ 1224.374447] should_failslab+0xc2/0x120 [ 1224.374479] kmem_cache_alloc_noprof+0x80/0x690 [ 1224.374505] ? perf_trace_lock_acquire+0xc9/0x700 [ 1224.374548] ? __kernfs_new_node+0xd3/0x870 [ 1224.374581] __kernfs_new_node+0xd3/0x870 [ 1224.374622] ? __pfx___kernfs_new_node+0x10/0x10 [ 1224.374664] ? lock_acquire+0x15e/0x2f0 [ 1224.374693] ? kernfs_root+0x23/0x2a0 [ 1224.374727] ? find_held_lock+0x2b/0x80 [ 1224.374750] ? kernfs_root+0xee/0x2a0 [ 1224.374784] ? lock_release+0xc8/0x290 [ 1224.374811] ? lock_is_held_type+0x9e/0x120 [ 1224.374851] kernfs_new_node+0x13c/0x1e0 [ 1224.374884] __kernfs_create_file+0x55/0x360 [ 1224.374918] sysfs_add_file_mode_ns+0x21c/0x440 [ 1224.374957] ? __pfx_dev_attr_store+0x10/0x10 [ 1224.374993] internal_create_group+0x571/0xeb0 [ 1224.375042] ? __pfx_internal_create_group+0x10/0x10 [ 1224.375078] ? blk_validate_limits+0xc27/0x15c0 [ 1224.375127] ? lock_is_held_type+0x9e/0x120 [ 1224.375162] loop_configure+0xc46/0x15a0 [ 1224.375227] ? __pfx_loop_configure+0x10/0x10 [ 1224.375281] ? avc_has_extended_perms+0x107/0xf20 [ 1224.375317] ? find_held_lock+0x2b/0x80 [ 1224.375339] ? avc_has_extended_perms+0x23b/0xf20 [ 1224.375373] ? lock_release+0xc8/0x290 [ 1224.375408] lo_ioctl+0x66d/0x1ca0 [ 1224.375447] ? __pfx_lo_ioctl+0x10/0x10 [ 1224.375475] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1224.375512] ? __pfx_perf_trace_lock+0x10/0x10 [ 1224.375549] ? lock_acquire+0x15e/0x2f0 [ 1224.375579] ? __virt_addr_valid+0x1c6/0x5d0 [ 1224.375604] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1224.375637] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1224.375667] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1224.375696] ? lock_release+0xc8/0x290 [ 1224.375730] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1224.375810] ? down_write_nested+0x130/0x1f0 [ 1224.375843] ? __fget_files+0x34/0x3b0 [ 1224.375871] ? find_held_lock+0x2b/0x80 [ 1224.375894] ? __fget_files+0x203/0x3b0 [ 1224.375923] ? __pfx_lo_ioctl+0x10/0x10 [ 1224.375953] blkdev_ioctl+0x365/0x6d0 [ 1224.376015] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1224.376064] ? selinux_file_ioctl+0xb9/0x280 [ 1224.376104] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1224.376142] __x64_sys_ioctl+0x18f/0x210 [ 1224.376169] do_syscall_64+0xbf/0x390 [ 1224.376205] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1224.376229] RIP: 0033:0x7f94bafef8d7 [ 1224.376246] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1224.376267] RSP: 002b:00007f94b8564f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1224.376289] RAX: ffffffffffffffda RBX: 00007f94bb039970 RCX: 00007f94bafef8d7 [ 1224.376304] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1224.376317] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1224.376330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1224.376343] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1224.376380] [ 1224.400304] loop2: detected capacity change from 0 to 512 [ 1224.407891] loop5: detected capacity change from 0 to 512 [ 1224.418554] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1224.420437] EXT4-fs (loop2): group descriptors corrupted! [ 1224.426924] loop7: detected capacity change from 0 to 512 [ 1224.440520] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1224.442231] EXT4-fs (loop7): group descriptors corrupted! [ 1224.460206] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1224.461860] EXT4-fs (loop5): group descriptors corrupted! 01:54:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:54:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 33) 01:54:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 40) 01:54:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:54:55 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380900001200010e000000000000000028001a"], 0x38}}, 0x0) 01:54:55 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 35) 01:54:55 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x7fff}}, './file0\x00'}) r2 = getuid() getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) getresgid(&(0x7f0000000580)=0x0, &(0x7f0000000240)=0x0, &(0x7f0000000280)) r7 = add_key$keyring(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000001c0)="91", 0x1, r7) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) keyctl$chown(0x4, r8, 0x0, r10) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {r4, r5}}, './file0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@private0}}, &(0x7f00000004c0)=0xe8) r13 = add_key$keyring(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r14 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000001c0)="91", 0x1, r13) r15 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) keyctl$chown(0x4, r14, 0x0, r16) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000002c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r4}, {0x2, 0x3, 0xee01}, {0x2, 0x2, r2}, {0x2, 0x0, r3}, {0x2, 0x2, 0xee01}, {0x2, 0x2}, {0x2, 0x3, r12}, {0x2, 0x5, r11}], {0x4, 0x5}, [{0x8, 0x2, r6}, {}, {0x8, 0x4, 0xee00}, {0x8, 0x4, r16}, {0x8, 0x0, 0xee01}], {0x10, 0x6}, {0x20, 0x2}}, 0x8c, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='veth1_to_bridge\x00') 01:54:55 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000100)={r0, 0x3, 0x401, 0x3}) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x3f) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r2, 0x0, 0x0) pread64(r2, &(0x7f0000000280)=""/221, 0xdd, 0x6) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r6 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) add_key(&(0x7f00000003c0)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r6) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r8, r6, r7, 0x0) keyctl$revoke(0x3, r7) add_key$keyring(&(0x7f0000000140), &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) [ 1233.882015] FAULT_INJECTION: forcing a failure. [ 1233.882015] name failslab, interval 1, probability 0, space 0, times 0 [ 1233.883759] CPU: 1 UID: 0 PID: 9520 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1233.883801] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1233.883814] Call Trace: [ 1233.883822] [ 1233.883830] dump_stack_lvl+0xfa/0x120 [ 1233.883868] should_fail_ex+0x4d7/0x5e0 [ 1233.883899] ? __kernfs_new_node+0xd3/0x870 [ 1233.883933] should_failslab+0xc2/0x120 [ 1233.883965] kmem_cache_alloc_noprof+0x80/0x690 [ 1233.883991] ? perf_trace_lock_acquire+0xc9/0x700 [ 1233.884032] ? __kernfs_new_node+0xd3/0x870 [ 1233.884066] __kernfs_new_node+0xd3/0x870 [ 1233.884113] ? __pfx___kernfs_new_node+0x10/0x10 [ 1233.884155] ? lock_acquire+0x15e/0x2f0 [ 1233.884184] ? kernfs_root+0x23/0x2a0 [ 1233.884218] ? find_held_lock+0x2b/0x80 [ 1233.884241] ? kernfs_root+0xee/0x2a0 [ 1233.884274] ? lock_release+0xc8/0x290 [ 1233.884302] ? lock_is_held_type+0x9e/0x120 [ 1233.884341] kernfs_new_node+0x13c/0x1e0 [ 1233.884373] __kernfs_create_file+0x55/0x360 [ 1233.884408] sysfs_add_file_mode_ns+0x21c/0x440 [ 1233.884446] ? __pfx_dev_attr_store+0x10/0x10 [ 1233.884482] internal_create_group+0x571/0xeb0 [ 1233.884531] ? __pfx_internal_create_group+0x10/0x10 [ 1233.884567] ? blk_validate_limits+0xc27/0x15c0 [ 1233.884608] ? lock_is_held_type+0x9e/0x120 [ 1233.884642] loop_configure+0xc46/0x15a0 [ 1233.884708] ? __pfx_loop_configure+0x10/0x10 [ 1233.884762] ? avc_has_extended_perms+0x107/0xf20 [ 1233.884797] ? find_held_lock+0x2b/0x80 [ 1233.884820] ? avc_has_extended_perms+0x23b/0xf20 [ 1233.884854] ? lock_release+0xc8/0x290 [ 1233.884889] lo_ioctl+0x66d/0x1ca0 [ 1233.884927] ? __pfx_lo_ioctl+0x10/0x10 [ 1233.884955] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1233.884992] ? __pfx_perf_trace_lock+0x10/0x10 [ 1233.885030] ? lock_acquire+0x15e/0x2f0 [ 1233.885059] ? __virt_addr_valid+0x1c6/0x5d0 [ 1233.885084] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1233.885118] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1233.885147] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1233.885176] ? lock_release+0xc8/0x290 [ 1233.885210] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1233.885290] ? down_write_nested+0x130/0x1f0 [ 1233.885323] ? __fget_files+0x34/0x3b0 [ 1233.885350] ? find_held_lock+0x2b/0x80 [ 1233.885373] ? __fget_files+0x203/0x3b0 [ 1233.885402] ? __pfx_lo_ioctl+0x10/0x10 [ 1233.885432] blkdev_ioctl+0x365/0x6d0 [ 1233.885467] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1233.885502] ? selinux_file_ioctl+0xb9/0x280 [ 1233.885532] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1233.885570] __x64_sys_ioctl+0x18f/0x210 [ 1233.885597] do_syscall_64+0xbf/0x390 [ 1233.885633] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1233.885655] RIP: 0033:0x7f1b64b618d7 [ 1233.885673] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1233.885694] RSP: 002b:00007f1b620d6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1233.885715] RAX: ffffffffffffffda RBX: 00007f1b64bab970 RCX: 00007f1b64b618d7 [ 1233.885730] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1233.885743] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1233.885756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1233.885769] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1233.885806] [ 1233.903036] loop7: detected capacity change from 0 to 512 [ 1233.935879] loop2: detected capacity change from 0 to 512 [ 1233.958509] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1233.960326] EXT4-fs (loop2): group descriptors corrupted! [ 1233.995796] loop5: detected capacity change from 0 to 512 01:54:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x200000000000, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:54:56 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vcan0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x3b, 0x9, [{0xd801}, {0x5, 0x69}, {0xff, 0x31cc138e}, {0x1, 0x72}, {0x9, 0x7}, {0x204000, 0xbb38}, {0x4, 0x80000001}, {0x7fff, 0x68}, {0xa1, 0x2}]}}) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) [ 1234.040497] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1234.042181] EXT4-fs (loop5): group descriptors corrupted! [ 1234.064503] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1234.066376] EXT4-fs (loop7): group descriptors corrupted! 01:54:56 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380a00001200010e000000000000000028001a"], 0x38}}, 0x0) 01:54:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 34) 01:54:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x7}, 0xa6d, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:54:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 41) 01:54:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 36) 01:54:56 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r1, 0x0, 0x0) ppoll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x2048}, {r0, 0x200}, {r1, 0x408}, {0xffffffffffffffff, 0x3280}, {r0, 0x454}, {r0, 0xa}], 0x6, &(0x7f00000002c0)={0x0, 0x3938700}, &(0x7f0000000280)={[0xfa]}, 0xffffffffffffff86) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000140)) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) setsockopt$inet6_tcp_int(r3, 0x6, 0x24, &(0x7f00000001c0)=0x3, 0x4) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r2, r4, 0x0) [ 1234.302785] FAULT_INJECTION: forcing a failure. [ 1234.302785] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.304478] CPU: 0 UID: 0 PID: 9556 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1234.304509] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1234.304522] Call Trace: [ 1234.304531] [ 1234.304540] dump_stack_lvl+0xfa/0x120 [ 1234.304577] should_fail_ex+0x4d7/0x5e0 [ 1234.304609] ? __kernfs_new_node+0xd3/0x870 [ 1234.304643] should_failslab+0xc2/0x120 [ 1234.304676] kmem_cache_alloc_noprof+0x80/0x690 [ 1234.304701] ? perf_trace_lock_acquire+0xc9/0x700 [ 1234.304742] ? __kernfs_new_node+0xd3/0x870 [ 1234.304775] __kernfs_new_node+0xd3/0x870 [ 1234.304816] ? __pfx___kernfs_new_node+0x10/0x10 [ 1234.304858] ? lock_acquire+0x15e/0x2f0 [ 1234.304887] ? kernfs_root+0x23/0x2a0 [ 1234.304921] ? find_held_lock+0x2b/0x80 [ 1234.304943] ? kernfs_root+0xee/0x2a0 [ 1234.304977] ? lock_release+0xc8/0x290 [ 1234.305004] ? lock_is_held_type+0x9e/0x120 [ 1234.305043] kernfs_new_node+0x13c/0x1e0 [ 1234.305075] __kernfs_create_file+0x55/0x360 [ 1234.305117] sysfs_add_file_mode_ns+0x21c/0x440 [ 1234.305155] ? __pfx_dev_attr_store+0x10/0x10 [ 1234.305191] internal_create_group+0x571/0xeb0 [ 1234.305240] ? __pfx_internal_create_group+0x10/0x10 [ 1234.305275] ? blk_validate_limits+0xc27/0x15c0 [ 1234.305316] ? lock_is_held_type+0x9e/0x120 [ 1234.305351] loop_configure+0xc46/0x15a0 [ 1234.305417] ? __pfx_loop_configure+0x10/0x10 [ 1234.305471] ? avc_has_extended_perms+0x107/0xf20 [ 1234.305506] ? find_held_lock+0x2b/0x80 [ 1234.305529] ? avc_has_extended_perms+0x23b/0xf20 [ 1234.305563] ? lock_release+0xc8/0x290 [ 1234.305598] lo_ioctl+0x66d/0x1ca0 [ 1234.305636] ? __pfx_lo_ioctl+0x10/0x10 [ 1234.305664] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1234.305700] ? __pfx_perf_trace_lock+0x10/0x10 [ 1234.305738] ? lock_acquire+0x15e/0x2f0 [ 1234.305767] ? __virt_addr_valid+0x1c6/0x5d0 [ 1234.305793] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1234.305826] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1234.305855] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1234.305884] ? lock_release+0xc8/0x290 [ 1234.305918] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1234.305996] ? down_write_nested+0x130/0x1f0 [ 1234.306030] ? __fget_files+0x34/0x3b0 [ 1234.306057] ? find_held_lock+0x2b/0x80 [ 1234.306080] ? __fget_files+0x203/0x3b0 [ 1234.306109] ? __pfx_lo_ioctl+0x10/0x10 [ 1234.306139] blkdev_ioctl+0x365/0x6d0 [ 1234.306173] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1234.306209] ? selinux_file_ioctl+0xb9/0x280 [ 1234.306239] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1234.306276] __x64_sys_ioctl+0x18f/0x210 [ 1234.306304] do_syscall_64+0xbf/0x390 [ 1234.306339] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1234.306362] RIP: 0033:0x7fd2e63058d7 [ 1234.306379] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1234.306401] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1234.306423] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e63058d7 [ 1234.306438] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1234.306451] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1234.306464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1234.306477] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1234.306513] [ 1234.310064] loop5: detected capacity change from 0 to 512 [ 1234.327740] FAULT_INJECTION: forcing a failure. [ 1234.327740] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.357910] CPU: 0 UID: 0 PID: 9559 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1234.357942] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1234.357954] Call Trace: [ 1234.357962] [ 1234.357972] dump_stack_lvl+0xfa/0x120 [ 1234.358006] should_fail_ex+0x4d7/0x5e0 [ 1234.358036] ? __kernfs_new_node+0xd3/0x870 [ 1234.358070] should_failslab+0xc2/0x120 [ 1234.358101] kmem_cache_alloc_noprof+0x80/0x690 [ 1234.358132] ? perf_trace_lock_acquire+0xc9/0x700 [ 1234.358173] ? __kernfs_new_node+0xd3/0x870 [ 1234.358207] __kernfs_new_node+0xd3/0x870 [ 1234.358248] ? __pfx___kernfs_new_node+0x10/0x10 [ 1234.358290] ? lock_acquire+0x15e/0x2f0 [ 1234.358320] ? kernfs_root+0x23/0x2a0 [ 1234.358354] ? find_held_lock+0x2b/0x80 [ 1234.358378] ? kernfs_root+0xee/0x2a0 [ 1234.358412] ? lock_release+0xc8/0x290 [ 1234.358440] ? lock_is_held_type+0x9e/0x120 [ 1234.358478] kernfs_new_node+0x13c/0x1e0 [ 1234.358510] __kernfs_create_file+0x55/0x360 [ 1234.358546] sysfs_add_file_mode_ns+0x21c/0x440 [ 1234.358584] ? __pfx_dev_attr_store+0x10/0x10 [ 1234.358618] internal_create_group+0x571/0xeb0 [ 1234.358668] ? __pfx_internal_create_group+0x10/0x10 [ 1234.358704] ? blk_validate_limits+0xc27/0x15c0 [ 1234.358744] ? lock_is_held_type+0x9e/0x120 [ 1234.358779] loop_configure+0xc46/0x15a0 [ 1234.358843] ? __pfx_loop_configure+0x10/0x10 [ 1234.358898] ? avc_has_extended_perms+0x107/0xf20 [ 1234.358932] ? find_held_lock+0x2b/0x80 [ 1234.358955] ? avc_has_extended_perms+0x23b/0xf20 [ 1234.358989] ? lock_release+0xc8/0x290 [ 1234.359025] lo_ioctl+0x66d/0x1ca0 [ 1234.359063] ? __pfx_lo_ioctl+0x10/0x10 [ 1234.359091] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1234.359129] ? __pfx_perf_trace_lock+0x10/0x10 [ 1234.359167] ? lock_acquire+0x15e/0x2f0 [ 1234.359197] ? __virt_addr_valid+0x1c6/0x5d0 [ 1234.359222] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1234.359257] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1234.359290] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1234.359319] ? lock_release+0xc8/0x290 [ 1234.359354] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1234.359433] ? down_write_nested+0x130/0x1f0 [ 1234.359467] ? __fget_files+0x34/0x3b0 [ 1234.359494] ? find_held_lock+0x2b/0x80 [ 1234.359517] ? __fget_files+0x203/0x3b0 [ 1234.359547] ? __pfx_lo_ioctl+0x10/0x10 [ 1234.359576] blkdev_ioctl+0x365/0x6d0 [ 1234.359612] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1234.359648] ? selinux_file_ioctl+0xb9/0x280 [ 1234.359678] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1234.359716] __x64_sys_ioctl+0x18f/0x210 [ 1234.359743] do_syscall_64+0xbf/0x390 [ 1234.359794] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1234.359816] RIP: 0033:0x7f94bafef8d7 [ 1234.359833] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1234.359854] RSP: 002b:00007f94b8564f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1234.359876] RAX: ffffffffffffffda RBX: 00007f94bb039970 RCX: 00007f94bafef8d7 [ 1234.359891] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1234.359903] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1234.359916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1234.359929] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1234.359966] [ 1234.384454] loop2: detected capacity change from 0 to 512 [ 1234.421253] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1234.423096] EXT4-fs (loop5): group descriptors corrupted! [ 1234.431867] loop7: detected capacity change from 0 to 512 [ 1234.446840] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1234.448361] EXT4-fs (loop7): group descriptors corrupted! [ 1234.468436] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1234.470197] EXT4-fs (loop2): group descriptors corrupted! 01:55:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 35) 01:55:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:55:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 42) 01:55:06 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101000, 0x200) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x5, 0x5, 0x18, 0xff, 0x0, 0x80000000001, 0x8020, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x6, 0x6c}, 0x52091, 0x1f, 0x8, 0x1, 0x771, 0x2, 0x2, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r0, 0x2) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, 0x0, r1, r2, 0x0) 01:55:06 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc2}, &(0x7f0000000280)={0x0, "2a00a1c5503265233ecd7ea6d17d55fa72342a91d8b38ff27a2eb478f6feb2ed1c99bfacf706f35c67efc3d58aa31a7ef944d1ea3eb308b2bb39fb811955e2b7", 0x17}, 0x48, r1) keyctl$KEYCTL_MOVE(0x1e, r1, r1, r2, 0x1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r0, r3, 0x0) 01:55:06 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380b00001200010e000000000000000028001a"], 0x38}}, 0x0) 01:55:06 executing program 6: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0x6, 0x8000, 0x9, 0x1, 0x3}}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8922, &(0x7f0000000080)={'veth1_to_batadv\x00', 0x0}) 01:55:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 37) [ 1244.291712] loop2: detected capacity change from 0 to 512 [ 1244.309015] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1244.309870] EXT4-fs (loop2): group descriptors corrupted! [ 1244.321001] loop7: detected capacity change from 0 to 512 [ 1244.329960] loop5: detected capacity change from 0 to 512 [ 1244.330541] FAULT_INJECTION: forcing a failure. [ 1244.330541] name failslab, interval 1, probability 0, space 0, times 0 [ 1244.331585] CPU: 0 UID: 0 PID: 9583 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1244.331613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1244.331620] Call Trace: [ 1244.331624] [ 1244.331629] dump_stack_lvl+0xfa/0x120 [ 1244.331653] should_fail_ex+0x4d7/0x5e0 [ 1244.331671] should_failslab+0xc2/0x120 [ 1244.331690] kmem_cache_alloc_node_noprof+0x87/0x6b0 [ 1244.331704] ? perf_trace_lock+0xb5/0x5d0 [ 1244.331722] ? __alloc_skb+0x2ab/0x370 [ 1244.331740] ? __alloc_skb+0x2ab/0x370 [ 1244.331750] __alloc_skb+0x2ab/0x370 [ 1244.331762] ? __pfx___alloc_skb+0x10/0x10 [ 1244.331773] ? lock_acquire+0x15e/0x2f0 [ 1244.331789] ? netlink_has_listeners+0x7f/0x430 [ 1244.331805] ? netlink_has_listeners+0x20d/0x430 [ 1244.331818] ? lock_release+0xc8/0x290 [ 1244.331837] alloc_uevent_skb+0x7b/0x210 [ 1244.331853] kobject_uevent_env+0xa8c/0xf90 [ 1244.331869] ? lock_is_held_type+0x9e/0x120 [ 1244.331889] loop_configure+0xe31/0x15a0 [ 1244.331925] ? __pfx_loop_configure+0x10/0x10 [ 1244.331954] ? avc_has_extended_perms+0x107/0xf20 [ 1244.331974] ? find_held_lock+0x2b/0x80 [ 1244.331986] ? avc_has_extended_perms+0x23b/0xf20 [ 1244.332004] ? lock_release+0xc8/0x290 [ 1244.332024] lo_ioctl+0x66d/0x1ca0 [ 1244.332044] ? __pfx_lo_ioctl+0x10/0x10 [ 1244.332059] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1244.332079] ? __pfx_perf_trace_lock+0x10/0x10 [ 1244.332104] ? lock_acquire+0x15e/0x2f0 [ 1244.332119] ? __virt_addr_valid+0x1c6/0x5d0 [ 1244.332134] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1244.332152] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1244.332168] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1244.332184] ? lock_release+0xc8/0x290 [ 1244.332202] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1244.332245] ? down_write_nested+0x130/0x1f0 [ 1244.332263] ? __fget_files+0x34/0x3b0 [ 1244.332279] ? find_held_lock+0x2b/0x80 [ 1244.332291] ? __fget_files+0x203/0x3b0 [ 1244.332307] ? __pfx_lo_ioctl+0x10/0x10 [ 1244.332323] blkdev_ioctl+0x365/0x6d0 [ 1244.332343] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1244.332362] ? selinux_file_ioctl+0xb9/0x280 [ 1244.332379] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1244.332399] __x64_sys_ioctl+0x18f/0x210 [ 1244.332414] do_syscall_64+0xbf/0x390 [ 1244.332434] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1244.332446] RIP: 0033:0x7f1b64b618d7 [ 1244.332456] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1244.332468] RSP: 002b:00007f1b620d6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1244.332480] RAX: ffffffffffffffda RBX: 00007f1b64bab970 RCX: 00007f1b64b618d7 [ 1244.332488] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1244.332495] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1244.332502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1244.332509] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1244.332529] [ 1244.361169] Process accounting resumed 01:55:06 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380f00001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1244.380555] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1244.382320] EXT4-fs (loop7): group descriptors corrupted! 01:55:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) [ 1244.417001] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1244.417862] EXT4-fs (loop5): group descriptors corrupted! 01:55:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 36) 01:55:06 executing program 4: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000480)={0x0, 'ip6_vti0\x00', {0x4}, 0x9}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) add_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000280)="12ebd9eb872f56e522a63a225bc3bdc484f0588557c8681fab4dade0626075ea9ba419b2b4ade04d30ff9106fe76cd24ac430da3c81de912a67018eb8f28f5bf98ba1ba2eab8d7f2920c928688866f2f14afa029e016ca8a1a967e392eee24f7e6d9382225da5854dec8da2e94adfb105b7d6d591bb864e19e727f09562f56707a0f3fa4eb929424bbeec7abb5f305685a5bfa3c879b5f013ad4b8256fb857ea57aeb203c37685826fe934930af52176ba1e151f402b15ae61a5136f3c7cf0d4f838e14acc14a3c2", 0xc8, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @auto=[0x62, 0x65, 0x35, 0x30, 0x38, 0x65, 0x0, 0x52, 0x66, 0x66, 0x62, 0x30, 0x65, 0x65, 0x62, 0x30]}, &(0x7f0000000400)={0x0, "345d6fc016039c44a63f95595d31283ad2f77c95389f30195538b908cc1639e8d1a6d5c2e14cde44759236fa94a45f67ae0119c46d24837b5e6525d830c38d56", 0x1f}, 0x48, r3) 01:55:06 executing program 0: r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, r0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x9}, 0x49088, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x20fe, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) perf_event_open$cgroup(&(0x7f0000000580)={0x3, 0x80, 0x81, 0x3, 0xa9, 0x7, 0x0, 0x3f2, 0x0, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000540), 0x1}, 0x400, 0x7, 0x5, 0x3, 0xfffffffffffffffe, 0x2, 0x8, 0x0, 0x2, 0x0, 0x2d}, 0xffffffffffffffff, 0x9, r1, 0xb) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) r4 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$link(0x8, r4, r2) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r5) add_key(&(0x7f0000000600)='dns_resolver\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="06759ee5002eac6ef74069565e1ce9031592390e882442ec4178b0c91c44e3c75628819cc3bc2aca2671006f8389875e7588cd7c8970eeac3465ae08673b6081967d70d235bc86ad409245c6d1c8a942d3e9eee30116bbd92b11dfd473d68be10bc86ce0e71d11a6946bcbaa73a692d571eda90cd7b4726de86d27bd7fa53c38793db5b11f5c419f28da8bdd7ee123b204980c32e76541", 0x97, 0xfffffffffffffff8) add_key(&(0x7f00000003c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, r4) add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="4662b4adfb016796ba543ed51e902ffe9d190d12fd74751050cb055469af0050fc3de3881568a99eea19b0216dbaccb22df550abdc70b35dafc9470b8b2b32d3f5ab062b4837c6fe13", 0x49, r3) r6 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, r6) [ 1244.473280] FAULT_INJECTION: forcing a failure. [ 1244.473280] name failslab, interval 1, probability 0, space 0, times 0 [ 1244.474214] CPU: 0 UID: 0 PID: 9597 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1244.474231] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1244.474239] Call Trace: [ 1244.474243] [ 1244.474248] dump_stack_lvl+0xfa/0x120 [ 1244.474271] should_fail_ex+0x4d7/0x5e0 [ 1244.474290] ? __kernfs_new_node+0xd3/0x870 [ 1244.474310] should_failslab+0xc2/0x120 [ 1244.474329] kmem_cache_alloc_noprof+0x80/0x690 [ 1244.474343] ? perf_trace_lock_acquire+0xc9/0x700 [ 1244.474366] ? __kernfs_new_node+0xd3/0x870 [ 1244.474384] __kernfs_new_node+0xd3/0x870 [ 1244.474406] ? __pfx___kernfs_new_node+0x10/0x10 [ 1244.474428] ? lock_acquire+0x15e/0x2f0 [ 1244.474444] ? kernfs_root+0x23/0x2a0 [ 1244.474462] ? find_held_lock+0x2b/0x80 [ 1244.474475] ? kernfs_root+0xee/0x2a0 [ 1244.474493] ? lock_release+0xc8/0x290 [ 1244.474508] ? lock_is_held_type+0x9e/0x120 [ 1244.474530] kernfs_new_node+0x13c/0x1e0 [ 1244.474548] __kernfs_create_file+0x55/0x360 [ 1244.474567] sysfs_add_file_mode_ns+0x21c/0x440 [ 1244.474587] ? __pfx_dev_attr_store+0x10/0x10 [ 1244.474608] internal_create_group+0x571/0xeb0 [ 1244.474634] ? __pfx_internal_create_group+0x10/0x10 [ 1244.474653] ? blk_validate_limits+0xc27/0x15c0 [ 1244.474677] ? lock_is_held_type+0x9e/0x120 [ 1244.474696] loop_configure+0xc46/0x15a0 [ 1244.474732] ? __pfx_loop_configure+0x10/0x10 [ 1244.474761] ? avc_has_extended_perms+0x107/0xf20 [ 1244.474781] ? find_held_lock+0x2b/0x80 [ 1244.474793] ? avc_has_extended_perms+0x23b/0xf20 [ 1244.474811] ? lock_release+0xc8/0x290 [ 1244.474831] lo_ioctl+0x66d/0x1ca0 [ 1244.474851] ? __pfx_lo_ioctl+0x10/0x10 [ 1244.474866] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1244.474886] ? __pfx_perf_trace_lock+0x10/0x10 [ 1244.474907] ? lock_acquire+0x15e/0x2f0 [ 1244.474923] ? __virt_addr_valid+0x1c6/0x5d0 [ 1244.474937] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1244.474956] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1244.474971] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1244.474987] ? lock_release+0xc8/0x290 [ 1244.475006] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1244.475049] ? down_write_nested+0x130/0x1f0 [ 1244.475067] ? __fget_files+0x34/0x3b0 [ 1244.475083] ? find_held_lock+0x2b/0x80 [ 1244.475096] ? __fget_files+0x203/0x3b0 [ 1244.475116] ? __pfx_lo_ioctl+0x10/0x10 [ 1244.475132] blkdev_ioctl+0x365/0x6d0 [ 1244.475151] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1244.475170] ? selinux_file_ioctl+0xb9/0x280 [ 1244.475187] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1244.475208] __x64_sys_ioctl+0x18f/0x210 [ 1244.475223] do_syscall_64+0xbf/0x390 [ 1244.475243] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1244.475255] RIP: 0033:0x7fd2e63058d7 [ 1244.475265] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1244.475277] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1244.475289] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e63058d7 [ 1244.475297] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1244.475304] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1244.475311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1244.475318] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1244.475338] [ 1244.536514] loop2: detected capacity change from 0 to 512 [ 1244.596814] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1244.598613] EXT4-fs (loop2): group descriptors corrupted! 01:55:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 38) 01:55:19 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'veth1_to_batadv\x00', &(0x7f00000000c0)=@ethtool_rx_ntuple={0x35, {0x11, @esp_ip4_spec={@dev={0xac, 0x14, 0x14, 0x13}, @remote, 0x9, 0x1}, @tcp_ip4_spec={@dev={0xac, 0x14, 0x14, 0x3b}, @loopback, 0x4e21, 0x4e23, 0x80}, 0x1, 0x3, 0x7f, 0x100000000, 0xfffffffffffffffe}}}) 01:55:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 37) 01:55:19 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r0, 0x0, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x3}, 0x0, 0x1, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r1, r3, 0x0) r5 = request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000280)='-\x00', 0xfffffffffffffff9) r6 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r2) r7 = add_key$fscrypt_v1(&(0x7f0000000340), &(0x7f0000000380)={'fscrypt:', @desc1}, &(0x7f00000003c0)={0x0, "53a1c513529af1f95a5c9d384e9d17da7e00f896dc6a2d07f55a917e2712806117fded1f9bc81638c1ed190735fdb03ff931f06d58f54e876ff65b3f29e1e0d2", 0x24}, 0x48, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r5, r6, r7, 0x1) 01:55:19 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="381000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:55:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:55:19 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r1, 0x2, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000000, 0x5}, 0x0, 0x0, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000100)={0x2}) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r2, r3, 0x0) 01:55:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 43) [ 1257.391865] loop5: detected capacity change from 0 to 512 [ 1257.404385] loop2: detected capacity change from 0 to 512 [ 1257.409607] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1257.410548] EXT4-fs (loop5): group descriptors corrupted! [ 1257.420949] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1257.421904] EXT4-fs (loop2): group descriptors corrupted! [ 1257.427910] loop7: detected capacity change from 0 to 512 [ 1257.435390] FAULT_INJECTION: forcing a failure. [ 1257.435390] name failslab, interval 1, probability 0, space 0, times 0 [ 1257.437466] CPU: 1 UID: 0 PID: 9629 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1257.437497] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1257.437510] Call Trace: [ 1257.437517] [ 1257.437527] dump_stack_lvl+0xfa/0x120 [ 1257.437564] should_fail_ex+0x4d7/0x5e0 [ 1257.437597] should_failslab+0xc2/0x120 [ 1257.437630] __kmalloc_cache_noprof+0x81/0x6b0 [ 1257.437668] ? lock_release+0xc8/0x290 [ 1257.437701] ? kobject_uevent_env+0x22e/0xf90 [ 1257.437734] ? kobject_uevent_env+0x22e/0xf90 [ 1257.437757] kobject_uevent_env+0x22e/0xf90 [ 1257.437788] ? lock_is_held_type+0x9e/0x120 [ 1257.437825] loop_configure+0xe31/0x15a0 [ 1257.437894] ? __pfx_loop_configure+0x10/0x10 [ 1257.437950] ? avc_has_extended_perms+0x107/0xf20 [ 1257.437986] ? find_held_lock+0x2b/0x80 [ 1257.438011] ? avc_has_extended_perms+0x23b/0xf20 [ 1257.438045] ? lock_release+0xc8/0x290 [ 1257.438082] lo_ioctl+0x66d/0x1ca0 [ 1257.438129] ? __pfx_lo_ioctl+0x10/0x10 [ 1257.438158] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1257.438196] ? __pfx_perf_trace_lock+0x10/0x10 [ 1257.438235] ? lock_acquire+0x15e/0x2f0 [ 1257.438265] ? __virt_addr_valid+0x1c6/0x5d0 [ 1257.438292] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1257.438325] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1257.438356] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1257.438385] ? lock_release+0xc8/0x290 [ 1257.438421] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1257.438502] ? down_write_nested+0x130/0x1f0 [ 1257.438537] ? __fget_files+0x34/0x3b0 [ 1257.438566] ? find_held_lock+0x2b/0x80 [ 1257.438589] ? __fget_files+0x203/0x3b0 [ 1257.438620] ? __pfx_lo_ioctl+0x10/0x10 [ 1257.438650] blkdev_ioctl+0x365/0x6d0 [ 1257.438687] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1257.438723] ? selinux_file_ioctl+0xb9/0x280 [ 1257.438754] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1257.438794] __x64_sys_ioctl+0x18f/0x210 [ 1257.438822] do_syscall_64+0xbf/0x390 [ 1257.438859] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1257.438882] RIP: 0033:0x7f94bafef8d7 [ 1257.438900] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1257.438922] RSP: 002b:00007f94b8564f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1257.438945] RAX: ffffffffffffffda RBX: 00007f94bb039970 RCX: 00007f94bafef8d7 [ 1257.438960] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1257.438974] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1257.438988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1257.439001] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1257.439039] 01:55:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 38) 01:55:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)='keyring\x00', r1) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r5) keyctl$KEYCTL_MOVE(0x1e, r4, r0, r3, 0x0) 01:55:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 44) 01:55:19 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="381100001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1257.570633] FAULT_INJECTION: forcing a failure. [ 1257.570633] name failslab, interval 1, probability 0, space 0, times 0 [ 1257.571614] CPU: 0 UID: 0 PID: 9643 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1257.571631] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1257.571638] Call Trace: [ 1257.571643] [ 1257.571648] dump_stack_lvl+0xfa/0x120 [ 1257.571671] should_fail_ex+0x4d7/0x5e0 [ 1257.571690] ? __kernfs_new_node+0xd3/0x870 [ 1257.571709] should_failslab+0xc2/0x120 [ 1257.571728] kmem_cache_alloc_noprof+0x80/0x690 [ 1257.571742] ? perf_trace_lock_acquire+0xc9/0x700 [ 1257.571766] ? __kernfs_new_node+0xd3/0x870 [ 1257.571783] __kernfs_new_node+0xd3/0x870 [ 1257.571805] ? __pfx___kernfs_new_node+0x10/0x10 [ 1257.571828] ? lock_acquire+0x15e/0x2f0 [ 1257.571843] ? kernfs_root+0x23/0x2a0 [ 1257.571861] ? find_held_lock+0x2b/0x80 [ 1257.571874] ? kernfs_root+0xee/0x2a0 [ 1257.571892] ? lock_release+0xc8/0x290 [ 1257.571906] ? lock_is_held_type+0x9e/0x120 [ 1257.571928] kernfs_new_node+0x13c/0x1e0 [ 1257.571946] __kernfs_create_file+0x55/0x360 [ 1257.571964] sysfs_add_file_mode_ns+0x21c/0x440 [ 1257.571985] ? __pfx_dev_attr_store+0x10/0x10 [ 1257.572005] internal_create_group+0x571/0xeb0 [ 1257.572032] ? __pfx_internal_create_group+0x10/0x10 [ 1257.572051] ? blk_validate_limits+0xc27/0x15c0 [ 1257.572074] ? lock_is_held_type+0x9e/0x120 [ 1257.572092] loop_configure+0xc46/0x15a0 [ 1257.572133] ? __pfx_loop_configure+0x10/0x10 [ 1257.572162] ? avc_has_extended_perms+0x107/0xf20 [ 1257.572181] ? find_held_lock+0x2b/0x80 [ 1257.572194] ? avc_has_extended_perms+0x23b/0xf20 [ 1257.572212] ? lock_release+0xc8/0x290 [ 1257.572231] lo_ioctl+0x66d/0x1ca0 [ 1257.572251] ? __pfx_lo_ioctl+0x10/0x10 [ 1257.572266] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1257.572286] ? __pfx_perf_trace_lock+0x10/0x10 [ 1257.572307] ? lock_acquire+0x15e/0x2f0 [ 1257.572322] ? __virt_addr_valid+0x1c6/0x5d0 [ 1257.572337] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1257.572356] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1257.572372] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1257.572387] ? lock_release+0xc8/0x290 [ 1257.572406] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1257.572449] ? down_write_nested+0x130/0x1f0 [ 1257.572467] ? __fget_files+0x34/0x3b0 [ 1257.572483] ? find_held_lock+0x2b/0x80 [ 1257.572495] ? __fget_files+0x203/0x3b0 [ 1257.572511] ? __pfx_lo_ioctl+0x10/0x10 [ 1257.572527] blkdev_ioctl+0x365/0x6d0 [ 1257.572546] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1257.572565] ? selinux_file_ioctl+0xb9/0x280 [ 1257.572582] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1257.572602] __x64_sys_ioctl+0x18f/0x210 [ 1257.572617] do_syscall_64+0xbf/0x390 [ 1257.572637] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1257.572650] RIP: 0033:0x7fd2e63058d7 [ 1257.572659] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1257.572672] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1257.572684] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e63058d7 [ 1257.572692] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1257.572699] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1257.572706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1257.572713] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1257.572733] [ 1257.602723] loop5: detected capacity change from 0 to 512 01:55:19 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r4 = request_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='%}#*\\#\x00', r1) keyctl$negate(0xd, r3, 0x3, r4) keyctl$KEYCTL_MOVE(0x1e, r3, r0, r2, 0x0) request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000280)='@/\x00', r0) 01:55:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) [ 1257.625307] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1257.626431] EXT4-fs (loop5): group descriptors corrupted! [ 1257.644269] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1257.646019] EXT4-fs (loop7): group descriptors corrupted! [ 1257.666225] loop2: detected capacity change from 0 to 512 [ 1257.670068] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1257.671044] EXT4-fs (loop2): group descriptors corrupted! 01:55:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 45) 01:55:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) [ 1257.747536] loop5: detected capacity change from 0 to 512 [ 1257.761830] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1257.762667] EXT4-fs (loop5): group descriptors corrupted! 01:55:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 39) [ 1257.881262] loop7: detected capacity change from 0 to 512 [ 1257.887565] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1257.888389] EXT4-fs (loop7): group descriptors corrupted! 01:55:30 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="381400001200010e000000000000000028001a"], 0x38}}, 0x0) 01:55:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) r3 = add_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000280)="b7eeeee99d9b0993dad14ab261db9b4dd2b3deefeb296f8009f3c553099f30ce8f26ac532ca9d9e49dbec57aa47f83f9ba90de377b7ffb655b34b32a5324d82cb67d5cb1e1df2209ecf186dadd43f4a2522479", 0x53, r1) keyctl$reject(0x13, r2, 0x1, 0x1, r3) 01:55:30 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@private, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) clone3(&(0x7f0000001640)={0x10000, &(0x7f0000000000), &(0x7f00000004c0), &(0x7f0000000500), {0x1}, &(0x7f0000000540)=""/179, 0xb3, &(0x7f0000000600)=""/4096, &(0x7f0000001600)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000440)={&(0x7f0000000200)=@delpolicy={0x210, 0x14, 0x5, 0x70bd27, 0x25dfdbfe, {{@in6=@remote, @in=@rand_addr=0x64010102, 0x4e23, 0x1, 0x4e22, 0x0, 0x2, 0xa0, 0x20, 0x87, 0x0, r1}, 0x0, 0x2}, [@coaddr={0x5b, 0xe, @in6=@private0={0xfc, 0x0, '\x00', 0xfd}}, @algo_auth_trunc={0xa0, 0x14, {{'wp512-generic\x00'}, 0x2a0, 0x40, "d734acefed2e024835d4f9062c8001686cd68e09c45a452eb95456e975eab10e545cc3e7d1214ed3a78e9aefc00026c5324d85ed5870ffb6ecbd01da5629b765ff36c6d2320966d4043c573d87e61296698edd2f"}}, @sec_ctx={0xf3, 0x8, {0xef, 0x8, 0x0, 0xdf, 0xe7, "6bfbba223ee3ea1853a70d23699597a35a54234b14753c67e5efc50866229915d29435367b8accd32a85a5fd45d71140ee5f66d660070a701a3e61317383082dd20f9495ce2d8dd4cdd31bfd7fce33464d777beb50b0c357bb100b394f09000000000000004d894c5f09f6a5d48747d679120e3597dc10634dfafc51934c7632658e8bad0be5ae8f8a82e2b99490da07247d1c34edef9a9a95ec1695dcc39a938b231a65dcef0407ed6c24aee13ea0dc8188020a3279d8e8f532e5f40c15630f135521d1fc312d82ff316b6f5b5149911e58a5455e79d7c4d47eba14570ebb622dc55449c85c54"}}, @mark={0xc, 0x15, {0x35075c, 0xc0}}, @mark={0xc, 0x15, {0x35075d, 0xffffffff}}]}, 0x210}, 0x1, 0x0, 0x0, 0x4008080}, 0x15) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) 01:55:30 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 40) 01:55:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 39) 01:55:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 46) 01:55:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:55:30 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x14004, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r1, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x400) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000180)={r0, 0x5, 0xe25, 0x6}) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000280)='@(\xa7\x00', 0xfffffffffffffffb) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) close(0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1, {0xf1c}}, './file0\x00'}) io_submit(0x0, 0x4, &(0x7f0000000700)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3, 0x0, r2, &(0x7f0000000440)="f8ef30239cc71b8b70c89d8660cc9c35caa614836d1d1831cac969ea90302add085bfddfbb96", 0x26, 0x100000001, 0x0, 0x2, r7}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x2, 0xff, r0, &(0x7f0000000500)="1bacf25e7396586da662f34785e34875123f92c1071d5d2be41431f6355868e14022f449cf7d0e727ed2", 0x2a, 0x0, 0x0, 0x3b927a414c867750, r2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x6, r2, &(0x7f0000000580)="9ffa295a5cdd016a561952bb47ffd91eefdf4c7b263a9125ba610e3b39778a", 0x1f, 0x20000000000, 0x0, 0x3}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x1, 0x7ff, r0, &(0x7f0000000600)="6dbd45bbdf2834c90ca9f378fb434c79f76f877938809162e561dde9986f2f84cd869e1129e1086ed8795b03d522fc01062a1edbf3d43ce644bd0cde71f513e82379cf49bc2ce088c45bae88906a4be6e2da16638ce57625a786ff8b1559fe569681b1f3dcad37d7d0cf0d489eec1f02060f03819e30f8f37e690a554f8f28be4a2df53a669d36dfbf00f00279624aa70f0169d33132fba582ea00370ab0dedb74f265817ac29bfc484841b5a542979a0de77536f2", 0xb5, 0x4, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r8, r5, r6, 0x0) add_key(&(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)="7db79134dc3645e9b0a7da18e49a91c06dd2ee7221c272ffd44a2309f8d0fb84649bbf700ebd5c0f7ffc21921768a3e37492163bc5037f7aa7124c2816f2dfe4de273d400c6abe7e953b8005d3d2921650973ccd54cee224fe03019b57c009b8cf471fbbfae95bdd590a6c68bfb9a2e83e1a5d4165d8e2bc50e6663311339e66147f154642f6117df10ad8ad194773a00aa11cab3a483d6cb4eead8429d27dc81b1ce1eb0398", 0xa6, r8) r9 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r9, r3, r4, 0x0) 01:55:30 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0xf502, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) [ 1268.895744] loop5: detected capacity change from 0 to 512 [ 1268.900893] FAULT_INJECTION: forcing a failure. [ 1268.900893] name failslab, interval 1, probability 0, space 0, times 0 [ 1268.902713] CPU: 0 UID: 0 PID: 9683 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1268.902743] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1268.902757] Call Trace: [ 1268.902765] [ 1268.902773] dump_stack_lvl+0xfa/0x120 [ 1268.902813] should_fail_ex+0x4d7/0x5e0 [ 1268.902847] should_failslab+0xc2/0x120 [ 1268.902880] kmem_cache_alloc_node_noprof+0x87/0x6b0 [ 1268.902906] ? perf_trace_lock+0xb5/0x5d0 [ 1268.902937] ? __alloc_skb+0x2ab/0x370 [ 1268.902970] ? __alloc_skb+0x2ab/0x370 [ 1268.902989] __alloc_skb+0x2ab/0x370 [ 1268.903012] ? __pfx___alloc_skb+0x10/0x10 [ 1268.903032] ? lock_acquire+0x15e/0x2f0 [ 1268.903062] ? netlink_has_listeners+0x7f/0x430 [ 1268.903091] ? netlink_has_listeners+0x20d/0x430 [ 1268.903123] ? lock_release+0xc8/0x290 [ 1268.903177] alloc_uevent_skb+0x7b/0x210 [ 1268.903206] kobject_uevent_env+0xa8c/0xf90 [ 1268.903237] ? lock_is_held_type+0x9e/0x120 [ 1268.903274] loop_configure+0xe31/0x15a0 [ 1268.903341] ? __pfx_loop_configure+0x10/0x10 [ 1268.903397] ? avc_has_extended_perms+0x107/0xf20 [ 1268.903432] ? find_held_lock+0x2b/0x80 [ 1268.903456] ? avc_has_extended_perms+0x23b/0xf20 [ 1268.903490] ? lock_release+0xc8/0x290 [ 1268.903525] lo_ioctl+0x66d/0x1ca0 [ 1268.903564] ? __pfx_lo_ioctl+0x10/0x10 [ 1268.903592] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1268.903629] ? __pfx_perf_trace_lock+0x10/0x10 [ 1268.903668] ? lock_acquire+0x15e/0x2f0 [ 1268.903697] ? __virt_addr_valid+0x1c6/0x5d0 [ 1268.903723] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1268.903757] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1268.903787] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1268.903817] ? lock_release+0xc8/0x290 [ 1268.903851] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1268.903932] ? down_write_nested+0x130/0x1f0 [ 1268.903966] ? __fget_files+0x34/0x3b0 [ 1268.903995] ? find_held_lock+0x2b/0x80 [ 1268.904018] ? __fget_files+0x203/0x3b0 [ 1268.904048] ? __pfx_lo_ioctl+0x10/0x10 [ 1268.904077] blkdev_ioctl+0x365/0x6d0 [ 1268.904114] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1268.904149] ? selinux_file_ioctl+0xb9/0x280 [ 1268.904180] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1268.904218] __x64_sys_ioctl+0x18f/0x210 [ 1268.904246] do_syscall_64+0xbf/0x390 [ 1268.904283] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1268.904306] RIP: 0033:0x7f1b64b618d7 [ 1268.904325] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1268.904346] RSP: 002b:00007f1b620d6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1268.904368] RAX: ffffffffffffffda RBX: 00007f1b64bab970 RCX: 00007f1b64b618d7 [ 1268.904383] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1268.904399] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1268.904414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1268.904428] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1268.904466] [ 1268.911023] loop2: detected capacity change from 0 to 512 [ 1268.965848] loop7: detected capacity change from 0 to 512 [ 1268.972521] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1268.974031] EXT4-fs (loop5): group descriptors corrupted! [ 1268.977334] FAULT_INJECTION: forcing a failure. [ 1268.977334] name failslab, interval 1, probability 0, space 0, times 0 [ 1268.979255] CPU: 0 UID: 0 PID: 9690 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1268.979285] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1268.979299] Call Trace: [ 1268.979307] [ 1268.979316] dump_stack_lvl+0xfa/0x120 [ 1268.979355] should_fail_ex+0x4d7/0x5e0 [ 1268.979388] should_failslab+0xc2/0x120 [ 1268.979422] __kmalloc_noprof+0xcd/0x680 [ 1268.979454] ? __create_object+0x59/0x80 [ 1268.979478] ? kobject_get_path+0xc9/0x200 [ 1268.979511] ? trace_kmalloc+0x1f/0xb0 [ 1268.979546] kobject_get_path+0xc9/0x200 [ 1268.979581] ? kasan_save_track+0x14/0x30 [ 1268.979618] kobject_uevent_env+0x252/0xf90 [ 1268.979648] ? lock_is_held_type+0x9e/0x120 [ 1268.979685] loop_configure+0xe31/0x15a0 [ 1268.979752] ? __pfx_loop_configure+0x10/0x10 [ 1268.979807] ? avc_has_extended_perms+0x107/0xf20 [ 1268.979842] ? find_held_lock+0x2b/0x80 [ 1268.979868] ? avc_has_extended_perms+0x23b/0xf20 [ 1268.979901] ? lock_release+0xc8/0x290 [ 1268.979937] lo_ioctl+0x66d/0x1ca0 [ 1268.979975] ? __pfx_lo_ioctl+0x10/0x10 [ 1268.980004] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1268.980040] ? __pfx_perf_trace_lock+0x10/0x10 [ 1268.980078] ? lock_acquire+0x15e/0x2f0 [ 1268.980115] ? __virt_addr_valid+0x1c6/0x5d0 [ 1268.980142] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1268.980176] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1268.980205] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1268.980235] ? lock_release+0xc8/0x290 [ 1268.980269] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1268.980348] ? down_write_nested+0x130/0x1f0 [ 1268.980382] ? __fget_files+0x34/0x3b0 [ 1268.980410] ? find_held_lock+0x2b/0x80 [ 1268.980433] ? __fget_files+0x203/0x3b0 [ 1268.980462] ? __pfx_lo_ioctl+0x10/0x10 [ 1268.980491] blkdev_ioctl+0x365/0x6d0 [ 1268.980528] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1268.980563] ? selinux_file_ioctl+0xb9/0x280 [ 1268.980594] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1268.980632] __x64_sys_ioctl+0x18f/0x210 [ 1268.980659] do_syscall_64+0xbf/0x390 [ 1268.980695] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1268.980719] RIP: 0033:0x7f94bafef8d7 [ 1268.980736] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1268.980758] RSP: 002b:00007f94b8564f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1268.980780] RAX: ffffffffffffffda RBX: 00007f94bb039970 RCX: 00007f94bafef8d7 [ 1268.980795] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1268.980808] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1268.980822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1268.980835] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1268.980872] 01:55:31 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'rose0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="3200000003000000010000800000000000000000000000000000aaaaaaf3dda16297cfbc10d9ec877a3eaaaa2d0401000000000000000000000000000000000000000000000000000000000000000000000800000000000180c2000001010000010000008100000008fe800000000000c8682607ac1f1a150000000000000000bbfe800000000000000000000000000038000000200600000000000000000000000000000000000180b100000301010000fffffffd0000030900000000090000000000000007000000000000000400000008000000ff000000f7ffffff75ae0000aa5d86f3ef99d01cd3bd724db91f0713112bcbc9c4d46d7fbdc8ed10b7fb4ae66bf0b142442720f5097f1a0dd222875695885d47e4ce26096f54638c0ebcc15d85ff3b88512be925769ca28064"]}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r3, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xb9ae, 0x0, 0x0, 0x0, 0x7f}) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) r4 = syz_io_uring_complete(0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x4, 0x9, 0x21, 0xde, 0xb, @initdev={0xfe, 0x88, '\x00', 0x7, 0x0}, @dev={0xfe, 0x80, '\x00', 0x2c}, 0x8000, 0x0, 0x8, 0x81}}) getsockname(r2, &(0x7f00000001c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0x80) 01:55:31 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="381500001200010e000000000000000028001a"], 0x38}}, 0x0) 01:55:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) 01:55:31 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000002c0)={0x0, 0x21, 0x40}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'md4\x00'}}, &(0x7f0000000380)="9735c85be8247cc05a566351eefb5f59d0ddfb4b6f64b9e4342392fdbae99c42df", &(0x7f00000003c0)=""/64) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000280)=':\x00', r1) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, r0, r2, 0x0) [ 1269.092079] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1269.093712] EXT4-fs (loop2): group descriptors corrupted! [ 1269.115867] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1269.117663] EXT4-fs (loop7): group descriptors corrupted! 01:55:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 47) 01:55:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x20, r1, 0x1, 0x0, 0x0, {0x8}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x20}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xd8, r4, 0x4, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x68, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2e}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@private0}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2c}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000001}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x717429dc}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfff}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x33c}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x59e}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0xd8}, 0x1, 0x0, 0x0, 0x200480d1}, 0x800) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x20, r7, 0x1, 0x0, 0x0, {0x8}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x20}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), r6) r10 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r5) r11 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r11, r5, r10, 0x0) 01:55:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 40) 01:55:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 41) [ 1269.309394] loop5: detected capacity change from 0 to 512 01:55:31 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) keyctl$unlink(0x9, r0, 0x0) [ 1269.338581] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1269.340380] EXT4-fs (loop5): group descriptors corrupted! [ 1269.373843] FAULT_INJECTION: forcing a failure. [ 1269.373843] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.375971] CPU: 1 UID: 0 PID: 9716 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1269.376002] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1269.376016] Call Trace: [ 1269.376024] [ 1269.376033] dump_stack_lvl+0xfa/0x120 [ 1269.376072] should_fail_ex+0x4d7/0x5e0 [ 1269.376112] ? __kernfs_new_node+0xd3/0x870 [ 1269.376147] should_failslab+0xc2/0x120 [ 1269.376180] kmem_cache_alloc_noprof+0x80/0x690 [ 1269.376206] ? perf_trace_lock_acquire+0xc9/0x700 [ 1269.376249] ? __kernfs_new_node+0xd3/0x870 [ 1269.376283] __kernfs_new_node+0xd3/0x870 [ 1269.376324] ? __pfx___kernfs_new_node+0x10/0x10 [ 1269.376366] ? lock_acquire+0x15e/0x2f0 [ 1269.376395] ? kernfs_root+0x23/0x2a0 [ 1269.376429] ? find_held_lock+0x2b/0x80 [ 1269.376453] ? kernfs_root+0xee/0x2a0 [ 1269.376486] ? lock_release+0xc8/0x290 [ 1269.376514] ? lock_is_held_type+0x9e/0x120 [ 1269.376554] kernfs_new_node+0x13c/0x1e0 [ 1269.376587] __kernfs_create_file+0x55/0x360 [ 1269.376622] sysfs_add_file_mode_ns+0x21c/0x440 [ 1269.376660] ? __pfx_dev_attr_store+0x10/0x10 [ 1269.376698] internal_create_group+0x571/0xeb0 [ 1269.376743] ? __pfx___sanitizer_cov_trace_pc+0x10/0x10 [ 1269.376782] ? __pfx_internal_create_group+0x10/0x10 [ 1269.376817] ? blk_validate_limits+0xc27/0x15c0 [ 1269.376859] ? lock_is_held_type+0x9e/0x120 [ 1269.376893] loop_configure+0xc46/0x15a0 [ 1269.376959] ? __pfx_loop_configure+0x10/0x10 [ 1269.377013] ? avc_has_extended_perms+0x107/0xf20 [ 1269.377050] ? find_held_lock+0x2b/0x80 [ 1269.377073] ? avc_has_extended_perms+0x23b/0xf20 [ 1269.377107] ? lock_release+0xc8/0x290 [ 1269.377143] lo_ioctl+0x66d/0x1ca0 [ 1269.377181] ? __pfx_lo_ioctl+0x10/0x10 [ 1269.377209] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1269.377246] ? __pfx_perf_trace_lock+0x10/0x10 [ 1269.377284] ? lock_acquire+0x15e/0x2f0 [ 1269.377313] ? __virt_addr_valid+0x1c6/0x5d0 [ 1269.377339] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1269.377372] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1269.377402] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1269.377431] ? lock_release+0xc8/0x290 [ 1269.377465] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1269.377543] ? down_write_nested+0x130/0x1f0 [ 1269.377577] ? __fget_files+0x34/0x3b0 [ 1269.377606] ? find_held_lock+0x2b/0x80 [ 1269.377629] ? __fget_files+0x203/0x3b0 [ 1269.377659] ? __pfx_lo_ioctl+0x10/0x10 [ 1269.377689] blkdev_ioctl+0x365/0x6d0 [ 1269.377724] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1269.377760] ? selinux_file_ioctl+0xb9/0x280 [ 1269.377790] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1269.377828] __x64_sys_ioctl+0x18f/0x210 [ 1269.377856] do_syscall_64+0xbf/0x390 [ 1269.377892] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1269.377915] RIP: 0033:0x7fd2e63058d7 [ 1269.377933] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.377955] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1269.377977] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e63058d7 [ 1269.377992] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1269.378006] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1269.378020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1269.378033] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1269.378070] 01:55:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) [ 1269.523293] loop2: detected capacity change from 0 to 512 [ 1269.535698] loop7: detected capacity change from 0 to 512 [ 1269.567881] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1269.569690] EXT4-fs (loop2): group descriptors corrupted! [ 1269.573636] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1269.575289] EXT4-fs (loop7): group descriptors corrupted! 01:55:44 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38f000001200010e000000000000000028001a"], 0x38}}, 0x0) 01:55:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x565000, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:55:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 48) 01:55:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x0) 01:55:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 41) 01:55:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 42) 01:55:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000280)="db38557ecb2c64d80b058d23fe4477513ae937554b07391f61", 0x19, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:55:44 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'veth0\x00', 0x0}) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newae={0x50, 0x1e, 0x1, 0x70bd29, 0x25dfdbff, {{@in6=@private0, 0x4d4, 0x2, 0xff}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x1, 0x3506}, [@XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x10000}, @XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004080}, 0x8000) [ 1282.218992] FAULT_INJECTION: forcing a failure. [ 1282.218992] name failslab, interval 1, probability 0, space 0, times 0 [ 1282.220851] CPU: 1 UID: 0 PID: 9755 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1282.220881] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1282.220895] Call Trace: [ 1282.220902] [ 1282.220911] dump_stack_lvl+0xfa/0x120 [ 1282.220949] should_fail_ex+0x4d7/0x5e0 [ 1282.220981] ? __kernfs_new_node+0xd3/0x870 [ 1282.221015] should_failslab+0xc2/0x120 [ 1282.221048] kmem_cache_alloc_noprof+0x80/0x690 [ 1282.221074] ? perf_trace_lock_acquire+0xc9/0x700 [ 1282.221124] ? __kernfs_new_node+0xd3/0x870 [ 1282.221157] __kernfs_new_node+0xd3/0x870 [ 1282.221198] ? __pfx___kernfs_new_node+0x10/0x10 [ 1282.221240] ? lock_acquire+0x15e/0x2f0 [ 1282.221269] ? kernfs_root+0x23/0x2a0 [ 1282.221303] ? find_held_lock+0x2b/0x80 [ 1282.221327] ? kernfs_root+0xee/0x2a0 [ 1282.221355] loop5: detected capacity change from 0 to 512 [ 1282.221361] ? lock_release+0xc8/0x290 [ 1282.221389] ? lock_is_held_type+0x9e/0x120 [ 1282.221429] kernfs_new_node+0x13c/0x1e0 [ 1282.221461] __kernfs_create_file+0x55/0x360 [ 1282.221496] sysfs_add_file_mode_ns+0x21c/0x440 [ 1282.221535] ? __pfx_dev_attr_store+0x10/0x10 [ 1282.221572] internal_create_group+0x571/0xeb0 [ 1282.221622] ? __pfx_internal_create_group+0x10/0x10 [ 1282.221657] ? blk_validate_limits+0xc27/0x15c0 [ 1282.221699] ? lock_is_held_type+0x9e/0x120 [ 1282.221734] loop_configure+0xc46/0x15a0 [ 1282.221799] ? __pfx_loop_configure+0x10/0x10 [ 1282.221854] ? avc_has_extended_perms+0x107/0xf20 [ 1282.221889] ? find_held_lock+0x2b/0x80 [ 1282.221912] ? avc_has_extended_perms+0x23b/0xf20 [ 1282.221946] ? lock_release+0xc8/0x290 [ 1282.221981] lo_ioctl+0x66d/0x1ca0 [ 1282.222019] ? __pfx_lo_ioctl+0x10/0x10 [ 1282.222048] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1282.222085] ? __pfx_perf_trace_lock+0x10/0x10 [ 1282.222123] ? lock_acquire+0x15e/0x2f0 [ 1282.222152] ? __virt_addr_valid+0x1c6/0x5d0 [ 1282.222178] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1282.222212] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1282.222241] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1282.222270] ? lock_release+0xc8/0x290 [ 1282.222304] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1282.222384] ? down_write_nested+0x130/0x1f0 [ 1282.222418] ? __fget_files+0x34/0x3b0 [ 1282.222448] ? find_held_lock+0x2b/0x80 [ 1282.222471] ? __fget_files+0x203/0x3b0 [ 1282.222501] ? __pfx_lo_ioctl+0x10/0x10 [ 1282.222530] blkdev_ioctl+0x365/0x6d0 [ 1282.222566] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1282.222601] ? selinux_file_ioctl+0xb9/0x280 [ 1282.222632] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1282.222669] __x64_sys_ioctl+0x18f/0x210 [ 1282.222697] do_syscall_64+0xbf/0x390 [ 1282.222733] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1282.222756] RIP: 0033:0x7f94bafef8d7 [ 1282.222773] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1282.222795] RSP: 002b:00007f94b8564f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1282.222816] RAX: ffffffffffffffda RBX: 00007f94bb039970 RCX: 00007f94bafef8d7 [ 1282.222832] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1282.222846] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1282.222860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1282.222873] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1282.222910] [ 1282.239517] loop7: detected capacity change from 0 to 512 [ 1282.241375] loop2: detected capacity change from 0 to 512 [ 1282.273605] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1282.275193] EXT4-fs (loop2): group descriptors corrupted! [ 1282.316189] Process accounting paused [ 1282.317539] FAULT_INJECTION: forcing a failure. [ 1282.317539] name failslab, interval 1, probability 0, space 0, times 0 [ 1282.319146] CPU: 0 UID: 0 PID: 9754 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1282.319178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1282.319191] Call Trace: [ 1282.319199] [ 1282.319208] dump_stack_lvl+0xfa/0x120 [ 1282.319246] should_fail_ex+0x4d7/0x5e0 [ 1282.319276] ? getname_flags.part.0+0x48/0x540 [ 1282.319298] should_failslab+0xc2/0x120 [ 1282.319332] kmem_cache_alloc_noprof+0x80/0x690 [ 1282.319357] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1282.319397] ? getname_flags.part.0+0x48/0x540 [ 1282.319418] getname_flags.part.0+0x48/0x540 [ 1282.319444] __x64_sys_mkdir+0xdb/0x140 [ 1282.319476] do_syscall_64+0xbf/0x390 [ 1282.319513] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1282.319537] RIP: 0033:0x7f1b64b60c27 [ 1282.319554] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1282.319576] RSP: 002b:00007f1b620d6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1282.319597] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b60c27 [ 1282.319612] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1282.319626] RBP: 00007f1b620d7040 R08: 0000000000000000 R09: ffffffffffffffff [ 1282.319640] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1282.319653] R13: 0000000020000100 R14: 00007f1b620d7000 R15: 0000000020013c00 [ 1282.319690] 01:55:44 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="387701001200010e000000000000000028001a"], 0x38}}, 0x0) 01:55:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x0) [ 1282.425809] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1282.427380] EXT4-fs (loop7): group descriptors corrupted! 01:55:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 42) 01:55:44 executing program 0: epoll_pwait(0xffffffffffffffff, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x4, &(0x7f0000000140)={[0x20]}, 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f00000003c0), 0x6}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000580)={[0x6]}, &(0x7f0000000400), 0x8) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) dup(r0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x4, 0x20, 0x0, 0x6, 0x0, 0x8, 0x100, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9f, 0x1, @perf_bp={&(0x7f0000000100), 0x3}, 0x2005, 0x1, 0x1, 0x2, 0x5, 0x7fff, 0x3, 0x0, 0x9, 0x0, 0x81}, 0xffffffffffffffff, 0x3, r0, 0x3) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) fremovexattr(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="62747266732e636f6d2e6170706c652e73797374656d2e536563757269747900426c6b781ee177fd125d463ab8e8e54163a8b3c9275aca6d15fc042b6901e25b8d9df9aff3eec2ebaa75d5bf3c48ce528efb4842ed33ce507b"]) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r6, 0x2, r5, 0x0) add_key$keyring(&(0x7f0000000380), &(0x7f0000000440)={'syz', 0x1}, 0x0, 0x0, r2) epoll_pwait2(r6, &(0x7f0000000440), 0x0, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0)={[0x2]}, 0x8) 01:55:44 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = fork() tkill(r2, 0x31) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0xfc, 0x3f, 0x75, 0x20, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3d9, 0x2, @perf_config_ext={0x7, 0x30c2}, 0x8281, 0x6, 0x5, 0x4, 0xffffffff, 0x1ff, 0x6, 0x0, 0x5, 0x0, 0x5}, r2, 0xb, r0, 0x2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r1, r3, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r7, 0x2, r6, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7, 0x5, 0xfa, 0xff, 0x0, 0x1000, 0x102, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0x100, 0x6, 0x0, 0x7, 0x7, 0x1ff, 0x8, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, r6, 0x10) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r5) r9 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r9, r5, r8, 0x0) keyctl$revoke(0x3, r8) keyctl$search(0xa, r1, &(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x3}, r8) 01:55:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 49) 01:55:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 43) [ 1282.560280] loop2: detected capacity change from 0 to 512 [ 1282.572032] FAULT_INJECTION: forcing a failure. [ 1282.572032] name failslab, interval 1, probability 0, space 0, times 0 [ 1282.573782] CPU: 0 UID: 0 PID: 9778 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1282.573813] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1282.573826] Call Trace: [ 1282.573834] [ 1282.573842] dump_stack_lvl+0xfa/0x120 [ 1282.573879] should_fail_ex+0x4d7/0x5e0 [ 1282.573911] should_failslab+0xc2/0x120 [ 1282.573944] __kmalloc_cache_noprof+0x81/0x6b0 [ 1282.573980] ? lock_release+0xc8/0x290 [ 1282.574012] ? kobject_uevent_env+0x22e/0xf90 [ 1282.574044] ? kobject_uevent_env+0x22e/0xf90 [ 1282.574068] kobject_uevent_env+0x22e/0xf90 [ 1282.574098] ? lock_is_held_type+0x9e/0x120 [ 1282.574142] loop_configure+0xe31/0x15a0 [ 1282.574208] ? __pfx_loop_configure+0x10/0x10 [ 1282.574263] ? avc_has_extended_perms+0x107/0xf20 [ 1282.574298] ? find_held_lock+0x2b/0x80 [ 1282.574322] ? avc_has_extended_perms+0x23b/0xf20 [ 1282.574356] ? lock_release+0xc8/0x290 [ 1282.574391] lo_ioctl+0x66d/0x1ca0 [ 1282.574430] ? __pfx_lo_ioctl+0x10/0x10 [ 1282.574458] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1282.574494] ? __pfx_perf_trace_lock+0x10/0x10 [ 1282.574533] ? lock_acquire+0x15e/0x2f0 [ 1282.574562] ? __virt_addr_valid+0x1c6/0x5d0 [ 1282.574588] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1282.574622] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1282.574651] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1282.574680] ? lock_release+0xc8/0x290 [ 1282.574715] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1282.574794] ? down_write_nested+0x130/0x1f0 [ 1282.574828] ? __fget_files+0x34/0x3b0 [ 1282.574855] ? find_held_lock+0x2b/0x80 [ 1282.574879] ? __fget_files+0x203/0x3b0 [ 1282.574909] ? __pfx_lo_ioctl+0x10/0x10 [ 1282.574950] blkdev_ioctl+0x365/0x6d0 [ 1282.574986] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1282.575022] ? selinux_file_ioctl+0xb9/0x280 [ 1282.575052] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1282.575090] __x64_sys_ioctl+0x18f/0x210 [ 1282.575117] do_syscall_64+0xbf/0x390 [ 1282.575153] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1282.575176] RIP: 0033:0x7fd2e63058d7 [ 1282.575193] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1282.575214] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1282.575236] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e63058d7 [ 1282.575251] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1282.575265] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1282.575278] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1282.575291] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1282.575328] [ 1282.622340] loop5: detected capacity change from 0 to 512 01:55:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x0) [ 1282.671380] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1282.673092] EXT4-fs (loop5): group descriptors corrupted! 01:55:44 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380003001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1282.738401] loop7: detected capacity change from 0 to 512 [ 1282.767483] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1282.771477] EXT4-fs (loop7): group descriptors corrupted! [ 1282.804992] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1282.806492] EXT4-fs (loop2): group descriptors corrupted! 01:55:56 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380005001200010e000000000000000028001a"], 0x38}}, 0x0) 01:55:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "9c9e207ddba71f05b2ef688025a96673ac6e0d6d9104d4f983f4c299022c657e7f962d3c59fd02b2d317980a5bd16c24e8dd0d1d05731e4d1290c0959e8ed00f", 0x2d}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc2}, &(0x7f0000000280)={0x0, "22d2b66d2717e1db4296bd90fb723a50e19844b6fd5733cbe1d9fc146bc64c1f5880c3f3bb503c6dc9fb439c5f46eef94151394f48c418b001d7f35a4fc718dd", 0x14}, 0x48, r2) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x0) 01:55:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 50) 01:55:56 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = fork() tkill(r1, 0x31) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r3, 0x2, r2, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x2, 0x8, 0xc0, 0x4d, 0x0, 0x3, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x400a2, 0x9, 0x7ff, 0x4, 0x0, 0x5, 0x9, 0x0, 0x1, 0x0, 0x2}, r1, 0xb, r2, 0x0) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r0, r4, 0x0) 01:55:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 43) 01:55:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 44) 01:55:56 executing program 6: socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) r1 = syz_open_dev$vcsu(&(0x7f0000000040), 0x7, 0x200000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x20, r3, 0x1, 0x0, 0x0, {0x8}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x20}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000100)=@migrate={0x270, 0x21, 0x100, 0x70bd2a, 0x25dfdbfd, {{@in6=@private2, @in=@multicast2, 0x4e22, 0x200, 0x4e23, 0x0, 0xa, 0x80, 0x20, 0x0, r5, 0xffffffffffffffff}, 0x6e6bb7, 0x1}, [@lifetime_val={0x24, 0x9, {0x7, 0x467, 0x401, 0xe1a}}, @tfcpad={0x8}, @algo_auth={0x137, 0x1, {{'sha512-arm\x00'}, 0x778, "05f055028d0ec0cdbd1f90e04aea873825ca2f89e7e739dd158f34bf4e5d2d4539bd8ad1bbfa8a298718299d8e4b6e3cb6ffee884f4f41eab01202f8dbb3c4ca964430d71dc1159e3c16a4ecde8f1ea617c4d616acc79f800c2d90b678f7118ea96fcbdd7dcaf81e627fa9c579a847f958021218475c3fd8fec491ed2b8608c6a9056eb0d4658ef77641498c07a65eb932e854cb9b268d12ff2dc65f204512f1c2e0d236ecf9db36e32ff4c7205628b2a9d342dc3871d6a16ab5a12d769f8273b8a61c40d50bcd1f5feac09bcdb9d52114489b8225d627557013bbb6d413403e5344a00b79a4f784c493a3b29c458d"}}, @sec_ctx={0x32, 0x8, {0x2e, 0x8, 0x0, 0x44, 0x26, "3bae76e65362ee99d3ae728a3c6666bf75d4b6a46a07c0f448b4259c92c7daa39b4884c6260c"}}, @policy_type={0xa}, @algo_comp={0x74, 0x3, {{'deflate\x00'}, 0x160, "dd148246b053984fbad094c5d87dda6a06fe60eb0086ce5522621e227ca2efd54d52397f437ed74dbdf27976"}}, @XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x99}]}, 0x270}, 0x1, 0x0, 0x0, 0x40005}, 0x20000040) [ 1294.332000] loop2: detected capacity change from 0 to 512 [ 1294.343846] loop7: detected capacity change from 0 to 512 [ 1294.349398] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1294.350227] EXT4-fs (loop2): group descriptors corrupted! [ 1294.354045] loop5: detected capacity change from 0 to 512 [ 1294.357487] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1294.358312] EXT4-fs (loop7): group descriptors corrupted! [ 1294.361605] FAULT_INJECTION: forcing a failure. [ 1294.361605] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1294.363367] CPU: 1 UID: 0 PID: 9817 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1294.363397] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1294.363411] Call Trace: [ 1294.363420] [ 1294.363429] dump_stack_lvl+0xfa/0x120 [ 1294.363466] should_fail_ex+0x4d7/0x5e0 [ 1294.363499] strncpy_from_user+0x3b/0x2f0 [ 1294.363539] getname_flags.part.0+0x8d/0x540 [ 1294.363566] __x64_sys_mkdir+0xdb/0x140 [ 1294.363598] do_syscall_64+0xbf/0x390 [ 1294.363634] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1294.363658] RIP: 0033:0x7f1b64b60c27 [ 1294.363675] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1294.363696] RSP: 002b:00007f1b620d6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1294.363717] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b60c27 [ 1294.363732] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1294.363746] RBP: 00007f1b620d7040 R08: 0000000000000000 R09: ffffffffffffffff [ 1294.363760] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1294.363773] R13: 0000000020000100 R14: 00007f1b620d7000 R15: 0000000020013c00 [ 1294.363810] 01:55:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r5) r7 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r7, r5, r6, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r7) r8 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r8, r3, r4, 0x0) keyctl$revoke(0x3, 0x0) add_key(&(0x7f0000000280)='cifs.idmap\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="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", 0x1000, 0x0) keyctl$link(0x8, r8, r0) 01:55:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 45) 01:55:56 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r4) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r4) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r6, r4, r5, 0x0) keyctl$revoke(0x3, r4) keyctl$KEYCTL_MOVE(0x1e, r3, r0, r2, 0x0) 01:55:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 51) [ 1294.541363] loop5: detected capacity change from 0 to 512 [ 1294.546996] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1294.547819] EXT4-fs (loop5): group descriptors corrupted! [ 1294.569310] loop7: detected capacity change from 0 to 512 [ 1294.587538] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1294.589297] EXT4-fs (loop7): group descriptors corrupted! 01:56:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 44) 01:56:07 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r2, 0x0) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000000100)={{r0}, {@void, @max}}) 01:56:07 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380006001200010e000000000000000028001a"], 0x38}}, 0x0) 01:56:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 52) 01:56:07 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 46) 01:56:07 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r1, 0x2, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, r0, 0x0) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r2, r4, 0x0) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = epoll_create(0xe9) r8 = add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc1}, &(0x7f0000000380)={0x0, "4be3b1fbf14a8bdf9e9de21ef634cb03751aac37d4ab074762008c948f7417729c5ae1c413f8108449932879f2f95ce154b5c6195c08bc050492aab793c8fdfa", 0x17}, 0x48, r5) keyctl$instantiate(0xc, r3, 0x0, 0x0, r8) epoll_ctl$EPOLL_CTL_ADD(r7, 0x2, r6, 0x0) r9 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r9, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r9, &(0x7f00000002c0)={0x30000002}) add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000280)="be1c6c6b4032afbf390c111ee1c79465255c7e4c73d102aec1d28a2f5b01d586b30895c966", 0x25, 0xfffffffffffffff9) 01:56:07 executing program 6: r0 = io_uring_setup(0x16d1, &(0x7f0000000a40)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x21, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) accept4$unix(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0x6e, 0x80800) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @multicast2, 0x1}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x28}) ioctl$sock_SIOCETHTOOL(r1, 0x8922, &(0x7f0000000080)={'veth1_to_team\x00', 0x0}) [ 1305.119767] loop7: detected capacity change from 0 to 512 [ 1305.124012] FAULT_INJECTION: forcing a failure. [ 1305.124012] name failslab, interval 1, probability 0, space 0, times 0 [ 1305.125266] CPU: 0 UID: 0 PID: 9851 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1305.125285] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1305.125293] Call Trace: [ 1305.125298] [ 1305.125303] dump_stack_lvl+0xfa/0x120 [ 1305.125328] should_fail_ex+0x4d7/0x5e0 [ 1305.125349] should_failslab+0xc2/0x120 [ 1305.125369] kmem_cache_alloc_node_noprof+0x87/0x6b0 [ 1305.125384] ? perf_trace_lock+0xb5/0x5d0 [ 1305.125403] ? __alloc_skb+0x2ab/0x370 [ 1305.125423] ? __alloc_skb+0x2ab/0x370 [ 1305.125434] __alloc_skb+0x2ab/0x370 [ 1305.125448] ? __pfx___alloc_skb+0x10/0x10 [ 1305.125459] ? lock_acquire+0x15e/0x2f0 [ 1305.125477] ? netlink_has_listeners+0x7f/0x430 [ 1305.125494] ? netlink_has_listeners+0x20d/0x430 [ 1305.125513] ? lock_release+0xc8/0x290 [ 1305.125534] alloc_uevent_skb+0x7b/0x210 [ 1305.125551] kobject_uevent_env+0xa8c/0xf90 [ 1305.125569] ? lock_is_held_type+0x9e/0x120 [ 1305.125591] loop_configure+0xe31/0x15a0 [ 1305.125631] ? __pfx_loop_configure+0x10/0x10 [ 1305.125664] ? avc_has_extended_perms+0x107/0xf20 [ 1305.125686] ? find_held_lock+0x2b/0x80 [ 1305.125700] ? avc_has_extended_perms+0x23b/0xf20 [ 1305.125720] ? lock_release+0xc8/0x290 [ 1305.125741] lo_ioctl+0x66d/0x1ca0 [ 1305.125763] ? __pfx_lo_ioctl+0x10/0x10 [ 1305.125780] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1305.125802] ? __pfx_perf_trace_lock+0x10/0x10 [ 1305.125825] ? lock_acquire+0x15e/0x2f0 [ 1305.125842] ? __virt_addr_valid+0x1c6/0x5d0 [ 1305.125858] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1305.125879] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1305.125896] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1305.125913] ? lock_release+0xc8/0x290 [ 1305.125933] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1305.125980] ? down_write_nested+0x130/0x1f0 [ 1305.126000] ? __fget_files+0x34/0x3b0 [ 1305.126017] ? find_held_lock+0x2b/0x80 [ 1305.126031] ? __fget_files+0x203/0x3b0 [ 1305.126048] ? __pfx_lo_ioctl+0x10/0x10 [ 1305.126065] blkdev_ioctl+0x365/0x6d0 [ 1305.126087] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1305.126113] ? selinux_file_ioctl+0xb9/0x280 [ 1305.126131] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1305.126154] __x64_sys_ioctl+0x18f/0x210 [ 1305.126170] do_syscall_64+0xbf/0x390 [ 1305.126191] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1305.126205] RIP: 0033:0x7f94bafef8d7 [ 1305.126216] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1305.126228] RSP: 002b:00007f94b8564f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1305.126241] RAX: ffffffffffffffda RBX: 00007f94bb039970 RCX: 00007f94bafef8d7 [ 1305.126250] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1305.126258] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1305.126266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1305.126273] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1305.126295] [ 1305.153470] loop5: detected capacity change from 0 to 512 [ 1305.160594] loop2: detected capacity change from 0 to 512 01:56:07 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x1000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000300)={r0, 0x5, 0x5, 0x100000001}) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x4, 0x7f, 0x2, 0xfd, 0x0, 0xd49e, 0x80000, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x10, 0x800, 0x10000, 0x1, 0xc7f, 0x6, 0x7, 0x0, 0x9, 0x0, 0x400}, r1, 0xb, r2, 0x3) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000440)='logon\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="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", 0xff, r3) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file,\x00']) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x9, 0x6, 0x40, 0xd9, 0x0, 0x80, 0x100, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000340), 0x1}, 0x8400, 0x4, 0x2, 0x6, 0x5, 0x7, 0x6, 0x0, 0x80000000, 0x0, 0x800}, r1, 0x10, r6, 0x2) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) [ 1305.190697] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1305.191746] EXT4-fs (loop5): group descriptors corrupted! [ 1305.193796] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1305.197745] EXT4-fs (loop2): group descriptors corrupted! [ 1305.217782] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1305.218719] EXT4-fs (loop7): group descriptors corrupted! 01:56:07 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 47) 01:56:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 53) 01:56:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 45) 01:56:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r4) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r4) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r6, r4, r5, 0x0) keyctl$revoke(0x3, r5) add_key(&(0x7f00000003c0)='cifs.idmap\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="cf926e7c8b706141e00b096f62b3fbcfac764e8f2376a263ee44a854168163a91174ddfa7357babf3d3942e8ab037755badbb67e346157aaf96442ad3135fab77920ed5ffe5bec4e858ab19616539ad2f235de10899836f0fba667d8a461a059647c2edf6931cc7dc1577e8f848bb7f611bd4ffdfedae08c8b6963458d5c8e4b5cc3f9558f", 0x85, r5) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r2, 0x0) add_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000280)="247a8a70ef12a12d47feba99690636ea2256426e841fd3fb6f235d33671e5515dab854f6baacb6f420eb5b38b5677f80b790ffbfd162fce121cd39a4722b8b54cc48a5cd21580507999ef2576b6d6cdaf03e005ffcfcf5527bd16350817fef84b06c469fcdd14417013017c82320a436414127271d28104820a90bad8a2bbc9ea70677a88e440cbead4121c72c06c91d64e8de48ac7b1a6b27eef89538cb69d9eeba34b7fe60f664b8420da0731dacdfa6d4208874211e3bb1833ccb14", 0xbd, r3) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000000340)='big_key\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r8, r0, r7, 0x0) 01:56:07 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380007001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1305.320395] loop2: detected capacity change from 0 to 512 [ 1305.337236] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1305.338094] EXT4-fs (loop2): group descriptors corrupted! 01:56:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r3, 0x0, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000100), &(0x7f0000000300)=ANY=[@ANYBLOB="7290f404aaa03c0da0761e205eeebbeab7a8ab3e065e5e183c309bd02da3b200d52fe971d21d1959c1cff17b61134d61e6e61099a951f9d80694ff916048ede797f10e6905129d5b2b534ca1fd5b381de10bede8ff0101"], 0x6, 0x1) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 1305.394079] loop5: detected capacity change from 0 to 512 [ 1305.395918] loop7: detected capacity change from 0 to 512 01:56:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 46) [ 1305.422805] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1305.424366] EXT4-fs (loop5): group descriptors corrupted! [ 1305.425287] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1305.426997] EXT4-fs (loop7): group descriptors corrupted! [ 1305.506804] loop2: detected capacity change from 0 to 512 [ 1305.509495] FAULT_INJECTION: forcing a failure. [ 1305.509495] name failslab, interval 1, probability 0, space 0, times 0 [ 1305.511576] CPU: 1 UID: 0 PID: 9890 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1305.511608] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1305.511621] Call Trace: [ 1305.511629] [ 1305.511638] dump_stack_lvl+0xfa/0x120 [ 1305.511676] should_fail_ex+0x4d7/0x5e0 [ 1305.511717] ? skb_clone+0x191/0x400 [ 1305.511748] should_failslab+0xc2/0x120 [ 1305.511781] kmem_cache_alloc_noprof+0x80/0x690 [ 1305.511803] ? netlink_broadcast_filtered+0xe6/0xe90 [ 1305.511841] ? skb_clone+0x191/0x400 [ 1305.511863] skb_clone+0x191/0x400 [ 1305.511891] netlink_broadcast_filtered+0xab1/0xe90 [ 1305.511935] ? __pfx_netlink_broadcast_filtered+0x10/0x10 [ 1305.511965] ? skb_put+0x138/0x1b0 [ 1305.512002] netlink_broadcast+0x39/0x50 [ 1305.512030] kobject_uevent_env+0xa58/0xf90 [ 1305.512060] ? lock_is_held_type+0x9e/0x120 [ 1305.512096] loop_configure+0xe31/0x15a0 [ 1305.512171] ? __pfx_loop_configure+0x10/0x10 [ 1305.512225] ? avc_has_extended_perms+0x107/0xf20 [ 1305.512260] ? find_held_lock+0x2b/0x80 [ 1305.512285] ? avc_has_extended_perms+0x23b/0xf20 [ 1305.512319] ? lock_release+0xc8/0x290 [ 1305.512354] lo_ioctl+0x66d/0x1ca0 [ 1305.512392] ? __pfx_lo_ioctl+0x10/0x10 [ 1305.512420] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1305.512457] ? __pfx_perf_trace_lock+0x10/0x10 [ 1305.512495] ? lock_acquire+0x15e/0x2f0 [ 1305.512524] ? __virt_addr_valid+0x1c6/0x5d0 [ 1305.512549] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1305.512583] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1305.512612] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1305.512642] ? lock_release+0xc8/0x290 [ 1305.512675] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1305.512755] ? down_write_nested+0x130/0x1f0 [ 1305.512789] ? __fget_files+0x34/0x3b0 [ 1305.512816] ? find_held_lock+0x2b/0x80 [ 1305.512839] ? __fget_files+0x203/0x3b0 [ 1305.512869] ? __pfx_lo_ioctl+0x10/0x10 [ 1305.512898] blkdev_ioctl+0x365/0x6d0 [ 1305.512934] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1305.512970] ? selinux_file_ioctl+0xb9/0x280 [ 1305.513001] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1305.513038] __x64_sys_ioctl+0x18f/0x210 [ 1305.513066] do_syscall_64+0xbf/0x390 [ 1305.513102] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1305.513125] RIP: 0033:0x7fd2e63058d7 [ 1305.513143] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1305.513164] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1305.513186] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e63058d7 [ 1305.513201] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1305.513214] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1305.513227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1305.513240] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1305.513277] [ 1305.566742] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1305.566773] EXT4-fs (loop2): group descriptors corrupted! 01:56:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 47) 01:56:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x4, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) 01:56:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 54) 01:56:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 48) 01:56:16 executing program 6: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'wg1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x10, 0xff, 0x80000001, 0x7, 0x882c, 0x82, 0x3, 0x120, 0xfff}}) 01:56:16 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380009001200010e000000000000000028001a"], 0x38}}, 0x0) 01:56:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f0000000000)={0x0, @xdp={0x2c, 0x0, 0x0, 0x34}, @in={0x2, 0x4e24, @empty}, @llc={0x1a, 0xffff, 0x1, 0xff, 0x0, 0xff}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x10000000007f, 0x2}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x3}}, 0x0, r4}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000180)={'syztnl1\x00', r4, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback, 0x0, 0x20}}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000740)=0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000980)={&(0x7f0000000c80)=ANY=[@ANYBLOB="dc0100001800000125bd7000fedbdf25000000000000000000000000000000000a0101020000000000000000000000004e2404014e2300000000000000000012005232c5631a1d434f42f8ca6687aacaf5d7eb630080743b56b9bf4c6651c3acf892efcc9e6878d11a5d78000000226f3d17103ea23501b5dad13754c00ea648501359a29af75a551c5e3b60b89ad6ac95000000000000000000000000000000006dff4b89cf9b535ed03b96c561f21cd6086e7b5afc211e1e6c227c79e50ef42b9eab243308444b698acab9572ddcb382e41280", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0a010100000000000000000000000000000004d33300000064010100000000000000000000000000c5ffffffffffffff05000000000000000104000000000000210000000000000000000000000000004000000000000000030000000000000000fcffffffffffff0104000000000000d10200000000000009000000000000000800000000000000000800bb0200000002000027bd70000740bf49916e7bb313eb5f1b3500000a0006060200000000000000b500000000000000e4000600fe800000000000000000000000000037000000000000000000000000000000004e20009b4e23", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="ac1414aa000000000000000000000000000004d46c00000000000000000000000000000000000000dd0e0000000000004d0000000000000000010000000000000200000000000000060000000000000005000000000000010000000000000000000005000000000000005f9300000000000008000000000000002000000007000000500f000028bd700007350000060002d64700"/168], 0x1dc}, 0x1, 0x0, 0x0, 0x4000011}, 0x40084) sendmsg$netlink(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)=ANY=[@ANYBLOB="c4030000300000022abd7000fedbdf251303248001188bf3e60878808c20573632ac5787b8243b7a9059aa632a3ef810d7b26c8f52702d251a114847b99baca04e0c1462f770bcb4113da61ea692e5361bed0886aaafe37e47cec4c2580a0cfd30f1598b17879d216f64d51b0aab9e9b4cfcc897843eca6fb5d373a208005100", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32, @ANYBLOB="1d4490a251bcad84707d3372da9e1dec7c9fbca8949c53bac7a05d7b7c7a34ea5ac568689d09a91295bfef7ed4316e1a3f81525cdb5997d2f8511d2a56a238f7046f59485c8ab1b08ac385c92a6e98423d37cdbb6072c439884ebdb911d74293238e18043797db39c54d0000"], 0x3c4}], 0x1, 0x0, 0x0, 0x20000010}, 0x4000000) r6 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r6) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r8, r6, r7, 0x0) [ 1314.445639] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=48 sclass=netlink_xfrm_socket pid=9903 comm=syz-executor.0 [ 1314.468544] loop2: detected capacity change from 0 to 512 [ 1314.473986] FAULT_INJECTION: forcing a failure. [ 1314.473986] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.476016] CPU: 1 UID: 0 PID: 9907 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1314.476054] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.476070] Call Trace: [ 1314.476078] [ 1314.476089] dump_stack_lvl+0xfa/0x120 [ 1314.476143] should_fail_ex+0x4d7/0x5e0 [ 1314.476183] should_failslab+0xc2/0x120 [ 1314.476228] __kmalloc_noprof+0xcd/0x680 [ 1314.476270] ? __create_object+0x59/0x80 [ 1314.476299] ? kobject_get_path+0xc9/0x200 [ 1314.476338] ? trace_kmalloc+0x1f/0xb0 [ 1314.476382] kobject_get_path+0xc9/0x200 [ 1314.476425] ? kasan_save_track+0x14/0x30 [ 1314.476470] kobject_uevent_env+0x252/0xf90 [ 1314.476507] ? lock_is_held_type+0x9e/0x120 [ 1314.476551] loop_configure+0xe31/0x15a0 [ 1314.476630] ? __pfx_loop_configure+0x10/0x10 [ 1314.476696] ? avc_has_extended_perms+0x107/0xf20 [ 1314.476739] ? find_held_lock+0x2b/0x80 [ 1314.476768] ? avc_has_extended_perms+0x23b/0xf20 [ 1314.476809] ? lock_release+0xc8/0x290 [ 1314.476852] lo_ioctl+0x66d/0x1ca0 [ 1314.476898] ? __pfx_lo_ioctl+0x10/0x10 [ 1314.476932] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1314.476975] ? __pfx_perf_trace_lock+0x10/0x10 [ 1314.477021] ? lock_acquire+0x15e/0x2f0 [ 1314.477057] ? __virt_addr_valid+0x1c6/0x5d0 [ 1314.477087] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1314.477127] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1314.477163] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1314.477198] ? lock_release+0xc8/0x290 [ 1314.477239] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1314.477334] ? down_write_nested+0x130/0x1f0 [ 1314.477374] ? __fget_files+0x34/0x3b0 [ 1314.477407] ? find_held_lock+0x2b/0x80 [ 1314.477435] ? __fget_files+0x203/0x3b0 [ 1314.477471] ? __pfx_lo_ioctl+0x10/0x10 [ 1314.477506] blkdev_ioctl+0x365/0x6d0 [ 1314.477549] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1314.477592] ? selinux_file_ioctl+0xb9/0x280 [ 1314.477628] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1314.477673] __x64_sys_ioctl+0x18f/0x210 [ 1314.477706] do_syscall_64+0xbf/0x390 [ 1314.477749] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1314.477776] RIP: 0033:0x7fd2e63058d7 [ 1314.477796] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.477823] RSP: 002b:00007fd2e387af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1314.477849] RAX: ffffffffffffffda RBX: 00007fd2e634f970 RCX: 00007fd2e63058d7 [ 1314.477868] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1314.477884] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1314.477900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1314.477915] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1314.477960] [ 1314.481338] loop5: detected capacity change from 0 to 512 01:56:16 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f0000000000)={0x1, 'syz_tun\x00', {}, 0x101}) r2 = fork() tkill(r2, 0x31) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005580)=[{{&(0x7f0000000300)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000380)=""/178, 0xb2}, {&(0x7f0000000440)=""/67, 0x43}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000580)=""/9, 0x9}], 0x4, &(0x7f0000003f40)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000000640)=@abs, 0x6e, &(0x7f0000000780)=[{&(0x7f00000006c0)=""/94, 0x5e}, {&(0x7f0000000740)=""/16, 0x10}], 0x2}}, {{&(0x7f00000007c0)=@abs, 0x6e, &(0x7f00000019c0)=[{&(0x7f0000000840)=""/4092, 0xffc}, {&(0x7f0000001840)=""/32, 0x20}, {&(0x7f0000001880)=""/49, 0x31}, {&(0x7f00000018c0)=""/201, 0xc9}], 0x4}}, {{&(0x7f0000001a00), 0x6e, &(0x7f0000001b80)=[{&(0x7f0000001a80)=""/142, 0x8e}, {&(0x7f0000001b40)=""/21, 0x15}], 0x2, &(0x7f0000001bc0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}, {{&(0x7f0000001c00)=@abs, 0x6e, &(0x7f0000003ec0)=[{&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000003c80)=""/182, 0xb6}, {&(0x7f0000003d40)=""/85, 0x55}, {&(0x7f0000003dc0)=""/10, 0xa}, {&(0x7f00000054c0)=""/123, 0x7b}, {&(0x7f0000003e80)=""/24, 0x18}], 0x7, &(0x7f0000005e40)=ANY=[@ANYBLOB="1c00000000000000011000000e02af6810e4041ce502000000b2038422299d2a2e46e1a76144c6f84756517b3711ce9d7ab874e7f72b5ec3f8ca0d2a75685f2da913239670454dde33bd32620d203fb5ebacce7da4750a6234dbb7a3fec747c39ed0e459cdaf11029fa37b735344a9f9331bbdff9f29e7006b8aa0994dfba946f56d11939bd35b7b7821d7c021e3895ca9fc0c634f0bd1ef9e4e761a7fe2b72998c8", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="7f24dabf2000000000000c00a700000000000000e42f51c1fcbfac6ed0009ffcded43899d65fb14822957f67e015ed5c4b231a7773639bffae0351ad3bd52390f58224614dfbc48b584e088d9679ff29cca1b458cb63e3a0e6331c1d3a5bc9f4d051f09480d9906e1a3daa10d0e80d361dff1bb56b101e8c58818517ed75e9cb492ad9bb8d9ad45834a77f8ae54b27401a554c33335d2417cdeb4fe96a5b04493fef209a5d008400"/178, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x40}}, {{&(0x7f0000003f80), 0x6e, &(0x7f0000005440)=[{&(0x7f0000004000)=""/248, 0xf8}, {&(0x7f0000004100)=""/193, 0xc1}, {&(0x7f0000004200)=""/252, 0xfc}, {&(0x7f0000004300)=""/4096, 0x1000}, {&(0x7f0000005300)=""/21, 0x15}, {&(0x7f0000005340)=""/252, 0xfc}], 0x6, &(0x7f0000005cc0)=ANY=[@ANYBLOB="24000000000000000100001101000000", @ANYRESDEC=r2, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="5d3cb32100005294c5e4a69224ff8bf6341d8903e9d1d97d603d78fcd753ae364369dfc9a1bd1535c24eccb0459c16be5ae2eb41689d38a3b29c0c4ae4a0b8c5b5a657b552bbe5f464c9dbe11c9156fd429092cc18b889cbc90119cdcb95d5cd86aa30faa5fffe95833ee5cbdfd648b3a09f3c9597b703e3c76720f5556626b54118fb8432cbc9d2b4b3f90bab04562cf41d66ec23b1591f206e21e8abcca506f90629a14d6da929ccb2af62b3201b9c484d89e02e950100000000000000336b1bd4acbaf4c2d42cc9a86b452b00000000000000"], 0x88}}], 0x6, 0x40000003, &(0x7f0000005700)={0x77359400}) r5 = fork() tkill(r5, 0x31) r6 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r6) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r7) sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000005a00)={&(0x7f0000005800)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000059c0)={&(0x7f0000005840)=ANY=[@ANYBLOB="96b6e64300008234706d06ba89dea1b873758e83adeb32c2c3a822010047d16ad4f3e2de026475de51827a56a402c7c16266a0e1f22d83c83f25ff0bc07faa721c761200"/80, @ANYRES16=0x0, @ANYBLOB="000426bd7000fddbdf25250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0001000000"], 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x20000085) r8 = getpgid(0x0) r9 = getpgrp(0x0) r10 = fork() tkill(r10, 0x31) clone3(&(0x7f0000005780)={0x10000000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0x27}, &(0x7f0000000180)=""/211, 0xd3, &(0x7f0000000280)=""/79, &(0x7f0000005740)=[r2, r4, r5, r8, 0xffffffffffffffff, r9, 0xffffffffffffffff, r10], 0x8}, 0x58) [ 1314.510595] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=48 sclass=netlink_xfrm_socket pid=9903 comm=syz-executor.0 [ 1314.521916] FAULT_INJECTION: forcing a failure. [ 1314.521916] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.523010] CPU: 0 UID: 0 PID: 9909 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1314.523027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.523035] Call Trace: [ 1314.523040] [ 1314.523045] dump_stack_lvl+0xfa/0x120 [ 1314.523069] should_fail_ex+0x4d7/0x5e0 [ 1314.523088] ? ext4_alloc_inode+0x28/0x600 [ 1314.523104] should_failslab+0xc2/0x120 [ 1314.523123] kmem_cache_alloc_lru_noprof+0x84/0x690 [ 1314.523140] ? perf_trace_lock+0xb5/0x5d0 [ 1314.523159] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 1314.523172] ? ext4_alloc_inode+0x28/0x600 [ 1314.523183] ext4_alloc_inode+0x28/0x600 [ 1314.523195] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 1314.523206] alloc_inode+0x67/0x250 [ 1314.523226] new_inode+0x1e/0x160 [ 1314.523246] __ext4_new_inode+0x35d/0x4d70 [ 1314.523272] ? avc_has_perm_noaudit+0x150/0x3d0 [ 1314.523295] ? __pfx___ext4_new_inode+0x10/0x10 [ 1314.523316] ? __pfx_avc_has_perm+0x10/0x10 [ 1314.523333] ? __pfx___dquot_initialize+0x10/0x10 [ 1314.523357] ext4_mkdir+0x331/0xb30 [ 1314.523378] ? __pfx_ext4_mkdir+0x10/0x10 [ 1314.523391] ? security_inode_permission+0x72/0xe0 [ 1314.523414] vfs_mkdir+0x59a/0x8d0 [ 1314.523431] do_mkdirat+0x19f/0x3d0 [ 1314.523449] ? __pfx_do_mkdirat+0x10/0x10 [ 1314.523473] __x64_sys_mkdir+0xf3/0x140 [ 1314.523490] do_syscall_64+0xbf/0x390 [ 1314.523511] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1314.523524] RIP: 0033:0x7f1b64b60c27 [ 1314.523534] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.523546] RSP: 002b:00007f1b620d6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1314.523558] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b60c27 [ 1314.523566] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1314.523574] RBP: 00007f1b620d7040 R08: 0000000000000000 R09: ffffffffffffffff [ 1314.523581] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1314.523588] R13: 0000000020000100 R14: 00007f1b620d7000 R15: 0000000020013c00 [ 1314.523608] [ 1314.526797] loop7: detected capacity change from 0 to 512 [ 1314.571073] FAULT_INJECTION: forcing a failure. [ 1314.571073] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.573793] CPU: 0 UID: 0 PID: 9915 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1314.573810] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.573817] Call Trace: [ 1314.573821] [ 1314.573826] dump_stack_lvl+0xfa/0x120 [ 1314.573848] should_fail_ex+0x4d7/0x5e0 [ 1314.573865] ? getname_flags.part.0+0x48/0x540 [ 1314.573877] should_failslab+0xc2/0x120 [ 1314.573895] kmem_cache_alloc_noprof+0x80/0x690 [ 1314.573909] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1314.573932] ? getname_flags.part.0+0x48/0x540 [ 1314.573943] getname_flags.part.0+0x48/0x540 [ 1314.573957] __x64_sys_mkdir+0xdb/0x140 [ 1314.573975] do_syscall_64+0xbf/0x390 [ 1314.573996] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1314.574008] RIP: 0033:0x7f94bafeec27 [ 1314.574017] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.574029] RSP: 002b:00007f94b8564fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1314.574041] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafeec27 [ 1314.574049] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1314.574056] RBP: 00007f94b8565040 R08: 0000000000000000 R09: ffffffffffffffff [ 1314.574064] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1314.574071] R13: 0000000020000100 R14: 00007f94b8565000 R15: 0000000020013c00 [ 1314.574091] [ 1314.574181] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1314.595123] EXT4-fs (loop2): group descriptors corrupted! 01:56:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000280)="6cc716642f3a5670810c91835e53d18d3f902f45d732839d47dcfd6f17f869cc5b713ce7cb2edbfafb33532443b26a14f186ddfa4efe175aa9a81249cf53233ec6d1f1589ef949ed6fada7023c7cbbb59dbf8f9daff91d5758228c1c5dc61ef70452ce76333e93ed41e70edfc0e1c69db864a9c4128bc897339f654da48662db710e5b18d55cb9cc1fc226b81a60ae4411d3592ddfc6a0", 0x97, r1) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r4) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r4) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r6, r4, r5, 0x0) keyctl$reject(0x13, r3, 0x7fff, 0xffffffffffffffff, r6) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:56:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 1314.609638] Process accounting resumed 01:56:16 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000a001200010e000000000000000028001a"], 0x38}}, 0x0) 01:56:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 55) 01:56:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 49) 01:56:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 48) [ 1314.747894] loop5: detected capacity change from 0 to 512 [ 1314.757652] FAULT_INJECTION: forcing a failure. [ 1314.757652] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.760016] CPU: 1 UID: 0 PID: 9935 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1314.760049] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.760062] Call Trace: [ 1314.760070] [ 1314.760079] dump_stack_lvl+0xfa/0x120 [ 1314.760126] should_fail_ex+0x4d7/0x5e0 [ 1314.760158] ? __d_alloc+0x31/0xa10 [ 1314.760186] should_failslab+0xc2/0x120 [ 1314.760219] kmem_cache_alloc_lru_noprof+0x84/0x690 [ 1314.760242] ? __d_lookup+0x255/0x490 [ 1314.760276] ? __d_alloc+0x31/0xa10 [ 1314.760304] __d_alloc+0x31/0xa10 [ 1314.760341] d_alloc+0x4a/0x1e0 [ 1314.760375] lookup_one_qstr_excl+0x174/0x270 [ 1314.760396] ? mnt_want_write+0x153/0x420 [ 1314.760423] filename_create+0x1ca/0x480 [ 1314.760450] ? __pfx_filename_create+0x10/0x10 [ 1314.760474] ? __virt_addr_valid+0x2e8/0x5d0 [ 1314.760516] do_mkdirat+0x9a/0x3d0 [ 1314.760549] ? __pfx_do_mkdirat+0x10/0x10 [ 1314.760593] __x64_sys_mkdir+0xf3/0x140 [ 1314.760625] do_syscall_64+0xbf/0x390 [ 1314.760662] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1314.760685] RIP: 0033:0x7f1b64b60c27 [ 1314.760702] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.760723] RSP: 002b:00007f1b620d6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1314.760745] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b60c27 [ 1314.760759] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1314.760773] RBP: 00007f1b620d7040 R08: 0000000000000000 R09: ffffffffffffffff [ 1314.760786] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1314.760800] R13: 0000000020000100 R14: 00007f1b620d7000 R15: 0000000020013c00 [ 1314.760842] [ 1314.850462] loop7: detected capacity change from 0 to 512 01:56:16 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000b001200010e000000000000000028001a"], 0x38}}, 0x0) 01:56:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 56) 01:56:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) [ 1314.895501] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1314.897238] EXT4-fs (loop7): group descriptors corrupted! [ 1314.900013] loop5: detected capacity change from 0 to 512 [ 1314.921665] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1314.923497] EXT4-fs (loop5): group descriptors corrupted! [ 1314.930583] loop2: detected capacity change from 0 to 512 [ 1314.932596] FAULT_INJECTION: forcing a failure. [ 1314.932596] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.933674] CPU: 0 UID: 0 PID: 9948 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) 01:56:17 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fsmount(0xffffffffffffffff, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='-\x13,\x00') r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r2, 0x0) [ 1314.933692] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.933699] Call Trace: [ 1314.933704] [ 1314.933709] dump_stack_lvl+0xfa/0x120 [ 1314.933732] should_fail_ex+0x4d7/0x5e0 [ 1314.933750] ? getname_flags.part.0+0x48/0x540 [ 1314.933763] should_failslab+0xc2/0x120 [ 1314.933782] kmem_cache_alloc_noprof+0x80/0x690 [ 1314.933796] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1314.933818] ? getname_flags.part.0+0x48/0x540 [ 1314.933829] getname_flags.part.0+0x48/0x540 [ 1314.933843] __x64_sys_mkdir+0xdb/0x140 [ 1314.933861] do_syscall_64+0xbf/0x390 [ 1314.933882] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1314.933896] RIP: 0033:0x7fd2e6304c27 [ 1314.933905] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.933917] RSP: 002b:00007fd2e387afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1314.933929] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6304c27 [ 1314.933937] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1314.933945] RBP: 00007fd2e387b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1314.933952] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1314.933959] R13: 0000000020000100 R14: 00007fd2e387b000 R15: 0000000020013c00 [ 1314.933978] 01:56:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 49) 01:56:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 57) [ 1315.175944] loop2: detected capacity change from 0 to 512 [ 1315.179704] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1315.180755] EXT4-fs (loop2): group descriptors corrupted! [ 1315.208771] loop5: detected capacity change from 0 to 512 [ 1315.213803] FAULT_INJECTION: forcing a failure. [ 1315.213803] name failslab, interval 1, probability 0, space 0, times 0 [ 1315.214743] CPU: 0 UID: 0 PID: 9960 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1315.214761] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1315.214768] Call Trace: [ 1315.214773] [ 1315.214779] dump_stack_lvl+0xfa/0x120 [ 1315.214802] should_fail_ex+0x4d7/0x5e0 [ 1315.214820] ? jbd2__journal_start+0x193/0x6b0 [ 1315.214836] should_failslab+0xc2/0x120 [ 1315.214854] kmem_cache_alloc_noprof+0x80/0x690 [ 1315.214869] ? lock_is_held_type+0x9e/0x120 [ 1315.214890] ? jbd2__journal_start+0x193/0x6b0 [ 1315.214903] jbd2__journal_start+0x193/0x6b0 [ 1315.214921] __ext4_journal_start_sb+0x325/0x5d0 [ 1315.214945] __ext4_new_inode+0x2cbe/0x4d70 [ 1315.214976] ? __pfx___ext4_new_inode+0x10/0x10 [ 1315.214996] ? __pfx_avc_has_perm+0x10/0x10 [ 1315.215016] ? __pfx___dquot_initialize+0x10/0x10 [ 1315.215039] ext4_mkdir+0x331/0xb30 [ 1315.215060] ? __pfx_ext4_mkdir+0x10/0x10 [ 1315.215073] ? security_inode_permission+0x72/0xe0 [ 1315.215099] vfs_mkdir+0x59a/0x8d0 [ 1315.215117] do_mkdirat+0x19f/0x3d0 [ 1315.215136] ? __pfx_do_mkdirat+0x10/0x10 [ 1315.215160] __x64_sys_mkdir+0xf3/0x140 [ 1315.215177] do_syscall_64+0xbf/0x390 [ 1315.215197] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1315.215210] RIP: 0033:0x7f1b64b60c27 [ 1315.215220] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1315.215232] RSP: 002b:00007f1b620d6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1315.215244] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b60c27 [ 1315.215253] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1315.215260] RBP: 00007f1b620d7040 R08: 0000000000000000 R09: ffffffffffffffff [ 1315.215268] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1315.215275] R13: 0000000020000100 R14: 00007f1b620d7000 R15: 0000000020013c00 [ 1315.215296] [ 1315.231230] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory 01:56:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r2, 0x0) add_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000280), 0x0, r1) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r0, r4, 0x0) 01:56:33 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 50) 01:56:33 executing program 6: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8922, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) 01:56:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 58) 01:56:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$search(0xa, r3, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x0}, r4) keyctl$KEYCTL_MOVE(0x1e, r3, r0, r2, 0x0) 01:56:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 50) 01:56:33 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38c00e001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1331.020069] loop2: detected capacity change from 0 to 512 01:56:33 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000f001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1331.043302] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1331.044239] EXT4-fs (loop2): group descriptors corrupted! [ 1331.049895] loop5: detected capacity change from 0 to 512 [ 1331.055546] loop7: detected capacity change from 0 to 512 01:56:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc2}, &(0x7f0000000300)={0x0, "0dd701759262c99dec8039e96678e5122da4142d7776c633a02f91d257707761db4df5bd52ea8bce349497272f07e93cea67a5cb2865dcb947df12c30f69370b", 0x1f}, 0x48, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0x1e, r4, r1, r5, 0x0) keyctl$KEYCTL_MOVE(0x1e, r3, r0, r2, 0x0) [ 1331.072285] FAULT_INJECTION: forcing a failure. [ 1331.072285] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1331.073346] CPU: 0 UID: 0 PID: 9987 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1331.073363] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1331.073371] Call Trace: [ 1331.073375] [ 1331.073380] dump_stack_lvl+0xfa/0x120 [ 1331.073404] should_fail_ex+0x4d7/0x5e0 [ 1331.073422] strncpy_from_user+0x3b/0x2f0 [ 1331.073444] getname_flags.part.0+0x8d/0x540 [ 1331.073464] __x64_sys_mkdir+0xdb/0x140 [ 1331.073482] do_syscall_64+0xbf/0x390 [ 1331.073503] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1331.073517] RIP: 0033:0x7f94bafeec27 [ 1331.073526] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1331.073538] RSP: 002b:00007f94b8564fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1331.073550] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafeec27 [ 1331.073559] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1331.073566] RBP: 00007f94b8565040 R08: 0000000000000000 R09: ffffffffffffffff [ 1331.073575] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1331.073583] R13: 0000000020000100 R14: 00007f94b8565000 R15: 0000000020013c00 [ 1331.073606] 01:56:33 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'batadv_slave_0\x00', {0x2, 0x0, @multicast2}}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000100)={'ip6gretap0\x00', &(0x7f00000000c0)=@ethtool_pauseparam={0x13, 0x9, 0x73e8, 0x2}}) 01:56:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x741480, 0x0) clock_gettime(0x0, &(0x7f0000002180)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000280)=@abs, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000300)=""/97, 0x61}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f0000000380)=""/197, 0xc5}, {&(0x7f0000000480)=""/226, 0xe2}], 0x4, &(0x7f00000005c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000680)=""/219, 0xdb}, {&(0x7f0000000780)=""/190, 0xbe}], 0x2}}, {{&(0x7f0000000880), 0x6e, &(0x7f0000001900)=[{&(0x7f0000000900)=""/4096, 0x1000}], 0x1, &(0x7f0000001940)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}, {{&(0x7f0000001980), 0x6e, &(0x7f0000001b40)=[{&(0x7f0000001a00)=""/79, 0x4f}, {&(0x7f0000001a80)=""/67, 0x43}, {&(0x7f0000001b00)=""/33, 0x21}], 0x3, &(0x7f0000001b80)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f0000001c40), 0x6e, &(0x7f0000001ec0)=[{&(0x7f0000001cc0)=""/203, 0xcb}, {&(0x7f0000001dc0)=""/42, 0x2a}, {&(0x7f0000001e00)=""/137, 0x89}], 0x3, &(0x7f0000001f00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x108}}], 0x5, 0x2000, &(0x7f00000021c0)={r4, r5+10000000}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r6) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:56:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 51) [ 1331.159298] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1331.160249] EXT4-fs (loop5): group descriptors corrupted! 01:56:33 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 51) [ 1331.243056] loop2: detected capacity change from 0 to 512 [ 1331.276797] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1331.278679] EXT4-fs (loop2): group descriptors corrupted! [ 1331.297945] loop7: detected capacity change from 0 to 512 [ 1331.312637] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1331.313592] EXT4-fs (loop7): group descriptors corrupted! 01:56:44 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, @ethernet={0x0, @random="ba005189dd71"}, @tipc=@nameseq={0x1e, 0x1, 0x3, {0x2, 0x4, 0x1}}, 0xbdae, 0x0, 0x0, 0x0, 0x6f}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'ipvlan0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="330000003f0000002e2f66696c65300000000000000000000000000000e3ffffff000000000000000000000000000000000000000000000000000000000000fa000000000000000000000000000000000000000000ef3f057c97f19f046d231296000000000000000000000000000000000000000000000000000000000000000000000000000000bb7365bde8bcc397720b6a8c690a38994226e4981cb7f68475cc47d372573243ad2fa1ab9e78ab0bf0049bf463e554e924a207293925a4"]}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)={0x2, 'macvlan0\x00', {0x7}, 0x2}) 01:56:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 52) 01:56:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 59) 01:56:44 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r2, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x800) open_tree(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x88101) 01:56:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 52) 01:56:44 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380011001200010e000000000000000028001a"], 0x38}}, 0x0) 01:56:44 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r2, 0x0, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000280)='./file0\x00', 0x6, 0x3, &(0x7f0000000480)=[{&(0x7f00000002c0)="6ad979e32ea3f1c2947798de7d9e61d76d5d620f7b4a3b243276de3210258ba32c83bce272ec12da82e0791b0b9e7f182251e80a65c057987f1131d7e0277798747d7435dd8ec1adfe595948aa174a6b062dd9b8d0d7f8e1650119ab2136c6d7c52328057cd5bd2b68d71df09046cdf5834c97d438d237b116cff1d067eb8d11503d1378ec83b6804fabce1ae6b5a03c3fdd57eae1cd9d615b475d25dbb2ffc3701cd61b32b8e08f22c1ae70e88fa17932e52cd14a5f6cf594d76685ceea9bf724b3f35eac000000000000000000", 0xce, 0x7}, {&(0x7f00000003c0)="52278ab99ba2", 0x6}, {&(0x7f0000000600)="f58074108243b02a8723f8d82e592752df5a2b7dcfedb8de2bac78bd78353fdb0f8554868b0940340a46ff8ea69ce4dae23218654d70028fcc98ea69958810afdc47b3398d0200f9f18adb876d4ea172a8b55f86a3889deb81af895f0aaf8b6773b92387bee89ef5b79ed85b653727954668b9b2349505e82978399e7b47533fe967209f876d76d8c3edc4af25b94ecef7ae1225daa9344ec546a5212c4517b50ee0d26613273d238f592b491ac5972721bedc0d13613b6b826630146e9cb600b36d7524c2d5", 0xc6, 0x2}], 0x10000, &(0x7f0000000840)=ANY=[@ANYBLOB="6d706fbfea6c6f63616c3d7374617469632c6769643d13935c0d4cbd556a5b3a18ce90b603e0f8e17eed593aa70dcdefbb8efa7358abceaa28990967f7b9852c97b9bc31b328f32bfa93a7d10eda1a601105d1e67dc4ee5a130088a50225e2909edc1671aeb0920736b7aee774", @ANYRESHEX=0xee01, @ANYBLOB=',huge=within_size,huge=always,nr_blocks=6g1e,uid=', @ANYRESHEX=0xee00, @ANYBLOB=',mpol=bind=static,pcr=00000000000000000049,dont_measure,subj_?\x00\x00\x00=keyring\x00r=@(,pgr=00000000000000000039,\x00'/117]) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580), 0x10e408, &(0x7f0000000700)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsdef={'smackfsdef', 0x3d, '/%-}\xed#&/]'}}, {@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '/&*@-@%,\xda}'}}, {@measure}, {@euid_lt={'euid<', 0xee00}}, {@obj_type={'obj_type', 0x3d, '&'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}}) syncfs(r4) inotify_add_watch(r4, &(0x7f0000000400)='./file0\x00', 0x20000202) lseek(r3, 0x1ff, 0x3) fcntl$dupfd(r0, 0x0, r2) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r1) add_key(&(0x7f0000000440)='cifs.spnego\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r7, 0x0, 0x0) fcntl$dupfd(r7, 0x406, r3) keyctl$KEYCTL_MOVE(0x1e, r6, r1, r5, 0x0) [ 1342.492940] loop2: detected capacity change from 0 to 512 [ 1342.496762] FAULT_INJECTION: forcing a failure. [ 1342.496762] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.498544] CPU: 1 UID: 0 PID: 10029 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1342.498575] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1342.498588] Call Trace: [ 1342.498595] [ 1342.498604] dump_stack_lvl+0xfa/0x120 [ 1342.498642] should_fail_ex+0x4d7/0x5e0 [ 1342.498673] ? getname_flags.part.0+0x48/0x540 [ 1342.498695] should_failslab+0xc2/0x120 [ 1342.498728] kmem_cache_alloc_noprof+0x80/0x690 [ 1342.498753] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1342.498796] ? getname_flags.part.0+0x48/0x540 [ 1342.498817] getname_flags.part.0+0x48/0x540 [ 1342.498843] __x64_sys_mkdir+0xdb/0x140 [ 1342.498875] do_syscall_64+0xbf/0x390 [ 1342.498912] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1342.498936] RIP: 0033:0x7fd2e6304c27 [ 1342.498953] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1342.498974] RSP: 002b:00007fd2e387afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1342.498995] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6304c27 [ 1342.499011] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1342.499024] RBP: 00007fd2e387b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1342.499039] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1342.499052] R13: 0000000020000100 R14: 00007fd2e387b000 R15: 0000000020013c00 [ 1342.499089] [ 1342.539668] loop5: detected capacity change from 0 to 512 [ 1342.549465] FAULT_INJECTION: forcing a failure. [ 1342.549465] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.551592] CPU: 0 UID: 0 PID: 10035 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1342.551623] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1342.551636] Call Trace: [ 1342.551644] [ 1342.551652] dump_stack_lvl+0xfa/0x120 [ 1342.551689] should_fail_ex+0x4d7/0x5e0 [ 1342.551722] should_failslab+0xc2/0x120 [ 1342.551755] __kmalloc_noprof+0xcd/0x680 [ 1342.551788] ? current_umask+0x12/0x80 [ 1342.551820] ? posix_acl_create.part.0+0x2a0/0x480 [ 1342.551850] ? security_inode_init_security+0x113/0x370 [ 1342.551884] security_inode_init_security+0x113/0x370 [ 1342.551910] ? __pfx_ext4_initxattrs+0x10/0x10 [ 1342.551937] ? __pfx_security_inode_init_security+0x10/0x10 [ 1342.551967] ? crc32c+0x1ae/0x350 [ 1342.551994] __ext4_new_inode+0x3452/0x4d70 [ 1342.552051] ? __pfx___ext4_new_inode+0x10/0x10 [ 1342.552092] ? __pfx___dquot_initialize+0x10/0x10 [ 1342.552141] ext4_mkdir+0x331/0xb30 [ 1342.552181] ? __pfx_ext4_mkdir+0x10/0x10 [ 1342.552205] ? security_inode_permission+0x72/0xe0 [ 1342.552251] vfs_mkdir+0x59a/0x8d0 [ 1342.552282] do_mkdirat+0x19f/0x3d0 [ 1342.552317] ? __pfx_do_mkdirat+0x10/0x10 [ 1342.552360] __x64_sys_mkdir+0xf3/0x140 [ 1342.552392] do_syscall_64+0xbf/0x390 [ 1342.552430] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1342.552453] RIP: 0033:0x7f1b64b60c27 [ 1342.552471] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1342.552492] RSP: 002b:00007f1b620d6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1342.552513] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b60c27 [ 1342.552528] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1342.552541] RBP: 00007f1b620d7040 R08: 0000000000000000 R09: ffffffffffffffff [ 1342.552555] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1342.552568] R13: 0000000020000100 R14: 00007f1b620d7000 R15: 0000000020013c00 [ 1342.552606] [ 1342.584238] loop7: detected capacity change from 0 to 512 [ 1342.606066] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1342.607632] EXT4-fs (loop7): group descriptors corrupted! 01:56:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 53) 01:56:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r3 = open(&(0x7f0000000280)='./file0\x00', 0x80a00, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000300)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x2080, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f00000002c0), 0x6}, 0x200, 0x6, 0x2800a0ec, 0x3, 0x4, 0x2, 0x3, 0x0, 0x5, 0x0, 0x67ab}) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r2) 01:56:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 53) 01:56:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 60) 01:56:44 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380014001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1342.887605] loop2: detected capacity change from 0 to 512 [ 1342.948260] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1342.950034] EXT4-fs (loop2): group descriptors corrupted! 01:56:45 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r2, r3, 0x0) keyctl$revoke(0x3, r3) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000280)='system_u:object_r:initrc_exec_t:s0\x00', 0x23, 0x2) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r6, r1, r5, 0x0) [ 1343.018702] loop7: detected capacity change from 0 to 512 [ 1343.026868] FAULT_INJECTION: forcing a failure. [ 1343.026868] name failslab, interval 1, probability 0, space 0, times 0 [ 1343.028842] CPU: 1 UID: 0 PID: 10058 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1343.028874] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1343.028888] Call Trace: [ 1343.028895] [ 1343.028904] dump_stack_lvl+0xfa/0x120 [ 1343.028944] should_fail_ex+0x4d7/0x5e0 [ 1343.028976] ? ext4_alloc_inode+0x28/0x600 [ 1343.028998] should_failslab+0xc2/0x120 [ 1343.029030] kmem_cache_alloc_lru_noprof+0x84/0x690 [ 1343.029059] ? perf_trace_lock+0xb5/0x5d0 [ 1343.029093] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 1343.029126] ? ext4_alloc_inode+0x28/0x600 [ 1343.029146] ext4_alloc_inode+0x28/0x600 [ 1343.029169] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 1343.029189] alloc_inode+0x67/0x250 [ 1343.029226] new_inode+0x1e/0x160 [ 1343.029264] __ext4_new_inode+0x35d/0x4d70 [ 1343.029313] ? avc_has_perm_noaudit+0x150/0x3d0 [ 1343.029355] ? __pfx___ext4_new_inode+0x10/0x10 [ 1343.029392] ? __pfx_avc_has_perm+0x10/0x10 [ 1343.029424] ? __pfx___dquot_initialize+0x10/0x10 [ 1343.029466] ext4_mkdir+0x331/0xb30 [ 1343.029506] ? __pfx_ext4_mkdir+0x10/0x10 [ 1343.029530] ? security_inode_permission+0x72/0xe0 [ 1343.029571] vfs_mkdir+0x59a/0x8d0 [ 1343.029603] do_mkdirat+0x19f/0x3d0 [ 1343.029637] ? __pfx_do_mkdirat+0x10/0x10 [ 1343.029680] __x64_sys_mkdir+0xf3/0x140 [ 1343.029712] do_syscall_64+0xbf/0x390 [ 1343.029750] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1343.029773] RIP: 0033:0x7f94bafeec27 [ 1343.029790] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1343.029813] RSP: 002b:00007f94b8564fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1343.029838] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafeec27 [ 1343.029858] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1343.029871] RBP: 00007f94b8565040 R08: 0000000000000000 R09: ffffffffffffffff [ 1343.029885] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1343.029899] R13: 0000000020000100 R14: 00007f94b8565000 R15: 0000000020013c00 [ 1343.029938] [ 1343.075706] loop5: detected capacity change from 0 to 512 01:56:45 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@private1}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@getpolicy={0x68, 0x15, 0x1, 0x70bd2a, 0x25dfdbff, {{@in=@dev={0xac, 0x14, 0x14, 0x1e}, @in=@local, 0x4e21, 0xfffe, 0x4e21, 0x0, 0xa, 0x80, 0x80, 0x2f, 0x0, r3}, 0x6e6bbb, 0x2}, [@replay_val={0x10, 0xa, {0x70bd28, 0x70bd2d, 0x10000}}, @tfcpad={0x8, 0x16, 0xcd4f}]}, 0x68}, 0x1, 0x0, 0x0, 0x44001}, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'lo\x00'}) getsockopt$inet6_mreq(r4, 0x29, 0x15, &(0x7f0000000380)={@local}, &(0x7f00000003c0)=0x14) [ 1343.118531] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1343.120239] EXT4-fs (loop5): group descriptors corrupted! 01:56:45 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 54) 01:56:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 54) [ 1343.267408] loop2: detected capacity change from 0 to 512 [ 1343.272628] FAULT_INJECTION: forcing a failure. [ 1343.272628] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1343.274499] CPU: 0 UID: 0 PID: 10073 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1343.274530] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1343.274543] Call Trace: [ 1343.274551] [ 1343.274559] dump_stack_lvl+0xfa/0x120 [ 1343.274597] should_fail_ex+0x4d7/0x5e0 [ 1343.274628] strncpy_from_user+0x3b/0x2f0 [ 1343.274668] getname_flags.part.0+0x8d/0x540 [ 1343.274696] __x64_sys_mkdir+0xdb/0x140 [ 1343.274729] do_syscall_64+0xbf/0x390 [ 1343.274765] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1343.274789] RIP: 0033:0x7fd2e6304c27 [ 1343.274806] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1343.274828] RSP: 002b:00007fd2e387afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1343.274850] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6304c27 [ 1343.274865] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1343.274878] RBP: 00007fd2e387b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1343.274892] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1343.274906] R13: 0000000020000100 R14: 00007fd2e387b000 R15: 0000000020013c00 [ 1343.274943] [ 1343.310064] loop7: detected capacity change from 0 to 512 [ 1343.317631] FAULT_INJECTION: forcing a failure. [ 1343.317631] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1343.319474] CPU: 1 UID: 0 PID: 10074 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1343.319506] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1343.319520] Call Trace: [ 1343.319528] [ 1343.319538] dump_stack_lvl+0xfa/0x120 [ 1343.319577] should_fail_ex+0x4d7/0x5e0 [ 1343.319610] strncpy_from_user+0x3b/0x2f0 [ 1343.319651] getname_flags.part.0+0x8d/0x540 [ 1343.319679] __x64_sys_mkdir+0xdb/0x140 [ 1343.319712] do_syscall_64+0xbf/0x390 [ 1343.319750] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1343.319773] RIP: 0033:0x7f94bafeec27 [ 1343.319790] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1343.319812] RSP: 002b:00007f94b8564fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1343.319834] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafeec27 [ 1343.319849] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1343.319863] RBP: 00007f94b8565040 R08: 0000000000000000 R09: ffffffffffffffff [ 1343.319877] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1343.319891] R13: 0000000020000100 R14: 00007f94b8565000 R15: 0000000020013c00 [ 1343.319928] 01:56:54 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 55) 01:56:54 executing program 6: socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) 01:56:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 61) 01:56:54 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x6000, 0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x6, 0x80, 0x6b, 0xc3, 0x0, 0x6, 0x60005, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000100)}, 0xae8897b3e5a9acc7, 0x101, 0xff, 0x1, 0x0, 0x6c, 0xbbc7, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x3, r2, 0x0) add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, r0, r1, 0x0) [ 1352.498897] loop7: detected capacity change from 0 to 512 [ 1352.505957] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1352.506905] EXT4-fs (loop7): group descriptors corrupted! 01:56:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 55) 01:56:54 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0x8, r0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) r3 = request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000280)='-/,$\x00', r0) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$unlink(0x9, r1, r3) 01:56:54 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380015001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1352.545004] loop5: detected capacity change from 0 to 512 [ 1352.548395] FAULT_INJECTION: forcing a failure. [ 1352.548395] name failslab, interval 1, probability 0, space 0, times 0 [ 1352.549395] CPU: 1 UID: 0 PID: 10090 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1352.549412] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1352.549420] Call Trace: [ 1352.549424] [ 1352.549429] dump_stack_lvl+0xfa/0x120 [ 1352.549453] should_fail_ex+0x4d7/0x5e0 [ 1352.549472] ? jbd2__journal_start+0x193/0x6b0 [ 1352.549487] should_failslab+0xc2/0x120 [ 1352.549505] kmem_cache_alloc_noprof+0x80/0x690 [ 1352.549520] ? lock_is_held_type+0x9e/0x120 [ 1352.549542] ? jbd2__journal_start+0x193/0x6b0 [ 1352.549556] jbd2__journal_start+0x193/0x6b0 [ 1352.549574] __ext4_journal_start_sb+0x325/0x5d0 [ 1352.549598] __ext4_new_inode+0x2cbe/0x4d70 [ 1352.549629] ? __pfx___ext4_new_inode+0x10/0x10 [ 1352.549650] ? __pfx_avc_has_perm+0x10/0x10 [ 1352.549669] ? __pfx___dquot_initialize+0x10/0x10 [ 1352.549693] ext4_mkdir+0x331/0xb30 [ 1352.549716] ? __pfx_ext4_mkdir+0x10/0x10 [ 1352.549728] ? security_inode_permission+0x72/0xe0 [ 1352.549752] vfs_mkdir+0x59a/0x8d0 [ 1352.549771] do_mkdirat+0x19f/0x3d0 [ 1352.549790] ? __pfx_do_mkdirat+0x10/0x10 [ 1352.549814] __x64_sys_mkdir+0xf3/0x140 [ 1352.549831] do_syscall_64+0xbf/0x390 [ 1352.549851] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1352.549877] RIP: 0033:0x7f1b64b60c27 [ 1352.549887] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1352.549900] RSP: 002b:00007f1b620d6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1352.549912] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b60c27 [ 1352.549921] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1352.549928] RBP: 00007f1b620d7040 R08: 0000000000000000 R09: ffffffffffffffff [ 1352.549936] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1352.549944] R13: 0000000020000100 R14: 00007f1b620d7000 R15: 0000000020013c00 [ 1352.549965] [ 1352.549971] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory [ 1352.573069] loop2: detected capacity change from 0 to 512 01:56:54 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 56) [ 1352.578931] FAULT_INJECTION: forcing a failure. [ 1352.578931] name failslab, interval 1, probability 0, space 0, times 0 [ 1352.579906] CPU: 1 UID: 0 PID: 10093 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1352.579922] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1352.579929] Call Trace: [ 1352.579933] [ 1352.579937] dump_stack_lvl+0xfa/0x120 [ 1352.579955] should_fail_ex+0x4d7/0x5e0 [ 1352.579971] ? security_inode_alloc+0x3e/0x130 [ 1352.579985] should_failslab+0xc2/0x120 [ 1352.580002] kmem_cache_alloc_noprof+0x80/0x690 [ 1352.580013] ? __pfx_map_id_range_down+0x10/0x10 [ 1352.580040] ? security_inode_alloc+0x3e/0x130 [ 1352.580054] security_inode_alloc+0x3e/0x130 [ 1352.580070] inode_init_always_gfp+0xc9d/0xff0 [ 1352.580091] alloc_inode+0x8d/0x250 [ 1352.580118] new_inode+0x1e/0x160 [ 1352.580139] __ext4_new_inode+0x35d/0x4d70 [ 1352.580163] ? avc_has_perm_noaudit+0x150/0x3d0 [ 1352.580185] ? __pfx___ext4_new_inode+0x10/0x10 [ 1352.580205] ? __pfx_avc_has_perm+0x10/0x10 [ 1352.580223] ? __pfx___dquot_initialize+0x10/0x10 [ 1352.580245] ext4_mkdir+0x331/0xb30 [ 1352.580266] ? __pfx_ext4_mkdir+0x10/0x10 [ 1352.580279] ? security_inode_permission+0x72/0xe0 [ 1352.580301] vfs_mkdir+0x59a/0x8d0 [ 1352.580318] do_mkdirat+0x19f/0x3d0 [ 1352.580336] ? __pfx_do_mkdirat+0x10/0x10 [ 1352.580359] __x64_sys_mkdir+0xf3/0x140 [ 1352.580377] do_syscall_64+0xbf/0x390 [ 1352.580396] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1352.580408] RIP: 0033:0x7fd2e6304c27 [ 1352.580417] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1352.580429] RSP: 002b:00007fd2e387afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1352.580440] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6304c27 [ 1352.580448] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1352.580456] RBP: 00007fd2e387b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1352.580463] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1352.580470] R13: 0000000020000100 R14: 00007fd2e387b000 R15: 0000000020013c00 [ 1352.580491] 01:56:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 62) 01:56:54 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)={0x30, r1, 0x16566fdb4c104121, 0x0, 0x0, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan3\x00'}, @NL802154_ATTR_IFTYPE={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_DEV(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, r1, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x60}, 0x1, 0x0, 0x0, 0x24048800}, 0x4000000) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r4, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) 01:56:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 56) [ 1352.727035] loop7: detected capacity change from 0 to 512 01:56:54 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="a1c08dbc19e2b7aafbddbc7cbfc2920e3ed322255cf43fec74d3770973b7b8ef443162bae9ab737eef578a4419ed36cda59f11971be7242896cb0c8dce717926737b1ff30efc12f09d429c1034df4fe82846cd18883cc077fc4c08a8d25c79fac38e8e486d0486e6b9e2fd135133f4c80032d68d513b1bd689e4d9d9"]) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x2) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x104000, 0x0) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1005841, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x84000, &(0x7f00000014c0)=ANY=[@ANYBLOB="04"]) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) mknodat$loop(r2, &(0x7f00000003c0)='./file0\x00', 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r0, r3, 0x0) [ 1352.775138] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1352.776754] EXT4-fs (loop7): group descriptors corrupted! 01:56:54 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) keyctl$revoke(0x3, r4) r6 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r4) keyctl$KEYCTL_MOVE(0x1e, r6, r1, r2, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r7 = fork() tkill(r7, 0x31) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x2, 0x8, 0x40, 0x7f, 0x0, 0x0, 0x8001, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x4008, 0x59c45564, 0x3, 0x9, 0x1, 0x5, 0x5, 0x0, 0x5, 0x0, 0x7}, r7, 0x4, r0, 0x3) ptrace(0x10, r7) [ 1352.794955] Process accounting paused [ 1352.802285] tmpfs: Unknown parameter '¡À¼â·ªûݼ|¿Â’>Ó"%\ô?ìtÓw s·¸ïD1bºé«s~ïWŠDí6Í¥Ÿ—ç$(–Ë Îqy&s{óüðBœ4ßOè(F͈<ÀwüL¨Ò\yúÃŽŽHm†æ¹âýQ3ôÈ' [ 1352.806263] tmpfs: Unknown parameter '¡À¼â·ªûݼ|¿Â’>Ó"%\ô?ìtÓw s·¸ïD1bºé«s~ïWŠDí6Í¥Ÿ—ç$(–Ë Îqy&s{óüðBœ4ßOè(F͈<ÀwüL¨Ò\yúÃŽŽHm†æ¹âýQ3ôÈ' 01:56:54 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380177001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1352.850398] loop5: detected capacity change from 0 to 512 [ 1352.854910] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1352.855691] EXT4-fs (loop5): group descriptors corrupted! [ 1352.887019] loop2: detected capacity change from 0 to 512 [ 1352.900130] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1352.900874] EXT4-fs (loop2): group descriptors corrupted! 01:57:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:57:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000280)='}\\\'\xe6\'\x00', r1) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) keyctl$revoke(0x3, r4) r6 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r6) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r8, r6, r7, 0x0) keyctl$unlink(0x9, r4, r8) 01:57:04 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380ec0001200010e000000000000000028001a"], 0x38}}, 0x0) 01:57:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 63) 01:57:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 57) 01:57:04 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'gretap0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="0c0000003f000000ff030000b0000000a4b8b4a89d754111293b6da04efce3ee68527850aaf0007cf01aced12f9a2a964d34b34ff5edfcb343f250d0130f408fff8f01463b25b104169df2b0901ca2163990c5d03a0600000000000000b8568353b581c9bef83292d606525745a628d2ee17a682e5533cc92a3e4b911ac00b7567ff06057dcbfdf6dcbfb524eaeb4b66df16a66b068bc8155a8f150bc642224a13628619d0f55c870803cf899f8ddf2f2e252ed37617ddab51bc50c7eacda9db"]}) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) ioctl$sock_SIOCETHTOOL(r1, 0x8922, &(0x7f0000000180)={'syz_tun\x00', 0x0}) 01:57:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 57) [ 1362.897611] loop7: detected capacity change from 0 to 512 [ 1362.899978] FAULT_INJECTION: forcing a failure. [ 1362.899978] name failslab, interval 1, probability 0, space 0, times 0 [ 1362.900868] CPU: 1 UID: 0 PID: 10134 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1362.900885] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1362.900893] Call Trace: [ 1362.900897] [ 1362.900903] dump_stack_lvl+0xfa/0x120 [ 1362.900927] should_fail_ex+0x4d7/0x5e0 [ 1362.900947] ? __d_alloc+0x31/0xa10 [ 1362.900963] should_failslab+0xc2/0x120 [ 1362.900983] kmem_cache_alloc_lru_noprof+0x84/0x690 [ 1362.900996] ? __d_lookup+0x255/0x490 [ 1362.901015] ? __d_alloc+0x31/0xa10 [ 1362.901030] __d_alloc+0x31/0xa10 [ 1362.901050] d_alloc+0x4a/0x1e0 [ 1362.901069] lookup_one_qstr_excl+0x174/0x270 [ 1362.901081] ? mnt_want_write+0x153/0x420 [ 1362.901100] filename_create+0x1ca/0x480 [ 1362.901115] ? __pfx_filename_create+0x10/0x10 [ 1362.901128] ? __virt_addr_valid+0x2e8/0x5d0 [ 1362.901152] do_mkdirat+0x9a/0x3d0 [ 1362.901170] ? __pfx_do_mkdirat+0x10/0x10 [ 1362.901193] __x64_sys_mkdir+0xf3/0x140 [ 1362.901211] do_syscall_64+0xbf/0x390 [ 1362.901233] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1362.901246] RIP: 0033:0x7f94bafeec27 [ 1362.901256] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1362.901268] RSP: 002b:00007f94b8564fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1362.901279] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafeec27 [ 1362.901288] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1362.901295] RBP: 00007f94b8565040 R08: 0000000000000000 R09: ffffffffffffffff [ 1362.901303] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1362.901311] R13: 0000000020000100 R14: 00007f94b8565000 R15: 0000000020013c00 [ 1362.901332] 01:57:05 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = fork() tkill(r2, 0x31) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x7, 0x6, 0x96, 0x7f, 0x0, 0x1000, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0xc5f1}, 0x100, 0x4, 0x101, 0x4, 0x8000, 0x3ff, 0x20, 0x0, 0x5, 0x0, 0x3}, r2, 0x5, r0, 0xb) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r1, r3, 0x0) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r5) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000280)) r6 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r6) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r8, r6, r7, 0x0) keyctl$revoke(0x3, r7) keyctl$unlink(0x9, r7, r1) [ 1362.976178] loop5: detected capacity change from 0 to 512 [ 1362.981896] FAULT_INJECTION: forcing a failure. [ 1362.981896] name failslab, interval 1, probability 0, space 0, times 0 [ 1362.982635] loop2: detected capacity change from 0 to 512 [ 1362.983565] CPU: 0 UID: 0 PID: 10146 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1362.983596] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1362.983609] Call Trace: [ 1362.983617] [ 1362.983627] dump_stack_lvl+0xfa/0x120 [ 1362.983663] should_fail_ex+0x4d7/0x5e0 [ 1362.983696] should_failslab+0xc2/0x120 [ 1362.983729] __kmalloc_noprof+0xcd/0x680 [ 1362.983762] ? current_umask+0x12/0x80 [ 1362.983794] ? posix_acl_create.part.0+0x2a0/0x480 [ 1362.983823] ? security_inode_init_security+0x113/0x370 [ 1362.983857] security_inode_init_security+0x113/0x370 [ 1362.983883] ? __pfx_ext4_initxattrs+0x10/0x10 [ 1362.983909] ? __pfx_security_inode_init_security+0x10/0x10 [ 1362.983940] ? crc32c+0x1ae/0x350 [ 1362.983967] __ext4_new_inode+0x3452/0x4d70 [ 1362.984023] ? __pfx___ext4_new_inode+0x10/0x10 [ 1362.984065] ? __pfx___dquot_initialize+0x10/0x10 [ 1362.984113] ext4_mkdir+0x331/0xb30 [ 1362.984154] ? __pfx_ext4_mkdir+0x10/0x10 [ 1362.984177] ? security_inode_permission+0x72/0xe0 [ 1362.984218] vfs_mkdir+0x59a/0x8d0 [ 1362.984250] do_mkdirat+0x19f/0x3d0 [ 1362.984284] ? __pfx_do_mkdirat+0x10/0x10 [ 1362.984327] __x64_sys_mkdir+0xf3/0x140 [ 1362.984360] do_syscall_64+0xbf/0x390 [ 1362.984397] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1362.984420] RIP: 0033:0x7f1b64b60c27 [ 1362.984437] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1362.984459] RSP: 002b:00007f1b620d6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1362.984480] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b60c27 [ 1362.984495] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1362.984509] RBP: 00007f1b620d7040 R08: 0000000000000000 R09: ffffffffffffffff [ 1362.984523] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1362.984536] R13: 0000000020000100 R14: 00007f1b620d7000 R15: 0000000020013c00 [ 1362.984574] [ 1363.015515] FAULT_INJECTION: forcing a failure. [ 1363.015515] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.016377] CPU: 1 UID: 0 PID: 10148 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1363.016394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1363.016402] Call Trace: [ 1363.016407] [ 1363.016412] dump_stack_lvl+0xfa/0x120 [ 1363.016435] should_fail_ex+0x4d7/0x5e0 [ 1363.016458] ? jbd2__journal_start+0x193/0x6b0 [ 1363.016477] should_failslab+0xc2/0x120 [ 1363.016498] kmem_cache_alloc_noprof+0x80/0x690 [ 1363.016513] ? lock_is_held_type+0x9e/0x120 [ 1363.016534] ? jbd2__journal_start+0x193/0x6b0 [ 1363.016548] jbd2__journal_start+0x193/0x6b0 [ 1363.016566] __ext4_journal_start_sb+0x325/0x5d0 [ 1363.016590] __ext4_new_inode+0x2cbe/0x4d70 [ 1363.016621] ? __pfx___ext4_new_inode+0x10/0x10 [ 1363.016641] ? __pfx_avc_has_perm+0x10/0x10 [ 1363.016660] ? __pfx___dquot_initialize+0x10/0x10 [ 1363.016684] ext4_mkdir+0x331/0xb30 [ 1363.016707] ? __pfx_ext4_mkdir+0x10/0x10 [ 1363.016719] ? security_inode_permission+0x72/0xe0 [ 1363.016742] vfs_mkdir+0x59a/0x8d0 [ 1363.016760] do_mkdirat+0x19f/0x3d0 [ 1363.016779] ? __pfx_do_mkdirat+0x10/0x10 [ 1363.016802] __x64_sys_mkdir+0xf3/0x140 [ 1363.016820] do_syscall_64+0xbf/0x390 [ 1363.016839] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1363.016853] RIP: 0033:0x7fd2e6304c27 [ 1363.016862] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1363.016874] RSP: 002b:00007fd2e387afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1363.016886] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6304c27 [ 1363.016894] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1363.016902] RBP: 00007fd2e387b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1363.016910] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1363.016917] R13: 0000000020000100 R14: 00007fd2e387b000 R15: 0000000020013c00 [ 1363.016938] [ 1363.016959] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory 01:57:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 58) 01:57:05 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800f0001200010e000000000000000028001a"], 0x38}}, 0x0) 01:57:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 64) [ 1363.097740] loop7: detected capacity change from 0 to 512 01:57:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 58) [ 1363.120735] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1363.121598] EXT4-fs (loop7): group descriptors corrupted! 01:57:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:57:05 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000000)={'lo\x00', 0x0}) recvmmsg(r0, &(0x7f0000000540)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000040)=""/210, 0xd2}, {&(0x7f0000000140)=""/119, 0x77}, {&(0x7f00000001c0)=""/24, 0x18}, {&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f0000000300)=""/143, 0x8f}, {&(0x7f00000003c0)=""/69, 0x45}, {&(0x7f0000000440)=""/49, 0x31}], 0x7, &(0x7f0000000500)=""/7, 0x7}, 0x6}], 0x1, 0x12161, &(0x7f0000000580)={0x77359400}) 01:57:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 59) 01:57:05 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002800010e000000000000000028001a"], 0x38}}, 0x0) [ 1363.234780] loop5: detected capacity change from 0 to 512 [ 1363.252083] loop7: detected capacity change from 0 to 512 [ 1363.261902] FAULT_INJECTION: forcing a failure. [ 1363.261902] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.263017] CPU: 1 UID: 0 PID: 10169 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1363.263036] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1363.263043] Call Trace: [ 1363.263048] [ 1363.263053] dump_stack_lvl+0xfa/0x120 [ 1363.263079] should_fail_ex+0x4d7/0x5e0 [ 1363.263102] should_failslab+0xc2/0x120 [ 1363.263123] __kmalloc_noprof+0xcd/0x680 [ 1363.263146] ? current_umask+0x12/0x80 [ 1363.263167] ? posix_acl_create.part.0+0x2a0/0x480 [ 1363.263185] ? security_inode_init_security+0x113/0x370 [ 1363.263206] security_inode_init_security+0x113/0x370 [ 1363.263220] ? __pfx_ext4_initxattrs+0x10/0x10 [ 1363.263237] ? __pfx_security_inode_init_security+0x10/0x10 [ 1363.263256] ? crc32c+0x1ae/0x350 [ 1363.263272] __ext4_new_inode+0x3452/0x4d70 [ 1363.263305] ? __pfx___ext4_new_inode+0x10/0x10 [ 1363.263329] ? __pfx___dquot_initialize+0x10/0x10 [ 1363.263353] ext4_mkdir+0x331/0xb30 [ 1363.263377] ? __pfx_ext4_mkdir+0x10/0x10 [ 1363.263390] ? security_inode_permission+0x72/0xe0 [ 1363.263415] vfs_mkdir+0x59a/0x8d0 [ 1363.263433] do_mkdirat+0x19f/0x3d0 [ 1363.263454] ? __pfx_do_mkdirat+0x10/0x10 [ 1363.263479] __x64_sys_mkdir+0xf3/0x140 [ 1363.263498] do_syscall_64+0xbf/0x390 [ 1363.263520] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1363.263535] RIP: 0033:0x7f94bafeec27 [ 1363.263545] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1363.263558] RSP: 002b:00007f94b8564fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1363.263571] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafeec27 [ 1363.263580] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1363.263588] RBP: 00007f94b8565040 R08: 0000000000000000 R09: ffffffffffffffff [ 1363.263597] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1363.263605] R13: 0000000020000100 R14: 00007f94b8565000 R15: 0000000020013c00 [ 1363.263627] [ 1363.286018] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1363.286797] EXT4-fs (loop5): group descriptors corrupted! [ 1363.290668] loop2: detected capacity change from 0 to 512 [ 1363.334016] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1363.347054] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1363.348901] EXT4-fs (loop2): group descriptors corrupted! 01:57:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 60) [ 1363.429903] loop7: detected capacity change from 0 to 512 01:57:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 65) [ 1363.453375] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1363.454204] EXT4-fs (loop7): group descriptors corrupted! [ 1363.559893] loop5: detected capacity change from 0 to 512 [ 1363.567663] FAULT_INJECTION: forcing a failure. [ 1363.567663] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.568740] CPU: 1 UID: 0 PID: 10185 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1363.568757] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1363.568766] Call Trace: [ 1363.568770] [ 1363.568775] dump_stack_lvl+0xfa/0x120 [ 1363.568800] should_fail_ex+0x4d7/0x5e0 [ 1363.568815] ? vfs_mkdir+0x59a/0x8d0 [ 1363.568832] should_failslab+0xc2/0x120 [ 1363.568852] __kmalloc_node_track_caller_noprof+0xc6/0x690 [ 1363.568868] ? sidtab_sid2str_get+0x85/0x6f0 [ 1363.568885] ? sidtab_sid2str_get+0x17e/0x6f0 [ 1363.568905] kmemdup_noprof+0x2b/0x60 [ 1363.568925] sidtab_sid2str_get+0x17e/0x6f0 [ 1363.568945] sidtab_entry_to_string+0x33/0x110 [ 1363.568964] security_sid_to_context_core+0x350/0x620 [ 1363.568982] selinux_inode_init_security+0x432/0x650 [ 1363.569002] ? __pfx_selinux_inode_init_security+0x10/0x10 [ 1363.569018] ? trace_kmalloc+0x1f/0xb0 [ 1363.569034] ? current_umask+0x12/0x80 [ 1363.569052] ? posix_acl_create.part.0+0x2a0/0x480 [ 1363.569068] ? security_inode_init_security+0x113/0x370 [ 1363.569087] security_inode_init_security+0x1bc/0x370 [ 1363.569105] ? __pfx_ext4_initxattrs+0x10/0x10 [ 1363.569122] ? __pfx_security_inode_init_security+0x10/0x10 [ 1363.569139] ? crc32c+0x1ae/0x350 [ 1363.569154] __ext4_new_inode+0x3452/0x4d70 [ 1363.569186] ? __pfx___ext4_new_inode+0x10/0x10 [ 1363.569208] ? __pfx___dquot_initialize+0x10/0x10 [ 1363.569231] ext4_mkdir+0x331/0xb30 [ 1363.569254] ? __pfx_ext4_mkdir+0x10/0x10 [ 1363.569267] ? security_inode_permission+0x72/0xe0 [ 1363.569290] vfs_mkdir+0x59a/0x8d0 [ 1363.569306] do_mkdirat+0x19f/0x3d0 [ 1363.569325] ? __pfx_do_mkdirat+0x10/0x10 [ 1363.569349] __x64_sys_mkdir+0xf3/0x140 [ 1363.569366] do_syscall_64+0xbf/0x390 [ 1363.569387] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1363.569400] RIP: 0033:0x7f1b64b60c27 [ 1363.569410] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1363.569423] RSP: 002b:00007f1b620d6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1363.569435] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b60c27 [ 1363.569443] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1363.569451] RBP: 00007f1b620d7040 R08: 0000000000000000 R09: ffffffffffffffff [ 1363.569459] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1363.569466] R13: 0000000020000100 R14: 00007f1b620d7000 R15: 0000000020013c00 [ 1363.569487] 01:57:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 66) 01:57:15 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000000)={'erspan0\x00', 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 01:57:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 59) 01:57:15 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380002001200010e000000000000000028001a"], 0x38}}, 0x0) 01:57:15 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fork() tkill(r0, 0x31) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r2, 0x2, r1, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x51, 0x1, 0xda, 0x81, 0x0, 0x1, 0x80, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x100000001, 0x3}, 0x40800, 0x2, 0x3, 0x1, 0x3, 0x8, 0x1, 0x0, 0x4, 0x0, 0x80000000}, r0, 0x0, r1, 0x8) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) 01:57:15 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/ipc\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='\x00', r2) keyctl$KEYCTL_MOVE(0x1e, r4, r2, r3, 0x0) keyctl$revoke(0x3, r3) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r6, r0, r5, 0x0) 01:57:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 61) [ 1373.233734] loop5: detected capacity change from 0 to 512 [ 1373.250560] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1373.251514] EXT4-fs (loop5): group descriptors corrupted! [ 1373.264016] loop7: detected capacity change from 0 to 512 [ 1373.265394] loop2: detected capacity change from 0 to 512 [ 1373.269035] FAULT_INJECTION: forcing a failure. [ 1373.269035] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.270070] CPU: 0 UID: 0 PID: 10207 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1373.270089] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1373.270101] Call Trace: [ 1373.270106] [ 1373.270112] dump_stack_lvl+0xfa/0x120 [ 1373.270137] should_fail_ex+0x4d7/0x5e0 [ 1373.270157] ? jbd2__journal_start+0x193/0x6b0 [ 1373.270174] should_failslab+0xc2/0x120 [ 1373.270195] kmem_cache_alloc_noprof+0x80/0x690 [ 1373.270211] ? lock_is_held_type+0x9e/0x120 [ 1373.270235] ? jbd2__journal_start+0x193/0x6b0 [ 1373.270249] jbd2__journal_start+0x193/0x6b0 [ 1373.270269] __ext4_journal_start_sb+0x325/0x5d0 [ 1373.270296] __ext4_new_inode+0x2cbe/0x4d70 [ 1373.270332] ? __pfx___ext4_new_inode+0x10/0x10 [ 1373.270354] ? __pfx_avc_has_perm+0x10/0x10 [ 1373.270375] ? __pfx___dquot_initialize+0x10/0x10 [ 1373.270401] ext4_mkdir+0x331/0xb30 [ 1373.270426] ? __pfx_ext4_mkdir+0x10/0x10 [ 1373.270440] ? security_inode_permission+0x72/0xe0 [ 1373.270465] vfs_mkdir+0x59a/0x8d0 [ 1373.270485] do_mkdirat+0x19f/0x3d0 [ 1373.270506] ? __pfx_do_mkdirat+0x10/0x10 [ 1373.270532] __x64_sys_mkdir+0xf3/0x140 [ 1373.270551] do_syscall_64+0xbf/0x390 [ 1373.270574] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1373.270588] RIP: 0033:0x7f94bafeec27 [ 1373.270599] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1373.270612] RSP: 002b:00007f94b8564fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1373.270626] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafeec27 [ 1373.270635] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1373.270643] RBP: 00007f94b8565040 R08: 0000000000000000 R09: ffffffffffffffff [ 1373.270651] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1373.270659] R13: 0000000020000100 R14: 00007f94b8565000 R15: 0000000020013c00 [ 1373.270682] [ 1373.271887] FAULT_INJECTION: forcing a failure. [ 1373.271887] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.272506] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory [ 1373.272783] CPU: 1 UID: 0 PID: 10208 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1373.272814] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1373.272826] Call Trace: [ 1373.272834] [ 1373.272843] dump_stack_lvl+0xfa/0x120 [ 1373.272881] should_fail_ex+0x4d7/0x5e0 [ 1373.272913] should_failslab+0xc2/0x120 [ 1373.272946] __kmalloc_noprof+0xcd/0x680 [ 1373.272979] ? current_umask+0x12/0x80 [ 1373.273012] ? posix_acl_create.part.0+0x2a0/0x480 [ 1373.273042] ? security_inode_init_security+0x113/0x370 [ 1373.273076] security_inode_init_security+0x113/0x370 [ 1373.273108] ? __pfx_ext4_initxattrs+0x10/0x10 [ 1373.273136] ? __pfx_security_inode_init_security+0x10/0x10 [ 1373.273167] ? crc32c+0x1ae/0x350 [ 1373.273194] __ext4_new_inode+0x3452/0x4d70 [ 1373.273251] ? __pfx___ext4_new_inode+0x10/0x10 [ 1373.273292] ? __pfx___dquot_initialize+0x10/0x10 [ 1373.273334] ext4_mkdir+0x331/0xb30 [ 1373.273374] ? __pfx_ext4_mkdir+0x10/0x10 [ 1373.273398] ? security_inode_permission+0x72/0xe0 [ 1373.273439] vfs_mkdir+0x59a/0x8d0 [ 1373.273471] do_mkdirat+0x19f/0x3d0 [ 1373.273505] ? __pfx_do_mkdirat+0x10/0x10 [ 1373.273549] __x64_sys_mkdir+0xf3/0x140 [ 1373.273598] do_syscall_64+0xbf/0x390 [ 1373.273650] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1373.273680] RIP: 0033:0x7fd2e6304c27 [ 1373.273703] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1373.273725] RSP: 002b:00007fd2e387afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1373.273746] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6304c27 [ 1373.273762] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1373.273775] RBP: 00007fd2e387b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1373.273789] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1373.273803] R13: 0000000020000100 R14: 00007fd2e387b000 R15: 0000000020013c00 [ 1373.273841] 01:57:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 67) 01:57:15 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380003001200010e000000000000000028001a"], 0x38}}, 0x0) 01:57:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 60) 01:57:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 62) [ 1373.419753] loop5: detected capacity change from 0 to 512 [ 1373.425398] FAULT_INJECTION: forcing a failure. [ 1373.425398] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.426575] CPU: 0 UID: 0 PID: 10224 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1373.426592] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1373.426600] Call Trace: [ 1373.426604] [ 1373.426609] dump_stack_lvl+0xfa/0x120 [ 1373.426634] should_fail_ex+0x4d7/0x5e0 [ 1373.426654] should_failslab+0xc2/0x120 [ 1373.426673] __kmalloc_noprof+0xcd/0x680 [ 1373.426693] ? find_held_lock+0x2b/0x80 [ 1373.426710] ? ext4_find_extent+0x7f5/0xa00 [ 1373.426729] ext4_find_extent+0x7f5/0xa00 [ 1373.426747] ext4_ext_map_blocks+0x1cc/0x5f70 [ 1373.426762] ? fs_reclaim_acquire+0xae/0x150 [ 1373.426780] ? lock_is_held_type+0x9e/0x120 [ 1373.426807] ? bdev_getblk+0xd6/0x660 [ 1373.426830] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1373.426847] ? perf_trace_lock_acquire+0xc9/0x700 [ 1373.426868] ? look_up_lock_class+0x56/0x150 [ 1373.426885] ? perf_trace_lock_acquire+0xc9/0x700 [ 1373.426903] ? register_lock_class+0x41/0x560 [ 1373.426924] ? __lock_acquire+0xc65/0x1b70 [ 1373.426952] ? lock_acquire+0x15e/0x2f0 [ 1373.426969] ? ext4_map_blocks+0x49f/0x14a0 [ 1373.426991] ext4_map_query_blocks+0x117/0x890 [ 1373.427010] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 1373.427026] ? __pfx_down_read+0x10/0x10 [ 1373.427045] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1373.427068] ext4_map_blocks+0x4b3/0x14a0 [ 1373.427091] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1373.427113] ? __pfx_ext4_initxattrs+0x10/0x10 [ 1373.427129] ? __pfx_security_inode_init_security+0x10/0x10 [ 1373.427148] ? crc32c+0x1ae/0x350 [ 1373.427162] ? __brelse+0x7f/0xa0 [ 1373.427176] ? __ext4_new_inode+0x116/0x4d70 [ 1373.427199] ext4_append+0x1b6/0x530 [ 1373.427222] ? __pfx_ext4_append+0x10/0x10 [ 1373.427244] ? __pfx___ext4_new_inode+0x10/0x10 [ 1373.427271] ext4_init_new_dir+0x13c/0x240 [ 1373.427285] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1373.427308] ext4_mkdir+0x3c5/0xb30 [ 1373.427327] ? __pfx_ext4_mkdir+0x10/0x10 [ 1373.427341] ? security_inode_permission+0x72/0xe0 [ 1373.427365] vfs_mkdir+0x59a/0x8d0 [ 1373.427384] do_mkdirat+0x19f/0x3d0 [ 1373.427404] ? __pfx_do_mkdirat+0x10/0x10 [ 1373.427429] __x64_sys_mkdir+0xf3/0x140 [ 1373.427450] do_syscall_64+0xbf/0x390 [ 1373.427473] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1373.427487] RIP: 0033:0x7f1b64b60c27 [ 1373.427498] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1373.427510] RSP: 002b:00007f1b620d6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1373.427523] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b60c27 [ 1373.427531] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1373.427539] RBP: 00007f1b620d7040 R08: 0000000000000000 R09: ffffffffffffffff [ 1373.427547] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1373.427555] R13: 0000000020000100 R14: 00007f1b620d7000 R15: 0000000020013c00 [ 1373.427576] 01:57:15 executing program 6: socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip_vti0\x00'}) 01:57:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r2, r3, 0x0) keyctl$revoke(0x3, r3) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r3, 0x1) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x1ff) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r6, r0, r5, 0x0) [ 1373.555054] loop2: detected capacity change from 0 to 512 [ 1373.560740] loop7: detected capacity change from 0 to 512 [ 1373.573320] FAULT_INJECTION: forcing a failure. [ 1373.573320] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.574222] CPU: 0 UID: 0 PID: 10236 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1373.574238] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1373.574246] Call Trace: [ 1373.574251] [ 1373.574255] dump_stack_lvl+0xfa/0x120 [ 1373.574278] should_fail_ex+0x4d7/0x5e0 [ 1373.574293] ? vfs_mkdir+0x59a/0x8d0 [ 1373.574310] should_failslab+0xc2/0x120 [ 1373.574328] __kmalloc_node_track_caller_noprof+0xc6/0x690 [ 1373.574345] ? sidtab_sid2str_get+0x85/0x6f0 [ 1373.574362] ? sidtab_sid2str_get+0x17e/0x6f0 [ 1373.574382] kmemdup_noprof+0x2b/0x60 [ 1373.574402] sidtab_sid2str_get+0x17e/0x6f0 [ 1373.574421] sidtab_entry_to_string+0x33/0x110 [ 1373.574439] security_sid_to_context_core+0x350/0x620 [ 1373.574457] selinux_inode_init_security+0x432/0x650 [ 1373.574476] ? __pfx_selinux_inode_init_security+0x10/0x10 [ 1373.574493] ? trace_kmalloc+0x1f/0xb0 [ 1373.574509] ? current_umask+0x12/0x80 [ 1373.574526] ? posix_acl_create.part.0+0x2a0/0x480 [ 1373.574542] ? security_inode_init_security+0x113/0x370 [ 1373.574561] security_inode_init_security+0x1bc/0x370 [ 1373.574575] ? __pfx_ext4_initxattrs+0x10/0x10 [ 1373.574590] ? __pfx_security_inode_init_security+0x10/0x10 [ 1373.574607] ? crc32c+0x1ae/0x350 [ 1373.574622] __ext4_new_inode+0x3452/0x4d70 [ 1373.574653] ? __pfx___ext4_new_inode+0x10/0x10 [ 1373.574675] ? __pfx___dquot_initialize+0x10/0x10 [ 1373.574698] ext4_mkdir+0x331/0xb30 [ 1373.574721] ? __pfx_ext4_mkdir+0x10/0x10 [ 1373.574733] ? security_inode_permission+0x72/0xe0 [ 1373.574756] vfs_mkdir+0x59a/0x8d0 [ 1373.574773] do_mkdirat+0x19f/0x3d0 [ 1373.574791] ? __pfx_do_mkdirat+0x10/0x10 [ 1373.574815] __x64_sys_mkdir+0xf3/0x140 [ 1373.574832] do_syscall_64+0xbf/0x390 [ 1373.574853] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1373.574866] RIP: 0033:0x7f94bafeec27 [ 1373.574876] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1373.574888] RSP: 002b:00007f94b8564fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1373.574900] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafeec27 [ 1373.574908] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1373.574916] RBP: 00007f94b8565040 R08: 0000000000000000 R09: ffffffffffffffff [ 1373.574924] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1373.574931] R13: 0000000020000100 R14: 00007f94b8565000 R15: 0000000020013c00 [ 1373.574952] [ 1373.603981] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1373.604801] EXT4-fs (loop2): group descriptors corrupted! 01:57:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 68) 01:57:15 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380004001200010e000000000000000028001a"], 0x38}}, 0x0) 01:57:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 61) [ 1373.679675] loop5: detected capacity change from 0 to 512 01:57:15 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd(0x4) close_range(0xffffffffffffffff, r0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000280)={{0x108, 0x5, 0x4, 0x20d, 0x393, 0x100, 0x93, 0x7}, "dd6551cbaed3d06ed44d051387d6d39524722fde868c1f2d415a2e23fca915f4c21f6e215171d257631221d912d402c9046f8982925c94402d9f9144bbd139ce0ca54163d04efa13519dcb827516ed4818533bc9fce42e4f27541912cae8a3d2595eb1962db07164ba355f75d3365194bfff63419488d857e606375655d6c426ed3cdbaa08da3684831f406889edfd419833bb98d6e44d135c2467ab0e84c67d1e9c60ca590b76429abfa288d6189e1f9478041ff6fafd9224ded0dc0f5965cb4f39647f03c5a17cf49f7a1c852190ce6e014cc9c6a0dae4fb129123c536f31a42250cb5e8d6f0b699f6d68d2780b6739a5a23c084d967d1", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x718) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r2, r3, 0x0) [ 1373.708969] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1373.710461] EXT4-fs (loop5): group descriptors corrupted! 01:57:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 63) 01:57:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 69) 01:57:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 1373.799834] loop7: detected capacity change from 0 to 512 [ 1373.815462] loop2: detected capacity change from 0 to 512 [ 1373.820982] FAULT_INJECTION: forcing a failure. [ 1373.820982] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.822066] CPU: 0 UID: 0 PID: 10257 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1373.822083] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1373.822091] Call Trace: [ 1373.822100] [ 1373.822105] dump_stack_lvl+0xfa/0x120 [ 1373.822129] should_fail_ex+0x4d7/0x5e0 [ 1373.822144] ? vfs_mkdir+0x59a/0x8d0 [ 1373.822161] should_failslab+0xc2/0x120 [ 1373.822179] __kmalloc_node_track_caller_noprof+0xc6/0x690 [ 1373.822196] ? sidtab_sid2str_get+0x85/0x6f0 [ 1373.822213] ? sidtab_sid2str_get+0x17e/0x6f0 [ 1373.822235] kmemdup_noprof+0x2b/0x60 [ 1373.822257] sidtab_sid2str_get+0x17e/0x6f0 [ 1373.822277] sidtab_entry_to_string+0x33/0x110 [ 1373.822295] security_sid_to_context_core+0x350/0x620 [ 1373.822314] selinux_inode_init_security+0x432/0x650 [ 1373.822334] ? __pfx_selinux_inode_init_security+0x10/0x10 [ 1373.822350] ? trace_kmalloc+0x1f/0xb0 [ 1373.822366] ? current_umask+0x12/0x80 [ 1373.822384] ? posix_acl_create.part.0+0x2a0/0x480 [ 1373.822400] ? security_inode_init_security+0x113/0x370 [ 1373.822419] security_inode_init_security+0x1bc/0x370 [ 1373.822433] ? __pfx_ext4_initxattrs+0x10/0x10 [ 1373.822449] ? __pfx_security_inode_init_security+0x10/0x10 [ 1373.822466] ? crc32c+0x1ae/0x350 [ 1373.822481] __ext4_new_inode+0x3452/0x4d70 [ 1373.822512] ? __pfx___ext4_new_inode+0x10/0x10 [ 1373.822535] ? __pfx___dquot_initialize+0x10/0x10 [ 1373.822558] ext4_mkdir+0x331/0xb30 [ 1373.822580] ? __pfx_ext4_mkdir+0x10/0x10 [ 1373.822593] ? security_inode_permission+0x72/0xe0 [ 1373.822616] vfs_mkdir+0x59a/0x8d0 [ 1373.822633] do_mkdirat+0x19f/0x3d0 [ 1373.822652] ? __pfx_do_mkdirat+0x10/0x10 [ 1373.822676] __x64_sys_mkdir+0xf3/0x140 [ 1373.822693] do_syscall_64+0xbf/0x390 [ 1373.822714] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1373.822727] RIP: 0033:0x7fd2e6304c27 [ 1373.822737] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1373.822748] RSP: 002b:00007fd2e387afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1373.822760] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6304c27 [ 1373.822768] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1373.822776] RBP: 00007fd2e387b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1373.822784] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1373.822792] R13: 0000000020000100 R14: 00007fd2e387b000 R15: 0000000020013c00 [ 1373.822813] 01:57:15 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380005001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1373.860211] loop5: detected capacity change from 0 to 512 [ 1373.860751] FAULT_INJECTION: forcing a failure. [ 1373.860751] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.860830] CPU: 0 UID: 0 PID: 10259 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1373.860846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1373.860854] Call Trace: [ 1373.860858] [ 1373.860863] dump_stack_lvl+0xfa/0x120 [ 1373.860896] should_fail_ex+0x4d7/0x5e0 [ 1373.860925] should_failslab+0xc2/0x120 [ 1373.860948] __kmalloc_noprof+0xcd/0x680 [ 1373.860968] ? mark_held_locks+0x49/0x80 [ 1373.860986] ? ext4_find_extent+0x7f5/0xa00 [ 1373.861003] ext4_find_extent+0x7f5/0xa00 [ 1373.861020] ext4_ext_map_blocks+0x1cc/0x5f70 [ 1373.861047] ? perf_trace_lock_acquire+0xc9/0x700 [ 1373.861066] ? perf_trace_lock_acquire+0xc9/0x700 [ 1373.861086] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1373.861115] ? lock_acquire+0x15e/0x2f0 [ 1373.861130] ? ext4_map_blocks+0x55b/0x14a0 [ 1373.861156] ? down_write+0x119/0x1f0 [ 1373.861175] ? __pfx_down_write+0x10/0x10 [ 1373.861192] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1373.861214] ext4_map_blocks+0x624/0x14a0 [ 1373.861234] ? __up_read+0x197/0x750 [ 1373.861253] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1373.861269] ? __pfx___up_read+0x10/0x10 [ 1373.861289] ? lock_release+0xc8/0x290 [ 1373.861310] ? ext4_map_blocks+0x1e0/0x14a0 [ 1373.861332] ext4_getblk+0x682/0x8e0 [ 1373.861350] ? __pfx_ext4_getblk+0x10/0x10 [ 1373.861365] ? __pfx_security_inode_init_security+0x10/0x10 [ 1373.861384] ? crc32c+0x1ae/0x350 [ 1373.861400] ext4_bread+0x2e/0x1a0 [ 1373.861419] ext4_append+0x224/0x530 [ 1373.861440] ? __pfx_ext4_append+0x10/0x10 [ 1373.861460] ? __pfx___ext4_new_inode+0x10/0x10 [ 1373.861485] ext4_init_new_dir+0x13c/0x240 [ 1373.861499] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1373.861520] ext4_mkdir+0x3c5/0xb30 [ 1373.861538] ? __pfx_ext4_mkdir+0x10/0x10 [ 1373.861551] ? security_inode_permission+0x72/0xe0 [ 1373.861584] vfs_mkdir+0x59a/0x8d0 [ 1373.861602] do_mkdirat+0x19f/0x3d0 [ 1373.861620] ? __pfx_do_mkdirat+0x10/0x10 [ 1373.861643] __x64_sys_mkdir+0xf3/0x140 [ 1373.861660] do_syscall_64+0xbf/0x390 [ 1373.861680] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1373.861693] RIP: 0033:0x7f1b64b60c27 [ 1373.861702] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1373.861714] RSP: 002b:00007f1b620d6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1373.861726] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b60c27 [ 1373.861735] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1373.861742] RBP: 00007f1b620d7040 R08: 0000000000000000 R09: ffffffffffffffff [ 1373.861750] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1373.861757] R13: 0000000020000100 R14: 00007f1b620d7000 R15: 0000000020013c00 [ 1373.861778] [ 1373.861848] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1373.861861] EXT4-fs (loop7): group descriptors corrupted! 01:57:16 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0x0, 0x8, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x4fc481) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r3, 0x0, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) dup2(r0, r4) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000140)) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r1, 0x0) 01:57:25 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 64) 01:57:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x20, r1, 0x1, 0x0, 0x0, {0x8}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x1c8, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x160, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x20}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x46}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x87d}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8}}}]}}]}, 0x1c8}, 0x1, 0x0, 0x0, 0x488c8}, 0x20040040) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r5) r7 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r7, r5, r6, 0x0) 01:57:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 70) 01:57:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 62) 01:57:25 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380006001200010e000000000000000028001a"], 0x38}}, 0x0) 01:57:25 executing program 4: perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) add_key$user(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000280)="26b631d673ee7415f8bbf2210a2f2ba414431f89843e08959ec029caf872908e66bce2f642af3e2d8877dc12f90494ae263b7ef99076311f53afff4511f1674e44a692f3f305657bc46ed734b9e9aed5818c0139ecfc9f234784c87cfabb3d17ffabbc1290962bab99b7be5d5c84", 0x6e, r3) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:57:25 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) r1 = socket$packet(0x11, 0x3, 0x300) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, 0x3, 0x8, 0x201, 0x0, 0x0, {0xc}, [@CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x37}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xe54}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x4}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88e5}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x80) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'gre0\x00', {0x2, 0x0, @loopback}}) [ 1383.308645] Process accounting resumed 01:57:25 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380007001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1383.356801] loop5: detected capacity change from 0 to 512 [ 1383.359087] loop7: detected capacity change from 0 to 512 [ 1383.380371] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1383.382239] loop2: detected capacity change from 0 to 512 [ 1383.382247] EXT4-fs (loop7): group descriptors corrupted! [ 1383.386479] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1383.388134] EXT4-fs (loop5): group descriptors corrupted! [ 1383.420981] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1383.422620] EXT4-fs (loop2): group descriptors corrupted! 01:57:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 71) 01:57:37 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r2, 0x0) add_key$user(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000280)="c50558c184cbb4a0c83ced02e5152e960e8861892e996f79c6", 0x19, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r0, r4, 0x0) 01:57:37 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) 01:57:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 63) 01:57:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r0, 0x0) 01:57:37 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380008001200010e000000000000000028001a"], 0x38}}, 0x0) 01:57:37 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 65) 01:57:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000340), &(0x7f0000000380)={'fscrypt:', @desc3}, &(0x7f00000003c0)={0x0, "17bda1d613cfbcfc2b62918dd9633b9eed040bfdec178c9b8ce5b0477dee6adb61c913cc8b6c7ef958c16f9ffd2b51323d98494870fc48ca02e32808774bb0e9", 0x1c}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r2, r4, 0x0) keyctl$revoke(0x3, r4) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r4, 0x0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000280)="b8d2da265502eddd11bcc157d9b49da00acfc7678a8d6ee9cf96c04ac2b1b1e04cf450914df4e21729fec8d62ff903b1aa7c10c9781f1dec93096205a7d600a175d1db66404c483882b3e7698b11ada522232fb158d23de5baae67025c07dd356719618620d0e5928c16c9c8b4914e9e723467a11398129fb6b40034a6089ef2edecae94546e3726d6d35ba1fab2f32058e1857cf24732a02cfabe55c9ef64e34e", 0xa1, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r6 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r7 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r7, r0, r6, 0x0) keyctl$read(0xb, r3, &(0x7f0000000440)=""/179, 0xb3) [ 1395.130324] loop7: detected capacity change from 0 to 512 [ 1395.136336] FAULT_INJECTION: forcing a failure. [ 1395.136336] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.137377] CPU: 0 UID: 0 PID: 10318 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1395.137394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1395.137401] Call Trace: [ 1395.137406] [ 1395.137410] dump_stack_lvl+0xfa/0x120 [ 1395.137432] should_fail_ex+0x4d7/0x5e0 [ 1395.137447] ? vfs_mkdir+0x59a/0x8d0 [ 1395.137463] should_failslab+0xc2/0x120 [ 1395.137481] __kmalloc_node_track_caller_noprof+0xc6/0x690 [ 1395.137497] ? sidtab_sid2str_get+0x85/0x6f0 [ 1395.137514] ? sidtab_sid2str_get+0x17e/0x6f0 [ 1395.137534] kmemdup_noprof+0x2b/0x60 [ 1395.137553] sidtab_sid2str_get+0x17e/0x6f0 [ 1395.137573] sidtab_entry_to_string+0x33/0x110 [ 1395.137591] security_sid_to_context_core+0x350/0x620 [ 1395.137609] selinux_inode_init_security+0x432/0x650 [ 1395.137628] ? __pfx_selinux_inode_init_security+0x10/0x10 [ 1395.137644] ? trace_kmalloc+0x1f/0xb0 [ 1395.137660] ? current_umask+0x12/0x80 [ 1395.137677] ? posix_acl_create.part.0+0x2a0/0x480 [ 1395.137693] ? security_inode_init_security+0x113/0x370 [ 1395.137712] security_inode_init_security+0x1bc/0x370 [ 1395.137725] ? __pfx_ext4_initxattrs+0x10/0x10 [ 1395.137741] ? __pfx_security_inode_init_security+0x10/0x10 [ 1395.137757] ? crc32c+0x1ae/0x350 [ 1395.137772] __ext4_new_inode+0x3452/0x4d70 [ 1395.137803] ? __pfx___ext4_new_inode+0x10/0x10 [ 1395.137825] ? __pfx___dquot_initialize+0x10/0x10 [ 1395.137848] ext4_mkdir+0x331/0xb30 [ 1395.137870] ? __pfx_ext4_mkdir+0x10/0x10 [ 1395.137882] ? security_inode_permission+0x72/0xe0 [ 1395.137905] vfs_mkdir+0x59a/0x8d0 [ 1395.137922] do_mkdirat+0x19f/0x3d0 [ 1395.137940] ? __pfx_do_mkdirat+0x10/0x10 [ 1395.137963] __x64_sys_mkdir+0xf3/0x140 [ 1395.137981] do_syscall_64+0xbf/0x390 [ 1395.138002] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1395.138015] RIP: 0033:0x7f94bafeec27 [ 1395.138024] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1395.138037] RSP: 002b:00007f94b8564fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1395.138049] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafeec27 [ 1395.138057] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1395.138064] RBP: 00007f94b8565040 R08: 0000000000000000 R09: ffffffffffffffff [ 1395.138071] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1395.138079] R13: 0000000020000100 R14: 00007f94b8565000 R15: 0000000020013c00 [ 1395.138104] [ 1395.158639] loop5: detected capacity change from 0 to 512 [ 1395.159671] loop2: detected capacity change from 0 to 512 [ 1395.163747] FAULT_INJECTION: forcing a failure. [ 1395.163747] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.164855] CPU: 0 UID: 0 PID: 10323 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1395.164871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1395.164877] Call Trace: [ 1395.164881] [ 1395.164886] dump_stack_lvl+0xfa/0x120 [ 1395.164904] should_fail_ex+0x4d7/0x5e0 [ 1395.164920] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 1395.164937] should_failslab+0xc2/0x120 [ 1395.164954] kmem_cache_alloc_noprof+0x80/0x690 [ 1395.164974] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 1395.164990] ext4_mb_new_blocks+0x2414/0x45b0 [ 1395.165015] ? kasan_save_track+0x14/0x30 [ 1395.165033] ? __kasan_kmalloc+0x7f/0x90 [ 1395.165050] ? trace_kmalloc+0x1f/0xb0 [ 1395.165065] ? __kmalloc_noprof+0x274/0x680 [ 1395.165083] ? mark_held_locks+0x49/0x80 [ 1395.165105] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 1395.165124] ? ext4_ext_search_right+0x2e8/0xbd0 [ 1395.165136] ? ext4_inode_to_goal_block+0x323/0x430 [ 1395.165160] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 1395.165187] ? perf_trace_lock_acquire+0xc9/0x700 [ 1395.165204] ? perf_trace_lock_acquire+0xc9/0x700 [ 1395.165225] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1395.165248] ? lock_acquire+0x15e/0x2f0 [ 1395.165264] ? ext4_map_blocks+0x55b/0x14a0 [ 1395.165299] ? __pfx_down_write+0x10/0x10 [ 1395.165317] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1395.165339] ext4_map_blocks+0x624/0x14a0 [ 1395.165359] ? __up_read+0x197/0x750 [ 1395.165377] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1395.165393] ? __pfx___up_read+0x10/0x10 [ 1395.165415] ? lock_release+0xc8/0x290 [ 1395.165438] ? ext4_map_blocks+0x1e0/0x14a0 [ 1395.165460] ext4_getblk+0x682/0x8e0 [ 1395.165478] ? __pfx_ext4_getblk+0x10/0x10 [ 1395.165493] ? __pfx_security_inode_init_security+0x10/0x10 [ 1395.165509] ? crc32c+0x1ae/0x350 [ 1395.165525] ext4_bread+0x2e/0x1a0 [ 1395.165542] ext4_append+0x224/0x530 [ 1395.165563] ? __pfx_ext4_append+0x10/0x10 [ 1395.165583] ? __pfx___ext4_new_inode+0x10/0x10 [ 1395.165608] ext4_init_new_dir+0x13c/0x240 [ 1395.165621] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1395.165642] ext4_mkdir+0x3c5/0xb30 [ 1395.165660] ? __pfx_ext4_mkdir+0x10/0x10 [ 1395.165673] ? security_inode_permission+0x72/0xe0 [ 1395.165695] vfs_mkdir+0x59a/0x8d0 [ 1395.165712] do_mkdirat+0x19f/0x3d0 [ 1395.165729] ? __pfx_do_mkdirat+0x10/0x10 [ 1395.165753] __x64_sys_mkdir+0xf3/0x140 [ 1395.165770] do_syscall_64+0xbf/0x390 [ 1395.165790] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1395.165803] RIP: 0033:0x7f1b64b60c27 [ 1395.165812] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1395.165823] RSP: 002b:00007f1b620d6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1395.165835] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b60c27 [ 1395.165843] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1395.165850] RBP: 00007f1b620d7040 R08: 0000000000000000 R09: ffffffffffffffff [ 1395.165858] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1395.165865] R13: 0000000020000100 R14: 00007f1b620d7000 R15: 0000000020013c00 [ 1395.165886] [ 1395.167240] FAULT_INJECTION: forcing a failure. [ 1395.167240] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.217708] CPU: 1 UID: 0 PID: 10320 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1395.217742] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1395.217755] Call Trace: [ 1395.217763] 01:57:37 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380009001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1395.217773] dump_stack_lvl+0xfa/0x120 [ 1395.217811] should_fail_ex+0x4d7/0x5e0 [ 1395.217844] should_failslab+0xc2/0x120 [ 1395.217878] __kmalloc_noprof+0xcd/0x680 [ 1395.217913] ? find_held_lock+0x2b/0x80 [ 1395.217942] ? ext4_find_extent+0x7f5/0xa00 [ 1395.217974] ext4_find_extent+0x7f5/0xa00 [ 1395.218009] ext4_ext_map_blocks+0x1cc/0x5f70 [ 1395.218036] ? fs_reclaim_acquire+0xae/0x150 [ 1395.218069] ? lock_is_held_type+0x9e/0x120 [ 1395.218124] ? bdev_getblk+0xd6/0x660 [ 1395.218167] ? __pfx_ext4_ext_map_blocks+0x10/0x10 01:57:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 72) [ 1395.218199] ? perf_trace_lock_acquire+0xc9/0x700 [ 1395.218237] ? look_up_lock_class+0x56/0x150 [ 1395.218268] ? perf_trace_lock_acquire+0xc9/0x700 [ 1395.218301] ? register_lock_class+0x41/0x560 [ 1395.218341] ? __lock_acquire+0xc65/0x1b70 [ 1395.218393] ? lock_acquire+0x15e/0x2f0 [ 1395.218424] ? ext4_map_blocks+0x49f/0x14a0 [ 1395.218465] ext4_map_query_blocks+0x117/0x890 [ 1395.218499] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 1395.218529] ? __pfx_down_read+0x10/0x10 [ 1395.218564] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1395.218606] ext4_map_blocks+0x4b3/0x14a0 [ 1395.218650] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1395.218682] ? __pfx_ext4_initxattrs+0x10/0x10 [ 1395.218710] ? __pfx_security_inode_init_security+0x10/0x10 [ 1395.218743] ? crc32c+0x1ae/0x350 [ 1395.218766] ? __brelse+0x7f/0xa0 [ 1395.218792] ? __ext4_new_inode+0x116/0x4d70 [ 1395.218835] ext4_append+0x1b6/0x530 [ 1395.218876] ? __pfx_ext4_append+0x10/0x10 [ 1395.218916] ? __pfx___ext4_new_inode+0x10/0x10 [ 1395.218966] ext4_init_new_dir+0x13c/0x240 [ 1395.218992] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1395.219034] ext4_mkdir+0x3c5/0xb30 [ 1395.219070] ? __pfx_ext4_mkdir+0x10/0x10 [ 1395.219096] ? security_inode_permission+0x72/0xe0 [ 1395.219140] vfs_mkdir+0x59a/0x8d0 [ 1395.219173] do_mkdirat+0x19f/0x3d0 01:57:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) r3 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)='\x00', 0xfffffffffffffffb) add_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r3) [ 1395.219209] ? __pfx_do_mkdirat+0x10/0x10 [ 1395.219255] __x64_sys_mkdir+0xf3/0x140 [ 1395.219290] do_syscall_64+0xbf/0x390 [ 1395.219328] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1395.219351] RIP: 0033:0x7fd2e6304c27 [ 1395.219370] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1395.219392] RSP: 002b:00007fd2e387afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1395.219415] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6304c27 [ 1395.219431] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1395.219445] RBP: 00007fd2e387b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1395.219460] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1395.219474] R13: 0000000020000100 R14: 00007fd2e387b000 R15: 0000000020013c00 [ 1395.219515] 01:57:37 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 66) [ 1395.303533] loop5: detected capacity change from 0 to 512 [ 1395.308883] FAULT_INJECTION: forcing a failure. [ 1395.308883] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.309813] CPU: 0 UID: 0 PID: 10332 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1395.309829] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1395.309837] Call Trace: [ 1395.309841] [ 1395.309846] dump_stack_lvl+0xfa/0x120 [ 1395.309868] should_fail_ex+0x4d7/0x5e0 [ 1395.309886] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 1395.309903] should_failslab+0xc2/0x120 [ 1395.309922] kmem_cache_alloc_noprof+0x80/0x690 [ 1395.309942] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 1395.309958] ext4_mb_new_blocks+0x2414/0x45b0 [ 1395.309984] ? kasan_save_track+0x14/0x30 [ 1395.310001] ? __kasan_kmalloc+0x7f/0x90 [ 1395.310018] ? trace_kmalloc+0x1f/0xb0 [ 1395.310034] ? __kmalloc_noprof+0x274/0x680 [ 1395.310053] ? mark_held_locks+0x49/0x80 [ 1395.310071] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 1395.310089] ? ext4_ext_search_right+0x2e8/0xbd0 [ 1395.310105] ? ext4_inode_to_goal_block+0x323/0x430 [ 1395.310129] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 1395.310156] ? perf_trace_lock_acquire+0xc9/0x700 [ 1395.310174] ? perf_trace_lock_acquire+0xc9/0x700 [ 1395.310195] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1395.310218] ? lock_acquire+0x15e/0x2f0 [ 1395.310234] ? ext4_map_blocks+0x55b/0x14a0 [ 1395.310262] ? __pfx_down_write+0x10/0x10 [ 1395.310280] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1395.310302] ext4_map_blocks+0x624/0x14a0 [ 1395.310322] ? __up_read+0x197/0x750 [ 1395.310340] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1395.310356] ? __pfx___up_read+0x10/0x10 [ 1395.310376] ? lock_release+0xc8/0x290 [ 1395.310397] ? ext4_map_blocks+0x1e0/0x14a0 [ 1395.310419] ext4_getblk+0x682/0x8e0 [ 1395.310436] ? __pfx_ext4_getblk+0x10/0x10 [ 1395.310451] ? __pfx_security_inode_init_security+0x10/0x10 [ 1395.310469] ? crc32c+0x1ae/0x350 [ 1395.310486] ext4_bread+0x2e/0x1a0 [ 1395.310504] ext4_append+0x224/0x530 [ 1395.310525] ? __pfx_ext4_append+0x10/0x10 [ 1395.310545] ? __pfx___ext4_new_inode+0x10/0x10 [ 1395.310571] ext4_init_new_dir+0x13c/0x240 [ 1395.310584] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1395.310606] ext4_mkdir+0x3c5/0xb30 [ 1395.310624] ? __pfx_ext4_mkdir+0x10/0x10 [ 1395.310636] ? security_inode_permission+0x72/0xe0 [ 1395.310659] vfs_mkdir+0x59a/0x8d0 [ 1395.310677] do_mkdirat+0x19f/0x3d0 [ 1395.310695] ? __pfx_do_mkdirat+0x10/0x10 [ 1395.310719] __x64_sys_mkdir+0xf3/0x140 [ 1395.310737] do_syscall_64+0xbf/0x390 [ 1395.310757] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1395.310770] RIP: 0033:0x7f1b64b60c27 [ 1395.310779] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1395.310791] RSP: 002b:00007f1b620d6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1395.310803] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b60c27 [ 1395.310812] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1395.310819] RBP: 00007f1b620d7040 R08: 0000000000000000 R09: ffffffffffffffff [ 1395.310826] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1395.310834] R13: 0000000020000100 R14: 00007f1b620d7000 R15: 0000000020013c00 [ 1395.310855] 01:57:37 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x81, 0x1f, 0x4, 0xa6, 0x0, 0x2, 0x43102, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xc6f, 0x5, @perf_bp={&(0x7f00000003c0), 0x8}, 0x1080, 0x80000000, 0xffffffff, 0xf, 0x200, 0x1f, 0xf5, 0x0, 0x3}, 0x0, 0x7, r0, 0x0) r3 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x8, 0x1, 0xd9, 0x4, 0x0, 0x7, 0x4, 0xa, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x80, 0x9}, 0x8000, 0x4, 0x0, 0x3, 0x3f, 0x10001, 0x0, 0x0, 0xffff94c4, 0x0, 0x66}, r3, 0xd, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r5 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r6, 0x0, 0x0) dup(r6) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)='syz', r5) r7 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r7, r1, r4, 0x0) 01:57:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r4) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0xa9, 0x1, 0x7, 0x0, 0x0, 0x8, 0x2201, 0x7, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000400)}, 0x200, 0xfffffffffffffb47, 0x5, 0x1, 0xffffffff, 0x3ff, 0x8f1, 0x0, 0x5, 0x0, 0xdee8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r4) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r6, r4, r5, 0x0) add_key$user(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)="e3c553b55b0e69a5297816a6a7250fc5515e974e1e8a4348d93bb3afbd191b8e225e015ad185a5a3de09bb8313506742981e74ba090fb3712f1757438140a9af512d1e4dce9fef439ee6d514eefb7190cb548ea9cf5415c253d0261ce5850bff840625e8b05c1083719a1e97", 0x6c, r6) r7 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r7, r2, r3, 0x0) r8 = add_key(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000280)="1808ba1cd30de0a17ea794307371e259dd99c18c627444916c251fe28f3a446369fbdf948a4ecc3515045090da81c588386e1fed2b80d6aabc5453a73cfbb48aa2989bdba4", 0x45, r1) keyctl$KEYCTL_MOVE(0x1e, 0x0, r7, r8, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) [ 1395.403236] loop7: detected capacity change from 0 to 512 [ 1395.404370] FAULT_INJECTION: forcing a failure. [ 1395.404370] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.405593] CPU: 0 UID: 0 PID: 10340 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1395.405610] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1395.405617] Call Trace: [ 1395.405622] [ 1395.405626] dump_stack_lvl+0xfa/0x120 [ 1395.405649] should_fail_ex+0x4d7/0x5e0 [ 1395.405667] ? __es_insert_extent+0xed2/0x1370 [ 1395.405682] should_failslab+0xc2/0x120 [ 1395.405701] kmem_cache_alloc_noprof+0x80/0x690 [ 1395.405716] ? do_syscall_64+0xbf/0x390 [ 1395.405739] ? __es_insert_extent+0xed2/0x1370 [ 1395.405752] __es_insert_extent+0xed2/0x1370 [ 1395.405768] ? __pfx_do_raw_write_lock+0x10/0x10 [ 1395.405789] ext4_es_insert_extent+0x4d0/0x1100 [ 1395.405812] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 1395.405828] ? __pfx_perf_trace_lock+0x10/0x10 [ 1395.405849] ? lock_acquire+0x15e/0x2f0 [ 1395.405867] ? find_held_lock+0x2b/0x80 [ 1395.405881] ? ext4_es_find_extent_range+0x1cf/0x510 [ 1395.405896] ? lock_release+0xc8/0x290 [ 1395.405914] ? do_raw_read_unlock+0x44/0xe0 [ 1395.405931] ext4_ext_map_blocks+0x178d/0x5f70 [ 1395.405959] ? bdev_getblk+0xd6/0x660 [ 1395.405982] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1395.405998] ? perf_trace_lock_acquire+0xc9/0x700 [ 1395.406017] ? look_up_lock_class+0x56/0x150 [ 1395.406036] ? perf_trace_lock_acquire+0xc9/0x700 [ 1395.406053] ? register_lock_class+0x41/0x560 [ 1395.406074] ? __lock_acquire+0xc65/0x1b70 [ 1395.406105] ? lock_acquire+0x15e/0x2f0 [ 1395.406120] ? ext4_map_blocks+0x49f/0x14a0 [ 1395.406143] ext4_map_query_blocks+0x117/0x890 [ 1395.406162] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 1395.406177] ? __pfx_down_read+0x10/0x10 [ 1395.406195] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1395.406217] ext4_map_blocks+0x4b3/0x14a0 [ 1395.406239] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1395.406254] ? __pfx_ext4_initxattrs+0x10/0x10 [ 1395.406269] ? __pfx_security_inode_init_security+0x10/0x10 [ 1395.406287] ? crc32c+0x1ae/0x350 [ 1395.406300] ? __brelse+0x7f/0xa0 [ 1395.406313] ? __ext4_new_inode+0x116/0x4d70 [ 1395.406335] ext4_append+0x1b6/0x530 [ 1395.406357] ? __pfx_ext4_append+0x10/0x10 [ 1395.406377] ? __pfx___ext4_new_inode+0x10/0x10 [ 1395.406402] ext4_init_new_dir+0x13c/0x240 [ 1395.406416] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1395.406438] ext4_mkdir+0x3c5/0xb30 [ 1395.406456] ? __pfx_ext4_mkdir+0x10/0x10 [ 1395.406469] ? security_inode_permission+0x72/0xe0 [ 1395.406491] vfs_mkdir+0x59a/0x8d0 [ 1395.406509] do_mkdirat+0x19f/0x3d0 [ 1395.406528] ? __pfx_do_mkdirat+0x10/0x10 [ 1395.406551] __x64_sys_mkdir+0xf3/0x140 [ 1395.406569] do_syscall_64+0xbf/0x390 [ 1395.406588] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1395.406600] RIP: 0033:0x7f94bafeec27 [ 1395.406610] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1395.406622] RSP: 002b:00007f94b8564fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1395.406634] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafeec27 [ 1395.406642] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1395.406649] RBP: 00007f94b8565040 R08: 0000000000000000 R09: ffffffffffffffff [ 1395.406657] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1395.406664] R13: 0000000020000100 R14: 00007f94b8565000 R15: 0000000020013c00 [ 1395.406684] 01:57:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 73) [ 1395.495738] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1395.496679] EXT4-fs (loop7): group descriptors corrupted! 01:57:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 64) [ 1395.533695] loop5: detected capacity change from 0 to 512 [ 1395.538579] FAULT_INJECTION: forcing a failure. [ 1395.538579] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.539511] CPU: 0 UID: 0 PID: 10349 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1395.539528] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1395.539536] Call Trace: [ 1395.539540] [ 1395.539545] dump_stack_lvl+0xfa/0x120 [ 1395.539568] should_fail_ex+0x4d7/0x5e0 [ 1395.539587] should_failslab+0xc2/0x120 [ 1395.539605] __kmalloc_noprof+0xcd/0x680 [ 1395.539629] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1395.539648] ? ext4_find_extent+0x7f5/0xa00 [ 1395.539665] ext4_find_extent+0x7f5/0xa00 [ 1395.539679] ? mark_held_locks+0x49/0x80 [ 1395.539699] ext4_ext_map_blocks+0x1cc/0x5f70 [ 1395.539716] ? trace_sched_exit_tp+0xbf/0x100 [ 1395.539738] ? perf_trace_lock_acquire+0xc9/0x700 [ 1395.539756] ? __pfx___schedule+0x10/0x10 [ 1395.539775] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1395.539799] ? lock_acquire+0x15e/0x2f0 [ 1395.539814] ? ext4_map_blocks+0x55b/0x14a0 [ 1395.539840] ? down_write+0x119/0x1f0 [ 1395.539858] ? __pfx_down_write+0x10/0x10 [ 1395.539874] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1395.539896] ext4_map_blocks+0x624/0x14a0 [ 1395.539916] ? __up_read+0x197/0x750 [ 1395.539935] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1395.539950] ? __pfx___up_read+0x10/0x10 [ 1395.539970] ? lock_release+0xc8/0x290 [ 1395.539991] ? ext4_map_blocks+0x1e0/0x14a0 [ 1395.540013] ext4_getblk+0x682/0x8e0 [ 1395.540031] ? __pfx_ext4_getblk+0x10/0x10 [ 1395.540045] ? __pfx_security_inode_init_security+0x10/0x10 [ 1395.540064] ? crc32c+0x1ae/0x350 [ 1395.540081] ext4_bread+0x2e/0x1a0 [ 1395.540099] ext4_append+0x224/0x530 [ 1395.540120] ? __pfx_ext4_append+0x10/0x10 [ 1395.540140] ? __pfx___ext4_new_inode+0x10/0x10 [ 1395.540166] ext4_init_new_dir+0x13c/0x240 [ 1395.540179] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1395.540200] ext4_mkdir+0x3c5/0xb30 [ 1395.540219] ? __pfx_ext4_mkdir+0x10/0x10 [ 1395.540231] ? security_inode_permission+0x72/0xe0 [ 1395.540254] vfs_mkdir+0x59a/0x8d0 [ 1395.540272] do_mkdirat+0x19f/0x3d0 [ 1395.540291] ? __pfx_do_mkdirat+0x10/0x10 [ 1395.540315] __x64_sys_mkdir+0xf3/0x140 [ 1395.540332] do_syscall_64+0xbf/0x390 [ 1395.540352] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1395.540365] RIP: 0033:0x7f1b64b60c27 [ 1395.540374] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1395.540386] RSP: 002b:00007f1b620d6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1395.540398] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b60c27 [ 1395.540406] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1395.540414] RBP: 00007f1b620d7040 R08: 0000000000000000 R09: ffffffffffffffff [ 1395.540421] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1395.540428] R13: 0000000020000100 R14: 00007f1b620d7000 R15: 0000000020013c00 [ 1395.540449] 01:57:37 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000a001200010e000000000000000028001a"], 0x38}}, 0x0) 01:57:37 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 67) 01:57:37 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) sendto$packet(r1, &(0x7f00000000c0)="9b3735842d03e8d7aab69a0b4304060a997aec5888c10f0ea300799178512d4fe30e01a07c871e2f48a600fe97339a3ce55ac00ee38462ad6827bbd6598a93a52e43d97e209a5eb51b9e8935b60f3824834939e952147f851527760136724688a016c41aefc05dbff2cd4c62a3e0c610a41752e1686f690c30", 0x79, 0x20004140, 0x0, 0x0) 01:57:37 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)=0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xcd, 0x1, 0x7, 0x0, 0x0, 0x7, 0x38012, 0xe, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x400, 0x4, @perf_config_ext={0x80000000, 0x6}, 0x8000, 0x80, 0x20, 0x8, 0x5, 0x408, 0x3f, 0x0, 0xe75f, 0x0, 0x7fff}, r0, 0x7, 0xffffffffffffffff, 0xb) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) syz_genetlink_get_family_id$team(&(0x7f0000000580), 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, r3) r4 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='-\n/^\x00', 0xfffffffffffffff8) keyctl$reject(0x13, r1, 0x5, 0x0, r4) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r2, 0x0) add_key$user(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000280)="384fc22a7696af247f5eead61949be3c54d20fd439aef6492a814ce949ef25a159397306a155", 0x26, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)="3f90078ecbd56b165992947f5467454e88bd81b49659fb", 0x17, 0xfffffffffffffff9) [ 1395.630214] loop2: detected capacity change from 0 to 512 01:57:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 74) [ 1395.654206] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1395.656308] EXT4-fs (loop2): group descriptors corrupted! [ 1395.677808] loop7: detected capacity change from 0 to 512 [ 1395.685984] FAULT_INJECTION: forcing a failure. [ 1395.685984] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.687740] CPU: 1 UID: 0 PID: 10363 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1395.687772] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1395.687786] Call Trace: [ 1395.687794] [ 1395.687804] dump_stack_lvl+0xfa/0x120 [ 1395.687843] should_fail_ex+0x4d7/0x5e0 [ 1395.687878] should_failslab+0xc2/0x120 [ 1395.687913] __kmalloc_noprof+0xcd/0x680 [ 1395.687952] ? mark_held_locks+0x49/0x80 [ 1395.687984] ? ext4_find_extent+0x7f5/0xa00 [ 1395.688017] ext4_find_extent+0x7f5/0xa00 [ 1395.688053] ext4_ext_map_blocks+0x1cc/0x5f70 [ 1395.688113] ? perf_trace_lock_acquire+0xc9/0x700 [ 1395.688148] ? perf_trace_lock_acquire+0xc9/0x700 [ 1395.688188] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1395.688234] ? lock_acquire+0x15e/0x2f0 [ 1395.688266] ? ext4_map_blocks+0x55b/0x14a0 [ 1395.688316] ? down_write+0x119/0x1f0 [ 1395.688352] ? __pfx_down_write+0x10/0x10 [ 1395.688384] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1395.688428] ext4_map_blocks+0x624/0x14a0 [ 1395.688467] ? __up_read+0x197/0x750 [ 1395.688504] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1395.688535] ? __pfx___up_read+0x10/0x10 [ 1395.688574] ? lock_release+0xc8/0x290 [ 1395.688615] ? ext4_map_blocks+0x1e0/0x14a0 [ 1395.688659] ext4_getblk+0x682/0x8e0 [ 1395.688694] ? __pfx_ext4_getblk+0x10/0x10 [ 1395.688724] ? __pfx_security_inode_init_security+0x10/0x10 [ 1395.688759] ? crc32c+0x1ae/0x350 [ 1395.688792] ext4_bread+0x2e/0x1a0 [ 1395.688827] ext4_append+0x224/0x530 [ 1395.688868] ? __pfx_ext4_append+0x10/0x10 [ 1395.688907] ? __pfx___ext4_new_inode+0x10/0x10 [ 1395.688958] ext4_init_new_dir+0x13c/0x240 [ 1395.688984] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1395.689026] ext4_mkdir+0x3c5/0xb30 [ 1395.689063] ? __pfx_ext4_mkdir+0x10/0x10 [ 1395.689088] ? security_inode_permission+0x72/0xe0 [ 1395.689133] vfs_mkdir+0x59a/0x8d0 [ 1395.689166] do_mkdirat+0x19f/0x3d0 [ 1395.689203] ? __pfx_do_mkdirat+0x10/0x10 [ 1395.689250] __x64_sys_mkdir+0xf3/0x140 [ 1395.689298] do_syscall_64+0xbf/0x390 [ 1395.689337] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1395.689362] RIP: 0033:0x7f94bafeec27 [ 1395.689380] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1395.689403] RSP: 002b:00007f94b8564fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1395.689427] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafeec27 [ 1395.689443] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1395.689457] RBP: 00007f94b8565040 R08: 0000000000000000 R09: ffffffffffffffff [ 1395.689472] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1395.689485] R13: 0000000020000100 R14: 00007f94b8565000 R15: 0000000020013c00 [ 1395.689526] [ 1395.717966] loop5: detected capacity change from 0 to 512 [ 1395.765521] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1395.766394] EXT4-fs (loop5): group descriptors corrupted! 01:57:37 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000b001200010e000000000000000028001a"], 0x38}}, 0x0) 01:57:37 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:57:48 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000f001200010e000000000000000028001a"], 0x38}}, 0x0) 01:57:48 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'nr0\x00', &(0x7f00000000c0)=@ethtool_rx_ntuple={0x35, {0x5, @tcp_ip4_spec={@multicast1, @rand_addr=0x64010102, 0x4e22, 0x4e23, 0x4}, @hdata="b0342613701a5eefcd1a3dc32a83bdaa285200408f71da5092dbbfe65e74b5289dbada2af001c8451c86607a62737f611dbc9cc47dded2d15d5ad3023b14ab9d6475591cb35f8ff7", 0x6, 0x9, 0x8, 0x81, 0xffffffffffffffff}}}) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) 01:57:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 75) 01:57:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 65) 01:57:48 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000280)='big_key\x00', &(0x7f00000002c0)={'syz', 0x0}, r0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r1) 01:57:48 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 68) 01:57:48 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 1406.932863] loop2: detected capacity change from 0 to 512 [ 1406.936605] loop5: detected capacity change from 0 to 512 [ 1406.938352] FAULT_INJECTION: forcing a failure. [ 1406.938352] name failslab, interval 1, probability 0, space 0, times 0 [ 1406.939617] CPU: 0 UID: 0 PID: 10401 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1406.939634] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1406.939643] Call Trace: [ 1406.939647] [ 1406.939652] dump_stack_lvl+0xfa/0x120 [ 1406.939677] should_fail_ex+0x4d7/0x5e0 [ 1406.939692] ? vfs_mkdir+0x59a/0x8d0 [ 1406.939710] should_failslab+0xc2/0x120 [ 1406.939729] __kmalloc_node_track_caller_noprof+0xc6/0x690 [ 1406.939746] ? sidtab_sid2str_get+0x85/0x6f0 [ 1406.939764] ? sidtab_sid2str_get+0x17e/0x6f0 [ 1406.939784] kmemdup_noprof+0x2b/0x60 [ 1406.939804] sidtab_sid2str_get+0x17e/0x6f0 [ 1406.939824] sidtab_entry_to_string+0x33/0x110 [ 1406.939842] security_sid_to_context_core+0x350/0x620 [ 1406.939861] selinux_inode_init_security+0x432/0x650 [ 1406.939881] ? __pfx_selinux_inode_init_security+0x10/0x10 [ 1406.939898] ? trace_kmalloc+0x1f/0xb0 [ 1406.939914] ? current_umask+0x12/0x80 [ 1406.939932] ? posix_acl_create.part.0+0x2a0/0x480 [ 1406.939948] ? security_inode_init_security+0x113/0x370 [ 1406.939968] security_inode_init_security+0x1bc/0x370 [ 1406.939982] ? __pfx_ext4_initxattrs+0x10/0x10 [ 1406.939998] ? __pfx_security_inode_init_security+0x10/0x10 [ 1406.940015] ? crc32c+0x1ae/0x350 [ 1406.940031] __ext4_new_inode+0x3452/0x4d70 [ 1406.940063] ? __pfx___ext4_new_inode+0x10/0x10 [ 1406.940085] ? __pfx___dquot_initialize+0x10/0x10 [ 1406.940114] ext4_mkdir+0x331/0xb30 [ 1406.940138] ? __pfx_ext4_mkdir+0x10/0x10 [ 1406.940154] ? security_inode_permission+0x72/0xe0 [ 1406.940178] vfs_mkdir+0x59a/0x8d0 [ 1406.940194] do_mkdirat+0x19f/0x3d0 [ 1406.940213] ? __pfx_do_mkdirat+0x10/0x10 [ 1406.940237] __x64_sys_mkdir+0xf3/0x140 [ 1406.940255] do_syscall_64+0xbf/0x390 [ 1406.940277] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1406.940290] RIP: 0033:0x7fd2e6304c27 [ 1406.940300] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1406.940313] RSP: 002b:00007fd2e387afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1406.940325] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6304c27 [ 1406.940333] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1406.940341] RBP: 00007fd2e387b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1406.940349] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1406.940357] R13: 0000000020000100 R14: 00007fd2e387b000 R15: 0000000020013c00 [ 1406.940378] [ 1406.940811] loop7: detected capacity change from 0 to 512 [ 1406.971033] FAULT_INJECTION: forcing a failure. [ 1406.971033] name failslab, interval 1, probability 0, space 0, times 0 [ 1406.975167] CPU: 0 UID: 0 PID: 10403 Comm: syz-executor.5 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1406.975184] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1406.975192] Call Trace: [ 1406.975197] [ 1406.975202] dump_stack_lvl+0xfa/0x120 [ 1406.975226] should_fail_ex+0x4d7/0x5e0 [ 1406.975245] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 1406.975260] should_failslab+0xc2/0x120 [ 1406.975280] kmem_cache_alloc_noprof+0x80/0x690 [ 1406.975293] ? fs_reclaim_acquire+0xae/0x150 [ 1406.975315] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 1406.975328] jbd2_journal_add_journal_head+0x367/0x5d0 [ 1406.975344] jbd2_journal_get_create_access+0x44/0x560 [ 1406.975362] ? lock_is_held_type+0x9e/0x120 [ 1406.975383] __ext4_journal_get_create_access+0x54/0x1b0 [ 1406.975407] ext4_getblk+0x3c9/0x8e0 [ 1406.975427] ? __pfx_ext4_getblk+0x10/0x10 [ 1406.975442] ? __pfx_security_inode_init_security+0x10/0x10 [ 1406.975460] ? crc32c+0x1ae/0x350 [ 1406.975478] ext4_bread+0x2e/0x1a0 [ 1406.975495] ext4_append+0x224/0x530 [ 1406.975517] ? __pfx_ext4_append+0x10/0x10 [ 1406.975537] ? __pfx___ext4_new_inode+0x10/0x10 [ 1406.975563] ext4_init_new_dir+0x13c/0x240 [ 1406.975577] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1406.975598] ext4_mkdir+0x3c5/0xb30 [ 1406.975617] ? __pfx_ext4_mkdir+0x10/0x10 [ 1406.975630] ? security_inode_permission+0x72/0xe0 [ 1406.975654] vfs_mkdir+0x59a/0x8d0 [ 1406.975672] do_mkdirat+0x19f/0x3d0 [ 1406.975690] ? __pfx_do_mkdirat+0x10/0x10 [ 1406.975714] __x64_sys_mkdir+0xf3/0x140 [ 1406.975732] do_syscall_64+0xbf/0x390 [ 1406.975752] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1406.975766] RIP: 0033:0x7f1b64b60c27 [ 1406.975776] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1406.975788] RSP: 002b:00007f1b620d6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1406.975800] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1b64b60c27 [ 1406.975808] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1406.975816] RBP: 00007f1b620d7040 R08: 0000000000000000 R09: ffffffffffffffff [ 1406.975824] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1406.975832] R13: 0000000020000100 R14: 00007f1b620d7000 R15: 0000000020013c00 [ 1406.975852] [ 1406.975971] ENOMEM in journal_alloc_journal_head, retrying. [ 1406.992955] FAULT_INJECTION: forcing a failure. [ 1406.992955] name failslab, interval 1, probability 0, space 0, times 0 [ 1407.001479] CPU: 1 UID: 0 PID: 10405 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1407.001511] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1407.001524] Call Trace: [ 1407.001533] [ 1407.001542] dump_stack_lvl+0xfa/0x120 [ 1407.001582] should_fail_ex+0x4d7/0x5e0 [ 1407.001615] should_failslab+0xc2/0x120 [ 1407.001649] __kmalloc_noprof+0xcd/0x680 [ 1407.001685] ? mark_held_locks+0x49/0x80 [ 1407.001717] ? ext4_find_extent+0x7f5/0xa00 [ 1407.001749] ext4_find_extent+0x7f5/0xa00 [ 1407.001782] ext4_ext_map_blocks+0x1cc/0x5f70 [ 1407.001833] ? perf_trace_lock_acquire+0xc9/0x700 [ 1407.001866] ? perf_trace_lock_acquire+0xc9/0x700 [ 1407.001904] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1407.001948] ? lock_acquire+0x15e/0x2f0 [ 1407.001977] ? ext4_map_blocks+0x55b/0x14a0 [ 1407.002025] ? down_write+0x119/0x1f0 [ 1407.002059] ? __pfx_down_write+0x10/0x10 [ 1407.002090] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1407.002138] ext4_map_blocks+0x624/0x14a0 [ 1407.002175] ? __up_read+0x197/0x750 [ 1407.002209] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1407.002239] ? __pfx___up_read+0x10/0x10 [ 1407.002275] ? lock_release+0xc8/0x290 [ 1407.002315] ? ext4_map_blocks+0x1e0/0x14a0 [ 1407.002355] ext4_getblk+0x682/0x8e0 [ 1407.002388] ? __pfx_ext4_getblk+0x10/0x10 [ 1407.002415] ? __pfx_security_inode_init_security+0x10/0x10 [ 1407.002448] ? crc32c+0x1ae/0x350 [ 1407.002479] ext4_bread+0x2e/0x1a0 [ 1407.002511] ext4_append+0x224/0x530 [ 1407.002550] ? __pfx_ext4_append+0x10/0x10 [ 1407.002587] ? __pfx___ext4_new_inode+0x10/0x10 [ 1407.002634] ext4_init_new_dir+0x13c/0x240 [ 1407.002659] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1407.002701] ext4_mkdir+0x3c5/0xb30 [ 1407.002736] ? __pfx_ext4_mkdir+0x10/0x10 [ 1407.002760] ? security_inode_permission+0x72/0xe0 [ 1407.002801] vfs_mkdir+0x59a/0x8d0 [ 1407.002833] do_mkdirat+0x19f/0x3d0 [ 1407.002868] ? __pfx_do_mkdirat+0x10/0x10 [ 1407.002912] __x64_sys_mkdir+0xf3/0x140 [ 1407.002944] do_syscall_64+0xbf/0x390 [ 1407.002981] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1407.003004] RIP: 0033:0x7f94bafeec27 [ 1407.003022] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1407.003043] RSP: 002b:00007f94b8564fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1407.003065] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafeec27 [ 1407.003080] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1407.003093] RBP: 00007f94b8565040 R08: 0000000000000000 R09: ffffffffffffffff [ 1407.003107] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1407.003120] R13: 0000000020000100 R14: 00007f94b8565000 R15: 0000000020013c00 [ 1407.003160] [ 1407.093072] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1407.093989] EXT4-fs (loop5): group descriptors corrupted! 01:57:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 76) 01:57:59 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f0000000680)) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) r1 = syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xb2c, 0x2, &(0x7f0000000280)=[{&(0x7f00000000c0)="f2eb6b7ec45639e029eb0b2aaca9078c5d2fed8f6c7ca3dab700f57305cd5dea29dc9e4b95bdfc18ba5b2108e8f90b564e9c981b34acf1a3cff9ba6682cd8d457ea5c9ae945e78d24025c86c19040ebc866e611d03ce9bfde216f40d8fc868a25efcba54e0afc183b645f6c1aa9a4ae6872dbd27ef43dabb20873bae3bcf82a4f7e1f86ae9163bed2e38ecd4e086923baa4992f08f0b12ed3c6432a4c25e966a10841fddb77705b3c20a3292f737d83fd4befa7a4c9b952f422b0550a4c50a3da91ad1fafcbbbed75d9ffafe3248bc5bdb268a9eaced98f5739da944b4c85eb95d6d48f7f119de2ec939e00b61f393f867", 0x4a, 0x2}, {&(0x7f00000001c0)="0208165db7f2810ba45409fef864c1e1828d2704a0797471fc4dd473167c09e01f7a994c94514765f2d016313d2c03be9a00220a7111754378cb4735c4880193f652c0fa9f95f46f7fc6246349caf561edb93fcf2fc95b3ebbb9730c8fad38006f3ef89881a7dc80c0ccadec05a4165374577d266903fc93801122dab237f3d823fc4872429d32199f0cd833b725afb15307b5b5894f06b89bbdc6eb97e5a9341a60fd391cb53b4d0cdff8e0b6b7bd698e93bf4057e1b73b61", 0xb9, 0x9}], 0x8, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r2) close_range(r2, r1, 0x2) syz_io_uring_complete(0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r3, 0x0, 0x0) close_range(r0, r3, 0x0) write$bt_hci(r2, &(0x7f0000000340)={0x1, @write_sc_support={{0xc7a, 0x1}, {0x7}}}, 0x5) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x1ca42, 0x0) r5 = openat$incfs(r2, &(0x7f0000000300)='.pending_reads\x00', 0xc000, 0x80) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) preadv2(r4, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/151, 0x97}], 0x1, 0x7, 0x0, 0x12) 01:57:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 66) 01:57:59 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380010001200010e000000000000000028001a"], 0x38}}, 0x0) 01:57:59 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 69) 01:57:59 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000061080)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1f, "26dbb28c343087"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000062080)={0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000062280)={0x0, 0x0, "d6de1b6c267ed5269843e10b39c11e2d07c43fae766f321de30acbb7fd8c6d4431d663c308f3d0b50d1b90611e9b7a854bbb6052ffa2c2651d531957f6af084333a9e75c0a974bebf56e83d12af40921d5ff17114d6fdb1aea883b00ce82dbb24611a77ed9706aa26f27521663ae17b3b2288f60092d28a5fcbe27b83e9fc4640a57faf6457b1a64b53b547ad222c0236cb7464e6b8fd6a29ca76ce67462c130636bf9a1c7a90e55ef520a7df1fbc7402b0042f95dfe6a56c0e4490ae4cdc2e0ae2b0d356ff6be3b8d7af52353abf295a9348ec36b33ebd24d8a96b285eec27ddb5f2856898d856cc79dda13150b1befd258a899b615870961f2b5582c04341f", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000063280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "1bb05a59c8e09c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000064280)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000065480)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000065680)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r0}, {r2, r3}, {}, {}, {}, {}, {}, {r5, r6}, {0x0, r7}], 0x7, "70c6d8b2c5d315"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000048880)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000048a80)={{0x0, 0x9, 0xbba, 0x400, 0x7f, 0x2, 0x1f, 0x200, 0x7ff, 0x7, 0x1ff, 0x5, 0x5, 0xd8, 0xfffffffffffffffb}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049a80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x6f, "1cc83cc5392ca2"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f000004aa80)={{0x0, 0x7fff, 0x1, 0xffffffffffff0001, 0x2, 0x10000, 0x100000000, 0xffffffff, 0x400, 0x3f, 0x14f20, 0x400, 0x9, 0x40}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004ba80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004bc80)={0x3f, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {r8}, {r9, r10}, {r11, r12}], 0x9, "4ac64e857834ef"}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r13 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r13) r14 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r13) r15 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r15, r13, r14, 0x0) [ 1417.731692] loop5: detected capacity change from 0 to 512 [ 1417.737158] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1417.737992] EXT4-fs (loop5): group descriptors corrupted! 01:57:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x7b, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9}, 0x0, 0x10000000, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r1, r3, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r5) r7 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r8 = fork() perf_event_open(&(0x7f0000001680)={0x5, 0x80, 0x40, 0x8, 0x9, 0x81, 0x0, 0x7, 0x200, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0xa58a9f14a4dfcf69, @perf_bp={&(0x7f0000001640), 0x5}, 0x50004, 0x400, 0x7, 0x1, 0x76e69058, 0x5, 0x400, 0x0, 0x6, 0x0, 0x8}, r8, 0xb, r0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r7, r5, r6, 0x0) keyctl$revoke(0x3, r6) add_key(&(0x7f00000004c0)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x3}, &(0x7f0000000540)="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", 0x1000, r6) r9 = add_key$fscrypt_v1(&(0x7f00000003c0), &(0x7f0000000400)={'fscrypt:', @auto=[0x61, 0x62, 0x37, 0x39, 0x65, 0xb7ab7fb98a23b8d, 0x30, 0x32, 0x61, 0x37, 0x79, 0x39, 0x30, 0x37, 0x62, 0x30]}, &(0x7f0000000440)={0x0, "961cbc400416b0f43e34ba96f0db10535e00b0b66689933c2538f2bbff0456e6f319a27f0e85656c4af7fa32bf16359c8ede88dc24216e4bcd34163097ee13e6", 0x3f}, 0x48, 0xfffffffffffffff9) keyctl$search(0xa, r2, &(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x0}, r9) add_key$fscrypt_v1(&(0x7f0000001540), &(0x7f0000001580)={'fscrypt:', @desc1}, &(0x7f00000015c0)={0x0, "ab6f25926e316627f72c1f25dc75290ddce3442abc83db9f037d756478fa5168b4e0fd6da6cc1fdabb1c3e8a18d4cf0e478aa04cdcc032b9c5604c86a59bb36a", 0x33}, 0x48, 0xfffffffffffffffd) r10 = add_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000280)="f12dd98f1e2cbc46c678c2860556804c9f616717b6a3c6d5ff64c3ab1c3e7fb43ebdbba61d58a921f134fe2bacda220f3a8e5e9e467010b1e48ea04e5c8a0606c265c3a397e6839169da38be3a95346a79e641add239c1f73d356355588a5e2c784a6736e7db2bd425de4db1f61c892b2b75097b392a9cd03d0636cd0cf99867b723f3465208b0fa0d2429d8326a2df04757712d3d73c6ff7fd5cd", 0x9b, 0x0) keyctl$clear(0x7, r10) 01:57:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 77) [ 1417.784210] loop7: detected capacity change from 0 to 512 [ 1417.795172] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1417.796002] EXT4-fs (loop7): group descriptors corrupted! [ 1417.799789] loop2: detected capacity change from 0 to 512 [ 1417.805633] FAULT_INJECTION: forcing a failure. [ 1417.805633] name failslab, interval 1, probability 0, space 0, times 0 [ 1417.807526] CPU: 1 UID: 0 PID: 10429 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1417.807559] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1417.807573] Call Trace: [ 1417.807581] [ 1417.807590] dump_stack_lvl+0xfa/0x120 [ 1417.807630] should_fail_ex+0x4d7/0x5e0 [ 1417.807665] should_failslab+0xc2/0x120 [ 1417.807700] __kmalloc_noprof+0xcd/0x680 [ 1417.807735] ? find_held_lock+0x2b/0x80 [ 1417.807765] ? ext4_find_extent+0x7f5/0xa00 [ 1417.807798] ext4_find_extent+0x7f5/0xa00 [ 1417.807834] ext4_ext_map_blocks+0x1cc/0x5f70 [ 1417.807861] ? fs_reclaim_acquire+0xae/0x150 [ 1417.807893] ? lock_is_held_type+0x9e/0x120 [ 1417.807942] ? bdev_getblk+0xd6/0x660 [ 1417.807986] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1417.808018] ? perf_trace_lock_acquire+0xc9/0x700 [ 1417.808055] ? look_up_lock_class+0x56/0x150 [ 1417.808086] ? perf_trace_lock_acquire+0xc9/0x700 [ 1417.808128] ? register_lock_class+0x41/0x560 [ 1417.808168] ? __lock_acquire+0xc65/0x1b70 [ 1417.808220] ? lock_acquire+0x15e/0x2f0 [ 1417.808251] ? ext4_map_blocks+0x49f/0x14a0 [ 1417.808292] ext4_map_query_blocks+0x117/0x890 [ 1417.808326] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 1417.808356] ? __pfx_down_read+0x10/0x10 [ 1417.808392] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1417.808435] ext4_map_blocks+0x4b3/0x14a0 [ 1417.808479] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1417.808511] ? __pfx_ext4_initxattrs+0x10/0x10 [ 1417.808539] ? __pfx_security_inode_init_security+0x10/0x10 [ 1417.808574] ? crc32c+0x1ae/0x350 [ 1417.808598] ? __brelse+0x7f/0xa0 [ 1417.808625] ? __ext4_new_inode+0x116/0x4d70 [ 1417.808668] ext4_append+0x1b6/0x530 [ 1417.808709] ? __pfx_ext4_append+0x10/0x10 [ 1417.808749] ? __pfx___ext4_new_inode+0x10/0x10 [ 1417.808799] ext4_init_new_dir+0x13c/0x240 [ 1417.808826] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1417.808868] ext4_mkdir+0x3c5/0xb30 [ 1417.808905] ? __pfx_ext4_mkdir+0x10/0x10 [ 1417.808930] ? security_inode_permission+0x72/0xe0 [ 1417.808974] vfs_mkdir+0x59a/0x8d0 [ 1417.809008] do_mkdirat+0x19f/0x3d0 [ 1417.809060] ? __pfx_do_mkdirat+0x10/0x10 [ 1417.809107] __x64_sys_mkdir+0xf3/0x140 [ 1417.809142] do_syscall_64+0xbf/0x390 [ 1417.809181] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1417.809205] RIP: 0033:0x7fd2e6304c27 [ 1417.809224] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1417.809247] RSP: 002b:00007fd2e387afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1417.809270] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6304c27 [ 1417.809286] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1417.809301] RBP: 00007fd2e387b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1417.809316] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1417.809330] R13: 0000000020000100 R14: 00007fd2e387b000 R15: 0000000020013c00 [ 1417.809372] [ 1417.843221] loop5: detected capacity change from 0 to 512 [ 1417.873846] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1417.874724] EXT4-fs (loop5): group descriptors corrupted! 01:57:59 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 70) [ 1417.891446] Process accounting paused [ 1417.896421] loop6: detected capacity change from 0 to 5 [ 1417.910499] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 01:58:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 78) 01:58:00 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380011001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1417.919594] loop7: detected capacity change from 0 to 512 [ 1417.930303] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1417.931181] EXT4-fs (loop7): group descriptors corrupted! [ 1417.947707] loop6: detected capacity change from 0 to 5 [ 1417.953649] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 01:58:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 67) 01:58:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 71) [ 1417.992053] loop5: detected capacity change from 0 to 512 [ 1418.002763] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1418.003601] EXT4-fs (loop5): group descriptors corrupted! [ 1418.026553] loop7: detected capacity change from 0 to 512 01:58:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 79) [ 1418.042153] loop2: detected capacity change from 0 to 512 [ 1418.044535] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1418.045402] EXT4-fs (loop7): group descriptors corrupted! [ 1418.060710] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1418.061564] EXT4-fs (loop2): group descriptors corrupted! 01:58:00 executing program 6: prctl$PR_GET_TIMERSLACK(0x1e) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) 01:58:00 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380014001200010e000000000000000028001a"], 0x38}}, 0x0) 01:58:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 72) 01:58:00 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7b, 0x0, 0x1, 0x0, 0x0, 0x4d2, 0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x1, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000280)={r2, 0x0, r0, 0x20}) r3 = getpid() r4 = pidfd_open(r3, 0x0) copy_file_range(r4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000340)={0x0}) r6 = syz_io_uring_setup(0x3cfc, &(0x7f00000003c0)={0x0, 0xa5b8, 0x0, 0x1, 0x3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) io_uring_register$IORING_REGISTER_PROBE(r6, 0x8, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000080)={r5, 0x2, r6, 0xa0}) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r7, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000002c0)={r5, 0x1, r7, 0x40}) r8 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r8) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r8, r9, 0x0, 0x0) 01:58:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 68) 01:58:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1418.169059] loop7: detected capacity change from 0 to 512 [ 1418.182585] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1418.183501] EXT4-fs (loop7): group descriptors corrupted! 01:58:00 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$FITHAW(r0, 0xc0045878) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r1, r3, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r6 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r6) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r8, r6, r7, 0x0) keyctl$KEYCTL_MOVE(0x1e, r4, r2, r6, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) r9 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r5) keyctl$KEYCTL_MOVE(0x1e, 0x0, r5, r9, 0x0) keyctl$revoke(0x3, r9) request_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000280)='keyring\x00', r9) [ 1418.213260] loop2: detected capacity change from 0 to 512 [ 1418.236685] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1418.237760] EXT4-fs (loop2): group descriptors corrupted! 01:58:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 73) 01:58:00 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={0x0, @xdp={0x2c, 0x0, 0x0, 0x34}, @in={0x2, 0x4e24, @empty}, @llc={0x1a, 0xffff, 0x1, 0xff, 0x0, 0xff}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x10000000007f, 0x2}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x3}}, 0x0, r3}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000180)={'syztnl1\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback, 0x0, 0x20}}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000740)=0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000980)={&(0x7f0000000c80)=ANY=[@ANYBLOB="dc0100001800000125bd7000fedbdf25000000000000000000000000000000000a0101020000000000000000000000004e2404014e2300000000000000000012005232c5631a1d434f42f8ca6687aacaf5d7eb630080743b56b9bf4c6651c3acf892efcc9e6878d11a5d78000000226f3d17103ea23501b5dad13754c00ea648501359a29af75a551c5e3b60b89ad6ac95000000000000000000000000000000006dff4b89cf9b535ed03b96c561f21cd6086e7b5afc211e1e6c227c79e50ef42b9eab243308444b698acab9572ddcb382e41280", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0a010100000000000000000000000000000004d33300000064010100000000000000000000000000c5ffffffffffffff05000000000000000104000000000000210000000000000000000000000000004000000000000000030000000000000000fcffffffffffff0104000000000000d10200000000000009000000000000000800000000000000000800bb0200000002000027bd70000740bf49916e7bb313eb5f1b3500000a0006060200000000000000b500000000000000e4000600fe800000000000000000000000000037000000000000000000000000000000004e20009b4e23", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="ac1414aa000000000000000000000000000004d46c00000000000000000000000000000000000000dd0e0000000000004d0000000000000000010000000000000200000000000000060000000000000005000000000000010000000000000000000005000000000000005f9300000000000008000000000000002000000007000000500f000028bd700007350000060002d64700"/168], 0x1dc}, 0x1, 0x0, 0x0, 0x4000011}, 0x40084) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x20, r6, 0x1, 0x0, 0x0, {0x8}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vcan0\x00', 0x0}) sendmsg$nl_xfrm(r0, &(0x7f0000000780)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000740)={&(0x7f0000000400)=@updsa={0x308, 0x1a, 0x10a, 0x70bd29, 0x25dfdbfe, {{@in6=@private0, @in=@private=0xa010100, 0x4e24, 0x80, 0x4e22, 0x1, 0x2, 0xa0, 0x20, 0x0, 0x0, r4}, {@in6=@remote, 0x4d5, 0x33}, @in6=@mcast2, {0x0, 0x2, 0x2d1b, 0x4, 0x1, 0x1000, 0xff, 0x3}, {0x2, 0x1ff, 0x100000001, 0x7f}, {0x6d0, 0x8000, 0xc1}, 0x70bd2a, 0x3506, 0xa, 0x1, 0x0, 0xc}, [@offload={0xc, 0x1c, {r8, 0x1}}, @etimer_thresh={0x8, 0xc, 0x1f}, @XFRMA_SET_MARK={0x8, 0x1d, 0x80}, @algo_aead={0x8d, 0x12, {{'morus1280-avx2\x00'}, 0x208, 0x180, "0e66715a300bef775e8c42a59756f83cb5a243a2de239453de869d16625c052e31454ed53736f8499fecd7a5d536db65ecd1d7922ac8d84a53fac25ad518298df4"}}, @tmpl={0x144, 0x5, [{{@in6=@empty, 0x4d3, 0xff}, 0xa, @in6=@dev={0xfe, 0x80, '\x00', 0x40}, 0x3507, 0x3, 0x1, 0x0, 0x2, 0x6, 0x5d9}, {{@in6=@mcast2, 0x4d4, 0xff}, 0x2, @in=@dev={0xac, 0x14, 0x14, 0x2c}, 0x3501, 0x0, 0x3, 0x23, 0x7, 0x997a, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x19}, 0x4d2, 0x33}, 0x2, @in=@local, 0x34ff, 0x1, 0x0, 0x2, 0xfffffc01, 0x3, 0x4}, {{@in=@remote, 0x4d5, 0x32}, 0xa, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x4, 0x0, 0x0, 0x4, 0x7, 0x5}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x3c}, 0xa, @in=@multicast1, 0x3502, 0x0, 0x0, 0xd, 0x4, 0x45, 0xff}]}, @XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x84fc}, @extra_flags={0x8, 0x18, 0x8}, @policy_type={0xa}, @offload={0xc, 0x1c, {r9}}]}, 0x308}}, 0x0) r10 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r10, 0x0, 0x0) copy_file_range(r0, &(0x7f0000000000)=0x5c4, r10, &(0x7f0000000040), 0x800, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x214}, 0x1, 0x0, 0x0, 0x4001}, 0x4001) 01:58:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x43a, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1418.471015] loop7: detected capacity change from 0 to 512 [ 1418.475537] FAULT_INJECTION: forcing a failure. [ 1418.475537] name failslab, interval 1, probability 0, space 0, times 0 [ 1418.477229] CPU: 1 UID: 0 PID: 10482 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1418.477261] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1418.477274] Call Trace: [ 1418.477282] [ 1418.477291] dump_stack_lvl+0xfa/0x120 [ 1418.477329] should_fail_ex+0x4d7/0x5e0 [ 1418.477361] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 1418.477393] should_failslab+0xc2/0x120 [ 1418.477426] kmem_cache_alloc_noprof+0x80/0x690 [ 1418.477462] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 1418.477491] ext4_mb_new_blocks+0x2414/0x45b0 [ 1418.477538] ? kasan_save_track+0x14/0x30 [ 1418.477568] ? __kasan_kmalloc+0x7f/0x90 [ 1418.477599] ? trace_kmalloc+0x1f/0xb0 [ 1418.477627] ? __kmalloc_noprof+0x274/0x680 [ 1418.477662] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1418.477694] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 1418.477728] ? ext4_ext_search_right+0x2e8/0xbd0 [ 1418.477750] ? ext4_inode_to_goal_block+0x323/0x430 [ 1418.477793] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 1418.477842] ? perf_trace_lock_acquire+0xc9/0x700 [ 1418.477875] ? __pfx___schedule+0x10/0x10 [ 1418.477909] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1418.477952] ? lock_acquire+0x15e/0x2f0 [ 1418.477981] ? ext4_map_blocks+0x55b/0x14a0 [ 1418.478031] ? __pfx_down_write+0x10/0x10 [ 1418.478062] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1418.478109] ext4_map_blocks+0x624/0x14a0 [ 1418.478146] ? __up_read+0x197/0x750 [ 1418.478180] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1418.478210] ? __pfx___up_read+0x10/0x10 [ 1418.478245] ? lock_release+0xc8/0x290 [ 1418.478284] ? ext4_map_blocks+0x1e0/0x14a0 [ 1418.478324] ext4_getblk+0x682/0x8e0 [ 1418.478357] ? __pfx_ext4_getblk+0x10/0x10 [ 1418.478384] ? __pfx_security_inode_init_security+0x10/0x10 [ 1418.478416] ? crc32c+0x1ae/0x350 [ 1418.478446] ext4_bread+0x2e/0x1a0 [ 1418.478479] ext4_append+0x224/0x530 [ 1418.478518] ? __pfx_ext4_append+0x10/0x10 [ 1418.478555] ? __pfx___ext4_new_inode+0x10/0x10 [ 1418.478601] ext4_init_new_dir+0x13c/0x240 [ 1418.478626] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1418.478665] ext4_mkdir+0x3c5/0xb30 [ 1418.478699] ? __pfx_ext4_mkdir+0x10/0x10 [ 1418.478723] ? security_inode_permission+0x72/0xe0 [ 1418.478764] vfs_mkdir+0x59a/0x8d0 [ 1418.478796] do_mkdirat+0x19f/0x3d0 [ 1418.478830] ? __pfx_do_mkdirat+0x10/0x10 [ 1418.478874] __x64_sys_mkdir+0xf3/0x140 [ 1418.478905] do_syscall_64+0xbf/0x390 [ 1418.478941] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1418.478965] RIP: 0033:0x7f94bafeec27 [ 1418.478982] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1418.479004] RSP: 002b:00007f94b8564fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1418.479025] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafeec27 [ 1418.479040] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1418.479053] RBP: 00007f94b8565040 R08: 0000000000000000 R09: ffffffffffffffff [ 1418.479067] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1418.479080] R13: 0000000020000100 R14: 00007f94b8565000 R15: 0000000020013c00 [ 1418.479118] [ 1418.523797] loop5: detected capacity change from 0 to 8 [ 1418.536219] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (2 blocks) [ 1418.559898] loop5: detected capacity change from 0 to 8 [ 1418.563719] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (2 blocks) 01:58:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x81, 0x7, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:58:11 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380015001200010e000000000000000028001a"], 0x38}}, 0x0) 01:58:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x801, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:58:11 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000100)='.dead\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000280)="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", 0xfa, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, 0x0, r1, 0x0) 01:58:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 74) 01:58:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 69) 01:58:11 executing program 6: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000003c0)=ANY=[@ANYBLOB="0100ccd00000000000abd3e2f5fc00bd13ae28e7f65a871aaca71a2200b6000000000000000000000000ac1414bb0000000000000000000000de", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000fc00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000004c0014007368613235362d67656e6572696300"/244], 0x13c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="65727370616e3000000f000000000000", @ANYRES32=0x0, @ANYBLOB="0008000100000000fffffffe4c0c0030006500003f2990780a0101000a0101000717c4ac14140eac14140eac1414aaac1e00010a0101009404000001"]}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000500)={'ip6gre0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x29, 0x1, 0xd2, 0x4, 0x54, @private0={0xfc, 0x0, '\x00', 0x1}, @loopback, 0x8, 0x40, 0x7, 0x401}}) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000005180)={0x2194, 0x12, 0x200, 0x70bd27, 0x25dfdbfd, {0x6, 0x7, 0x5, 0x5, {0x4e21, 0x4e20, [0x4, 0x9, 0x9aee, 0xfffff8a1], [0x3ff, 0xfffffffc, 0x3, 0xffff], r2, [0xffffffff, 0xb8c5]}, 0x8001, 0x80000001}, [@INET_DIAG_REQ_BYTECODE={0x8d, 0x1, "5145c994f03fa660225b0a4cf3730a510a7d4b2ffdabff07a53d6b74e1b89f8fc7cf7e491ab5ad28595bad0d97557385ea2e51866e21f34f29a98f589e36ed9c1281e455a218139d0df3ea6b2e7800509cad0d58528e701ca06a2b4d5b5a4bf21dd0c6d835de02b249da43f4879419a35b2aa2f847af7e162a5c306fd6e2c85e32a0550be36cfb94b8"}, @INET_DIAG_REQ_BYTECODE={0x107c, 0x1, "289141bc63717cfbc69e9eaaac2586aa2f75fd50116e3c14402add0387f0621f2aa23b6bfbdffb7e124491a0c8c7e87cfe857be1c0acb788ee56720d188172b70102668a5315eaf00af54cd04cceebdcbf26b4dfa57d34ddab490b5596f0192a22bc216819bd924d55a9f46fb9fd03a3b937b8b189617bab24087b1108f34fa3c7542683a6091988c1ef8ee70bb3fcbdaffcbce8d5842cc6eda393ff32ecc9b6ac6d98c5d0be51833cbfc1476647a767a2fe32d80236135f675712b34ff3b1c5dac5c7dd10f681e512e28a85f3ce499235af445234e3173bd5ebc6a85446749eb2d7674af1e0a81602b48e24099b3e8b8669fd522126d6a3d6340daf3913a949ede41a83eeefa2947fbd94bf7360520270e855bd96edb93a43c5c411ee6cd274c5220edeecf4fe8d48346e8355c4ed092dd0bc33203d10e5065d2437a94b0ed267c61e3ef146ea0541b3b36c1f9d6d48a80a081675052278e4cd8b19fd8fa2fd305d3eca93b7d4ef8435771e8868690cb21c764c355304ea78810c1590d49bbe54e8d29e4c883ded7cd46765cf00fb9180fbf300ba29ad0c9fe1f34a6a0fe593c2f003d6b987d16716616068305ab2497e9e15d6cc9ffd30cf24b0cfc0b3704761475094e699cbda373440293ed5e03b161f8f5ccd4f9de1076dedd67966d99b9db2fa7450e0e21fe113563b8a0ce603668255b164a68ed06f5e619bbb5f0fc476b4ba83c0421a26cc80c4664e6f00455c6fc87026060240a273a7ffeeec61a39f1df6ae0f255ed5dbaef1126c48b8c59295e8e613caf7b0d72278630be9de91645772b47acfbc270f628d940e8b146c04071c29225d417ebed86d23649a4595d9e9c66b87f100e9168377383e833ad2722eae4f39d0cb15196139fe0eeb8793afed88712b31d2162e0922d5dc79509a44d0c9934b03112b44eee17fe741b7fd93e6854715a51ab802ebb1401856eca5ba77cfa853ee647db022b6f6584a84d5059f062e945eec52d9c3946accc357297f19f9d9f56145f0e2b245491c8e78a88f3da33666e6d75ed19555f88a75248897599ad0f87ca6cfc27412892753c29371fe47256fb529ca9031a5c7e262c7b1c2a88dbcbad4a2817edf34145aff34db0b234cd866a7eb15222df89bcd377f9652e3702b91276034c1a2564559e0e76b9cf9e0d9c7bce1f964654782ff497565fa62a993da5172935c1d12c7a7b7d502501f8b0a18c4f2c13c5298e184b69cb67e2ea65c59402b43afdb9466a410f8fff4800c9a44375d144988e58ec3fcf4b4646b21a8af3c16d8745341cb21ea4bb761620ebad9350952dff75a011c548a60079cfcfa4c371efe858e04afcfbb531d03f941625f27dde9b227413f5fc25637f17cec3c82984864d4e6d9253f6781ab1151b84662334fc1c54a171549181ff8a3823d5e5f14f3773fc4e0c0076f09e6789a305457cae3bd3023dc42e3da9d413186d514c46de6f9ef4100657b53aa28f9123d735686aed9b6be0872e93b3b4bfb9a801a270389f38310047202a6d21c494d57c00b7446414717dde05240e44dedf1ab4480558d5057c60102e20e0dec1ab5e56ad6f5773f1320846036a7fc3171188fb1101b059535e35286cde5593cd374ddb681b81607f1a0ee01af5dd58b95dc6720653be73536c2ebf078a28d580bd71f9b776b64263b01e74f57355750bf7d8c30171bb4c82b4d1bbf9b62ea634acd0784eb4d213582fdc64232098dc64bb1487a322a3cf74beb26502ae655062579ed186d54ae776ef6bcb59e9002c67bdbe40449735f93b0a6caff570115b3de28ca530479ccf662f005f916f415c35e47438342bc4794e0e71a358c68afa2e037b56972b1bfc0bd84accc29d27d2942f3eb33d59b77918cfb08250162e3ca899ed0e601ff625b89d8088ee8262e6a76e31d503cb24409b55aa1053415d3554b35171bfaaa201d81fd8ee364a9bfcf95a772a03e7976f51e4734df606b830754bef1f658fc3127c22d7f1fbe4c7cac1f449f6edde2ecd7a948e548e296c8718575b62fdc46344c9b7d45ea39ee0788bab56afaeceafec0444dc98e062c38a76f4a87a5f50addf01ac42e9f7538186892f12a61c41690d01116636b532b098247584c8db2903e867f307aea4c1e9bb97147219d54832d22cab0c2dda0ea4763288995be3952c63e8a0ba7e653e1621c4fdb22178a22785285669fd4b4691119bca0aaa2ab20a5fabc222679f7e3a0a01ecd743702bb1694a796a9eb34ab7d8e7bfb394e66245d3cdba411523e205a874dc6fc30faf476a120699810fef10da704a637751a2070752c929d85dfd15604dc2049dc88e0a3105f826309370fd2b9e1d21bc826ec532cb427ba1e1a9bb77ea2d5d918fae2efb438c6a081c69069c5f97704abe2242333ef86293788c6e3b56330b9378469978c139c8027f847da213da01f41ef642912e1c8aeff36035daac0fffb98c1fa9f12d46d4afc85cf74ecdd6fa7ac19db1d8270ff1713c828b69e5eae78b1c899c575496b20f28cd977a69091e29908b8a96824b2001913f73a06e0b5baacdaee1af18ba6ca43493d45acea575f0e64ac58fa504ba9d2de42305dca051bdccde818f0e6e37251604de9c61a0ce5e18bb132848b634b477b3771f96a60ff83c1c5b70de2a5a3685353d439af171900aac7ead9922562af0413b56bef482a7a3161b5515c46c82aed8f73363c918abc8d47a060940b4f8ddcb43914adcd05f1649d7ddf28bc4cbb80fe65401c73bbda185c3d788d405588a7f5fadfa917c7415e272dd98e908b5d4c5b1c2fea7b4bb3e1a587198aa180e5d0b8166fc9af405ebb665a485a16a70e6bba0ab269b1f55495f2226240538d0949017c94307dde848e05b3c7cb5648f9a9909a3b1315dd54f8fde660f38e5559e09462325cfb8bcf840679eeb6ee4007454b9fa951685bafb7b7df35b6ba46407b62a6d79d14b92424f57c6911b3b7fcfee7c477b51692cd6d0c6f982160cdbe6ffb065b0d3ca93a65b8d4fc354d41ec31c39a9a83ff1f39d6870342198a8cf74ab6702315d22ea42323196f3f32fa1718162c720b99ead59bd75c717383c0bf0d8e2f9204b0c88c77a4dc47f73ef684385a43b410e71c6b15c1d95983390e8adcdb85b30719a3b6cf8ffd5de22650537ab49cff86e18ce261ce9c5a6c2b156b2fa360f8503357d39485b6e69bedaab7f4a372f841e578674a0e920e6f1434c2aa2238ac8742caef3684a65a28e0d4539ab2c7750c3428c1a8b239a24df48dd0c08d46fe6ccd4d62be8f89f9fd73b54ea0bab69fd37b3d7a34ae195ab664ed770aa2f65fa94c011caa56cab3a300b6cb0ff04f834644c0d2ff4277ed6929c68024b58623252dc85b663282b80341535a98e7a297ecf0d5b1f30f21f8ae356754e36cca7b503dacf927f1798fe9e3cdd6358f625a7b74e093507b1e69bbe904d9594973f7782676b8beb3c84254e5d4200df7554a9fe991543da92968ab428671bbaa53ad150f6add30cdcfbcfe27a262deb01535cb201a4e7dba688f8344d554662f208c47b05bbe44161ff8a1345503faa3da9c89daefe51b34e64af1ea7a876b2db81fc646d6dc04c8eebbcbbcd0b5c01063551f431ce24c74fd349a7d697c499592708dd37586e8d68bc733d952da2cdcbd3079b7812e0845a8149b7d588606b72a7f4e14daf8e08ef673705e73583115545f119ea0960eccb80a07300affcd8c847f0025c94ed8b30a4243b1237011bff09a390382c1584d937546599b33effa19fe9377c05ab86cfdd7e6ef3caca083151be4abed63b107262f492f234938db67ff6e34990588cde42f1d73e503c01ec0280e0af3e3c42d4be9a322a4441b135263864823f60c11a65eb5ec2eb8355544d6ac344940653410e8468b1eed184ed42a07f9c53e71972aa7c17d5cee6a93a22c253286f796a088927c61f463922a36de4c51676789f87cdd88e86eb3e1aee1c806e2b2eb9ede2172f5da47ad9145c36a6fc3f9ec7149d2df5aebd1e331e69419511ab6d7548431f8f34945817d8cd40d64d08b15b4be2c440146354c2979b06b64c67b2507739d6688a5201e7b6ac1dca1dc8ed71bb527e1ebdc83a4b2940190b429e6720012565737d082e3fe57bd5d6786664050e14791e9fca73ceea59aec7ad0f2f408d2c7b43cd467474f96e3bf67e5c797ba7bbbca3000fb3339885fae442e069948ffba4e59e4f40ab84742e656d7655a1646e54f2bf67d3c2bbdab3e535cfa16062e0a55931d401224ffd19514582e7131dfc4f9cc1462537d7ba84f9fe88c16b98f01e590c656b537de8a1a539bea44aa5ee3dd785082015ae874d5c7dea6a511b26027200e5a295d355bf7d870c0e3b96d9a2099983c255da67a8e8b8a1276a6d9d955242f3f37135272dcc9add8faed747cd32c484d3f2557295de854b6a64a9b081d2f7ccda07ae19876b23aa37fedf62f6822585be02edec0e11fbebeda4c19e9c15f5458cd3945048f642ab0ce498cda893189abaec0bb883714e9b56e86f9f5e20f4182aef31824e80054c9d383ff453712b02d995ca4f5f45e087cd6647386c2fa3a00c8bfbd0860d30e7ddf4c5242fdff7c5505caa9e17be9d998bda8a9bc2ca8c62a6c3745bc3eb614b6b3830306f145d0c9e1953a1ab54001bcdf78580e0e29ef5d9b2ee47b168338ee14e39ebf1e5976ca17d4f7069924477eaf72f64886ff1c959d15ad4bfb1debd5b3b7b71016144fc68f7fa20c072b21b12517c956e1acb785557332d1828850c8830dd0819bd3801daacbb57e970f50a46e9b7607f93421abe06a5b3675af4fbb3f9fc77891069e30af4f5ca99f596426415e0f6825426906ec26f2492fa518aa30241ff943ac303889b3ce5e56a91a0204527a84cdd3760b293b94c8ed08a0ff692cb23df729448eab27a48489af7b79d1472065cddd33cea8041e8097d0ece0988b8b55719e7edfb25dc14dbc89b9807ef1a2aa79ce8160535c880649014f19e89ff03ba52950021811d131360fa908bf854ab742c6ad18197779f9829b0799765b33223f0e242396238e92bf458ad236149ded18034d80825e16dd5d708aa294f65846737c7c58c15bc1ec9e571802dbe1c10da4335562eb8e503720605992e305dcc322f50e0a03d01c81716b156782130fb612612936548856cfd133fa954ecd7e537f49b72206c8de30fe5455f4cdf2ffef99a060c88de4aa53810f1948e0aff83001bd7f8e6493a081d4b9b78f500afd741d73ec684cdc25aa28038115f079cf4db11621b6318164f2b041be47490435d06c74f6e5088dc01b37c453fb67c7768988263814fd87c4ffa0568fc72db2754db4c6f74b18f76150b2e73988ca0acc2cdc037a30200ee5bf1b33b6bea0e195d34ae7abfff63136ba328bd97c8cbfca82caf3f34674bd6d6d578a18ddfee9e1f51d790fede2532bee65cec26a1e89569bec9558524a2b4091c73608484a3eb285ee39a6e890061700a3b20ecc85dee7b35275fc36f725a90677221c390a3b13eaec1252a939e74c3205aa592a4a21d32e0f892b410a4c8feff419b2a907451505529bdf5538b413da4ee92909ac84021503e867ef472ff0b27ea2c13f5fa906d9dcb843d5029664230a25813b9d218c99479e909733025abdba78a7f0b16680c982d2c201208cb7daa200fdfde6107dc6d60aa4a63465365f749ceb955a772f9bcbf12c243af0d1f3a4b800c0ec4cabb8fae5fe81fee656b8facdea3edb448f9900520fa36bb5d7d2c7bb3220ea521f8dfc8e7657279ab6bf6ad5ac31ede5e9750505ed8e0d858a1e0c8442fe108137e004845e1f47a28ac3e8a0160d862671908df168eeb87c06af74950ba4557b2c5be35bf715683f9481f3342559a139bbb8b57968dde425d372dfcb5e3ba984e3eb9b095d4276df17f2262c6fa84be9ff1e300ea0967371c3297499dda31df226a905"}, @INET_DIAG_REQ_BYTECODE={0x35, 0x1, "9860fec19c4a923e053e446bb1698a3f52942a95a6589b58c14aa4a1e86bd29c49e98a05492c781f4f405cc134d0696ef6"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}]}, 0x2194}, 0x1, 0x0, 0x0, 0x4048800}, 0x4c841) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r3, 0x890c, &(0x7f0000000000)={0x0, @xdp={0x2c, 0x0, 0x0, 0x34}, @in={0x2, 0x4e24, @empty}, @llc={0x1a, 0xffff, 0x1, 0xff, 0x0, 0xff}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x10000000007f, 0x2}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) statx(0xffffffffffffffff, &(0x7f0000000700)='./file0\x00', 0x400, 0x200, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a00)=@allocspi={0x218, 0x16, 0x20, 0x70bd29, 0x25dfdbfb, {{{@in6=@empty, @in6=@private0, 0x4e20, 0x3d, 0x4e20, 0xffff, 0xa, 0xe0, 0x80, 0x2, r2, r7}, {@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d4, 0xff}, @in6=@loopback, {0x7, 0x10000000000000, 0xa076, 0x1, 0x40, 0x4, 0x6, 0x7}, {0xcb, 0x41, 0x100000000, 0x3}, {0x7, 0x9, 0x1}, 0x70bd28, 0x3502, 0xa, 0x2, 0x3, 0x97}, 0x200, 0x6}, [@algo_crypt={0x111, 0x2, {{'ecb(arc4)\x00'}, 0x648, "e210cd5d72e529ae1e633e5780f9cfd63df3999c1e40ab9d3b91f11f575a0f4c88ec23ae0fa18c2ecd28758542822b8597f63142174f09232914002f6a8df4e42464898ea76cb5b3a53bd2059f18211b0f291806237ac84c2d2c1ac68b239b49114da8cf55d7cd771ac49cc805a577f5d3754511c8c9dbe161841cace1a5473f9b4d5ef9c700a0235deb08a70f9e60c1c0cec20843e30cd8ac66d69a610179a16ff1db2cadd728608e9d79008d7a031bf18bdabe255856a52f7af3a2bac2f281d7f1b36b838158bc82"}}, @lastused={0xc, 0xf, 0xbbad}]}, 0x218}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x3}}, 0x0, r6}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000180)={'syztnl1\x00', r6, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback, 0x0, 0x20}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000640)=""/183, 0xb7, 0x1, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000740)=0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000980)={&(0x7f0000000c80)=ANY=[@ANYBLOB="dc0100001800000125bd7000fedbdf25000000000000000000000000000000000a0101020000000000000000000000004e2404014e2300000000000000000012005232c5631a1d434f42f8ca6687aacaf5d7eb630080743b56b9bf4c6651c3acf892efcc9e6878d11a5d78000000226f3d17103ea23501b5dad13754c00ea648501359a29af75a551c5e3b60b89ad6ac95000000000000000000000000000000006dff4b89cf9b535ed03b96c561f21cd6086e7b5afc211e1e6c227c79e50ef42b9eab243308444b698acab9572ddcb382e41280", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0a010100000000000000000000000000000004d33300000064010100000000000000000000000000c5ffffffffffffff05000000000000000104000000000000210000000000000000000000000000004000000000000000030000000000000000fcffffffffffff0104000000000000d10200000000000009000000000000000800000000000000000800bb0200000002000027bd70000740bf49916e7bb313eb5f1b3500000a0006060200000000000000b500000000000000e4000600fe800000000000000000000000000037000000000000000000000000000000004e20009b4e23", @ANYRES32=r6, @ANYRES32=r8, @ANYBLOB="ac1414aa000000000000000000000000000004d46c00000000000000000000000000000000000000dd0e0000000000004d0000000000000000010000000000000200000000000000060000000000000005000000000000010000000000000000000005000000000000005f9300000000000008000000000000002000000007000000500f000028bd700007350000060002d64700"/168], 0x1dc}, 0x1, 0x0, 0x0, 0x4000011}, 0x40084) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000100)=@acquire={0x168, 0x17, 0x400, 0x70bd29, 0x25dfdbfe, {{@in=@multicast2, 0x4d3, 0x33}, @in=@rand_addr=0x64010101, {@in6=@loopback, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4e22, 0x81, 0x4e20, 0x4, 0x2, 0xa0, 0x80, 0x6, r1, r8}, {{@in6=@dev={0xfe, 0x80, '\x00', 0x3e}, @in6=@local, 0x4e21, 0xfffd, 0x4e22, 0xad, 0x2, 0xb0, 0x80, 0x87, 0x0, 0xffffffffffffffff}, {0x0, 0x800, 0x7fffffff, 0x9, 0x6, 0x4, 0x9, 0xfff}, {0x4, 0x7fffffff, 0x800, 0xb0}, 0x101, 0x6e6bb8, 0x1, 0x0, 0x3, 0x3}, 0xfff, 0x2, 0x1, 0x70bd27}, [@XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x3}, @srcaddr={0x14, 0xd, @in=@empty}, @extra_flags={0x8, 0x18, 0x2}, @replay_thresh={0x8, 0xb, 0x1}, @srcaddr={0x14, 0xd, @in6=@local}]}, 0x168}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 1429.038828] loop7: detected capacity change from 0 to 512 [ 1429.042787] FAULT_INJECTION: forcing a failure. [ 1429.042787] name failslab, interval 1, probability 0, space 0, times 0 [ 1429.043722] CPU: 0 UID: 0 PID: 10500 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1429.043739] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1429.043746] Call Trace: [ 1429.043751] [ 1429.043756] dump_stack_lvl+0xfa/0x120 [ 1429.043780] should_fail_ex+0x4d7/0x5e0 [ 1429.043798] ? ext4_mb_new_blocks+0x64e/0x45b0 [ 1429.043816] should_failslab+0xc2/0x120 [ 1429.043835] kmem_cache_alloc_noprof+0x80/0x690 [ 1429.043849] ? __mark_inode_dirty+0x786/0x1490 [ 1429.043872] ? ext4_mb_new_blocks+0x64e/0x45b0 [ 1429.043888] ext4_mb_new_blocks+0x64e/0x45b0 [ 1429.043913] ? kasan_save_track+0x14/0x30 [ 1429.043930] ? __kasan_kmalloc+0x7f/0x90 [ 1429.043947] ? trace_kmalloc+0x1f/0xb0 [ 1429.043962] ? __kmalloc_noprof+0x274/0x680 [ 1429.043981] ? mark_held_locks+0x49/0x80 [ 1429.043999] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 1429.044018] ? ext4_ext_search_right+0x2e8/0xbd0 [ 1429.044030] ? ext4_inode_to_goal_block+0x323/0x430 [ 1429.044053] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 1429.044080] ? perf_trace_lock_acquire+0xc9/0x700 [ 1429.044101] ? perf_trace_lock_acquire+0xc9/0x700 [ 1429.044122] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1429.044145] ? lock_acquire+0x15e/0x2f0 [ 1429.044161] ? ext4_map_blocks+0x55b/0x14a0 [ 1429.044189] ? __pfx_down_write+0x10/0x10 [ 1429.044206] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1429.044228] ext4_map_blocks+0x624/0x14a0 [ 1429.044249] ? __up_read+0x197/0x750 [ 1429.044267] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1429.044282] ? __pfx___up_read+0x10/0x10 [ 1429.044302] ? lock_release+0xc8/0x290 [ 1429.044323] ? ext4_map_blocks+0x1e0/0x14a0 [ 1429.044345] ext4_getblk+0x682/0x8e0 [ 1429.044362] ? __pfx_ext4_getblk+0x10/0x10 [ 1429.044377] ? __pfx_security_inode_init_security+0x10/0x10 [ 1429.044395] ? crc32c+0x1ae/0x350 [ 1429.044412] ext4_bread+0x2e/0x1a0 [ 1429.044429] ext4_append+0x224/0x530 [ 1429.044450] ? __pfx_ext4_append+0x10/0x10 [ 1429.044470] ? __pfx___ext4_new_inode+0x10/0x10 [ 1429.044495] ext4_init_new_dir+0x13c/0x240 [ 1429.044509] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1429.044530] ext4_mkdir+0x3c5/0xb30 [ 1429.044549] ? __pfx_ext4_mkdir+0x10/0x10 [ 1429.044561] ? security_inode_permission+0x72/0xe0 [ 1429.044584] vfs_mkdir+0x59a/0x8d0 [ 1429.044601] do_mkdirat+0x19f/0x3d0 [ 1429.044619] ? __pfx_do_mkdirat+0x10/0x10 [ 1429.044643] __x64_sys_mkdir+0xf3/0x140 [ 1429.044660] do_syscall_64+0xbf/0x390 [ 1429.044681] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1429.044694] RIP: 0033:0x7f94bafeec27 [ 1429.044703] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1429.044716] RSP: 002b:00007f94b8564fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1429.044728] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafeec27 [ 1429.044736] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1429.044744] RBP: 00007f94b8565040 R08: 0000000000000000 R09: ffffffffffffffff [ 1429.044751] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1429.044758] R13: 0000000020000100 R14: 00007f94b8565000 R15: 0000000020013c00 [ 1429.044779] [ 1429.061196] loop5: detected capacity change from 0 to 8 [ 1429.086142] loop2: detected capacity change from 0 to 512 [ 1429.095056] FAULT_INJECTION: forcing a failure. [ 1429.095056] name failslab, interval 1, probability 0, space 0, times 0 [ 1429.097045] CPU: 1 UID: 0 PID: 10509 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1429.097078] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1429.097092] Call Trace: [ 1429.097107] [ 1429.097116] dump_stack_lvl+0xfa/0x120 01:58:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80a0}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create(0xe9) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) epoll_ctl$EPOLL_CTL_ADD(r2, 0x2, r1, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffeffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r4, 0x2, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r6, r0, r5, 0x0) r7 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r7) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r7) r9 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r9, r7, r8, 0x0) keyctl$search(0xa, r8, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0) [ 1429.097157] should_fail_ex+0x4d7/0x5e0 [ 1429.097192] ? ext4_mb_new_blocks+0x64e/0x45b0 [ 1429.097225] should_failslab+0xc2/0x120 [ 1429.097261] kmem_cache_alloc_noprof+0x80/0x690 [ 1429.097289] ? __mark_inode_dirty+0x786/0x1490 [ 1429.097334] ? ext4_mb_new_blocks+0x64e/0x45b0 [ 1429.097365] ext4_mb_new_blocks+0x64e/0x45b0 [ 1429.097416] ? kasan_save_track+0x14/0x30 [ 1429.097450] ? __kasan_kmalloc+0x7f/0x90 [ 1429.097484] ? trace_kmalloc+0x1f/0xb0 [ 1429.097514] ? __kmalloc_noprof+0x274/0x680 [ 1429.097551] ? mark_held_locks+0x49/0x80 [ 1429.097586] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 1429.097623] ? ext4_ext_search_right+0x2e8/0xbd0 [ 1429.097648] ? ext4_inode_to_goal_block+0x323/0x430 [ 1429.097694] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 1429.097749] ? perf_trace_lock_acquire+0xc9/0x700 [ 1429.097784] ? perf_trace_lock_acquire+0xc9/0x700 [ 1429.097825] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1429.097872] ? lock_acquire+0x15e/0x2f0 [ 1429.097904] ? ext4_map_blocks+0x55b/0x14a0 [ 1429.097958] ? __pfx_down_write+0x10/0x10 [ 1429.097992] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1429.098036] ext4_map_blocks+0x624/0x14a0 [ 1429.098076] ? __up_read+0x197/0x750 [ 1429.098112] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1429.098144] ? __pfx___up_read+0x10/0x10 [ 1429.098183] ? lock_release+0xc8/0x290 [ 1429.098225] ? ext4_map_blocks+0x1e0/0x14a0 [ 1429.098269] ext4_getblk+0x682/0x8e0 [ 1429.098304] ? __pfx_ext4_getblk+0x10/0x10 [ 1429.098334] ? __pfx_security_inode_init_security+0x10/0x10 [ 1429.098369] ? crc32c+0x1ae/0x350 [ 1429.098402] ext4_bread+0x2e/0x1a0 [ 1429.098437] ext4_append+0x224/0x530 [ 1429.098479] ? __pfx_ext4_append+0x10/0x10 [ 1429.098519] ? __pfx___ext4_new_inode+0x10/0x10 [ 1429.098569] ext4_init_new_dir+0x13c/0x240 [ 1429.098596] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1429.098639] ext4_mkdir+0x3c5/0xb30 01:58:11 executing program 6: prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) [ 1429.098675] ? __pfx_ext4_mkdir+0x10/0x10 [ 1429.098700] ? security_inode_permission+0x72/0xe0 [ 1429.098745] vfs_mkdir+0x59a/0x8d0 [ 1429.098778] do_mkdirat+0x19f/0x3d0 [ 1429.098815] ? __pfx_do_mkdirat+0x10/0x10 [ 1429.098862] __x64_sys_mkdir+0xf3/0x140 [ 1429.098896] do_syscall_64+0xbf/0x390 [ 1429.098935] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1429.098960] RIP: 0033:0x7fd2e6304c27 [ 1429.098979] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1429.099002] RSP: 002b:00007fd2e387afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1429.099025] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6304c27 [ 1429.099041] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1429.099055] RBP: 00007fd2e387b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1429.099070] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1429.099084] R13: 0000000020000100 R14: 00007fd2e387b000 R15: 0000000020013c00 [ 1429.099125] [ 1429.177292] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (2 blocks) 01:58:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 75) [ 1429.216722] loop5: detected capacity change from 0 to 8 [ 1429.241991] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (2 blocks) [ 1429.256676] loop7: detected capacity change from 0 to 512 [ 1429.262907] FAULT_INJECTION: forcing a failure. [ 1429.262907] name failslab, interval 1, probability 0, space 0, times 0 [ 1429.263820] CPU: 0 UID: 0 PID: 10521 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1429.263837] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1429.263845] Call Trace: [ 1429.263849] [ 1429.263854] dump_stack_lvl+0xfa/0x120 [ 1429.263877] should_fail_ex+0x4d7/0x5e0 [ 1429.263895] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 1429.263909] should_failslab+0xc2/0x120 [ 1429.263928] kmem_cache_alloc_noprof+0x80/0x690 [ 1429.263941] ? fs_reclaim_acquire+0xae/0x150 [ 1429.263962] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 1429.263975] jbd2_journal_add_journal_head+0x367/0x5d0 [ 1429.263991] jbd2_journal_get_create_access+0x44/0x560 [ 1429.264007] ? lock_is_held_type+0x9e/0x120 [ 1429.264028] __ext4_journal_get_create_access+0x54/0x1b0 [ 1429.264051] ext4_getblk+0x3c9/0x8e0 [ 1429.264070] ? __pfx_ext4_getblk+0x10/0x10 [ 1429.264085] ? __pfx_security_inode_init_security+0x10/0x10 [ 1429.264107] ? crc32c+0x1ae/0x350 [ 1429.264124] ext4_bread+0x2e/0x1a0 [ 1429.264142] ext4_append+0x224/0x530 [ 1429.264163] ? __pfx_ext4_append+0x10/0x10 [ 1429.264183] ? __pfx___ext4_new_inode+0x10/0x10 [ 1429.264208] ext4_init_new_dir+0x13c/0x240 [ 1429.264222] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1429.264243] ext4_mkdir+0x3c5/0xb30 [ 1429.264261] ? __pfx_ext4_mkdir+0x10/0x10 [ 1429.264274] ? security_inode_permission+0x72/0xe0 [ 1429.264297] vfs_mkdir+0x59a/0x8d0 [ 1429.264314] do_mkdirat+0x19f/0x3d0 [ 1429.264333] ? __pfx_do_mkdirat+0x10/0x10 [ 1429.264356] __x64_sys_mkdir+0xf3/0x140 [ 1429.264373] do_syscall_64+0xbf/0x390 [ 1429.264393] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1429.264406] RIP: 0033:0x7f94bafeec27 [ 1429.264415] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1429.264427] RSP: 002b:00007f94b8564fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1429.264439] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafeec27 [ 1429.264447] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1429.264454] RBP: 00007f94b8565040 R08: 0000000000000000 R09: ffffffffffffffff [ 1429.264462] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1429.264469] R13: 0000000020000100 R14: 00007f94b8565000 R15: 0000000020013c00 [ 1429.264489] [ 1429.281736] ENOMEM in journal_alloc_journal_head, retrying. [ 1429.291845] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1429.292689] EXT4-fs (loop7): group descriptors corrupted! 01:58:22 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x10, 0xa, 0x65, 0x8, 0x0, 0x104a, 0x8, 0x232e1b9dafdae698, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x1, 0xffffffffffffffb2}, 0x40, 0x100, 0x8000, 0x5, 0xaf56, 0xffff, 0x2, 0x0, 0x100, 0x0, 0x10001}, 0x0, 0x3, r0, 0x8) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r2, 0x0) 01:58:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8008, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:58:22 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 76) 01:58:22 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x2000) 01:58:22 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000280)={0x0, "02b5eae3aabd2e6e46fb4744cdad363d2c82d7bf0f0423d1599e2ca11745ba0e2ee2bfbd2b64d0b9fb8733c6344eabec9b227a6715ccddd792d14e5efaf539b2", 0x3b}, 0x48, r0) 01:58:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 70) 01:58:22 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800f0001200010e000000000000000028001a"], 0x38}}, 0x0) [ 1440.186897] loop2: detected capacity change from 0 to 512 [ 1440.194396] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1440.195252] EXT4-fs (loop2): group descriptors corrupted! [ 1440.223621] loop5: detected capacity change from 0 to 64 [ 1440.239258] loop7: detected capacity change from 0 to 512 [ 1440.244220] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (16 blocks) 01:58:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 71) 01:58:22 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r5) [ 1440.261296] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1440.262151] EXT4-fs (loop7): group descriptors corrupted! [ 1440.266603] loop5: detected capacity change from 0 to 64 [ 1440.276195] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (16 blocks) 01:58:22 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380077011200010e000000000000000028001a"], 0x38}}, 0x0) [ 1440.304478] loop2: detected capacity change from 0 to 512 [ 1440.308662] FAULT_INJECTION: forcing a failure. [ 1440.308662] name failslab, interval 1, probability 0, space 0, times 0 [ 1440.309790] CPU: 0 UID: 0 PID: 10553 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1440.309807] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1440.309815] Call Trace: [ 1440.309819] [ 1440.309824] dump_stack_lvl+0xfa/0x120 [ 1440.309847] should_fail_ex+0x4d7/0x5e0 [ 1440.309865] should_failslab+0xc2/0x120 [ 1440.309884] __kmalloc_noprof+0xcd/0x680 [ 1440.309904] ? mark_held_locks+0x49/0x80 [ 1440.309922] ? ext4_find_extent+0x7f5/0xa00 [ 1440.309939] ext4_find_extent+0x7f5/0xa00 [ 1440.309957] ext4_ext_map_blocks+0x1cc/0x5f70 [ 1440.309983] ? perf_trace_lock_acquire+0xc9/0x700 [ 1440.310000] ? perf_trace_lock_acquire+0xc9/0x700 [ 1440.310021] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1440.310044] ? lock_acquire+0x15e/0x2f0 [ 1440.310059] ? ext4_map_blocks+0x55b/0x14a0 [ 1440.310085] ? down_write+0x119/0x1f0 [ 1440.310108] ? __pfx_down_write+0x10/0x10 [ 1440.310124] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1440.310149] ext4_map_blocks+0x624/0x14a0 [ 1440.310169] ? __up_read+0x197/0x750 [ 1440.310187] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1440.310203] ? __pfx___up_read+0x10/0x10 [ 1440.310222] ? lock_release+0xc8/0x290 [ 1440.310243] ? ext4_map_blocks+0x1e0/0x14a0 [ 1440.310265] ext4_getblk+0x682/0x8e0 [ 1440.310282] ? __pfx_ext4_getblk+0x10/0x10 [ 1440.310297] ? __pfx_security_inode_init_security+0x10/0x10 [ 1440.310315] ? crc32c+0x1ae/0x350 [ 1440.310332] ext4_bread+0x2e/0x1a0 [ 1440.310350] ext4_append+0x224/0x530 [ 1440.310371] ? __pfx_ext4_append+0x10/0x10 [ 1440.310391] ? __pfx___ext4_new_inode+0x10/0x10 [ 1440.310416] ext4_init_new_dir+0x13c/0x240 [ 1440.310429] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1440.310451] ext4_mkdir+0x3c5/0xb30 [ 1440.310469] ? __pfx_ext4_mkdir+0x10/0x10 [ 1440.310482] ? security_inode_permission+0x72/0xe0 [ 1440.310504] vfs_mkdir+0x59a/0x8d0 [ 1440.310522] do_mkdirat+0x19f/0x3d0 [ 1440.310540] ? __pfx_do_mkdirat+0x10/0x10 [ 1440.310563] __x64_sys_mkdir+0xf3/0x140 [ 1440.310581] do_syscall_64+0xbf/0x390 [ 1440.310600] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1440.310613] RIP: 0033:0x7fd2e6304c27 [ 1440.310623] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1440.310634] RSP: 002b:00007fd2e387afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1440.310647] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6304c27 [ 1440.310655] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1440.310662] RBP: 00007fd2e387b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1440.310669] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1440.310676] R13: 0000000020000100 R14: 00007fd2e387b000 R15: 0000000020013c00 [ 1440.310697] 01:58:22 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 77) 01:58:22 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r2, 0x0) fcntl$dupfd(r0, 0x0, r0) [ 1440.388379] loop7: detected capacity change from 0 to 512 [ 1440.391811] FAULT_INJECTION: forcing a failure. [ 1440.391811] name failslab, interval 1, probability 0, space 0, times 0 [ 1440.392943] CPU: 0 UID: 0 PID: 10559 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1440.392959] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1440.392967] Call Trace: [ 1440.392972] [ 1440.392976] dump_stack_lvl+0xfa/0x120 [ 1440.392999] should_fail_ex+0x4d7/0x5e0 [ 1440.393014] ? __es_remove_extent+0x53f/0x1570 [ 1440.393033] ? __es_insert_extent+0xed2/0x1370 [ 1440.393046] should_failslab+0xc2/0x120 [ 1440.393065] kmem_cache_alloc_noprof+0x80/0x690 [ 1440.393080] ? __pfx___es_remove_extent+0x10/0x10 [ 1440.393104] ? __es_insert_extent+0xed2/0x1370 [ 1440.393118] __es_insert_extent+0xed2/0x1370 [ 1440.393144] ext4_es_insert_extent+0x4d0/0x1100 [ 1440.393167] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 1440.393183] ? lock_acquire+0x15e/0x2f0 [ 1440.393201] ? ext4_map_blocks+0x55b/0x14a0 [ 1440.393229] ? __pfx_down_write+0x10/0x10 [ 1440.393247] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1440.393269] ext4_map_blocks+0x7ff/0x14a0 [ 1440.393289] ? __up_read+0x197/0x750 [ 1440.393309] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1440.393325] ? __pfx___up_read+0x10/0x10 [ 1440.393345] ? lock_release+0xc8/0x290 [ 1440.393366] ? ext4_map_blocks+0x1e0/0x14a0 [ 1440.393388] ext4_getblk+0x682/0x8e0 [ 1440.393406] ? __pfx_ext4_getblk+0x10/0x10 [ 1440.393421] ? __pfx_security_inode_init_security+0x10/0x10 [ 1440.393439] ? crc32c+0x1ae/0x350 [ 1440.393456] ext4_bread+0x2e/0x1a0 [ 1440.393474] ext4_append+0x224/0x530 [ 1440.393495] ? __pfx_ext4_append+0x10/0x10 [ 1440.393515] ? __pfx___ext4_new_inode+0x10/0x10 [ 1440.393541] ext4_init_new_dir+0x13c/0x240 [ 1440.393554] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1440.393576] ext4_mkdir+0x3c5/0xb30 [ 1440.393595] ? __pfx_ext4_mkdir+0x10/0x10 [ 1440.393612] ? security_inode_permission+0x72/0xe0 [ 1440.393635] vfs_mkdir+0x59a/0x8d0 [ 1440.393653] do_mkdirat+0x19f/0x3d0 [ 1440.393671] ? __pfx_do_mkdirat+0x10/0x10 [ 1440.393695] __x64_sys_mkdir+0xf3/0x140 [ 1440.393713] do_syscall_64+0xbf/0x390 [ 1440.393733] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1440.393747] RIP: 0033:0x7f94bafeec27 [ 1440.393756] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1440.393768] RSP: 002b:00007f94b8564fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1440.393781] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafeec27 [ 1440.393789] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1440.393796] RBP: 00007f94b8565040 R08: 0000000000000000 R09: ffffffffffffffff [ 1440.393804] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1440.393811] R13: 0000000020000100 R14: 00007f94b8565000 R15: 0000000020013c00 [ 1440.393833] 01:58:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40002, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1440.470975] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1440.471860] EXT4-fs (loop7): group descriptors corrupted! 01:58:22 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000031200010e000000000000000028001a"], 0x38}}, 0x0) 01:58:22 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000280)="d13c5a6b2c204e21eec89c054f07230606e18940f42e21121c3bb3c577063763356820d36dfb73ec72d1956b74f7ba4112fa8abb18fb8a5ce463250f39db18fafc2d1e099cfc3870933b7dc0f6ad5d1cbca4f6713a6d0b317965c8e839095e712094bc1b1fc8047e3047cf192ba44195806f4806ea6ceba7a1cda87d1ac039f215d61adde8b895c0757e118d445e214ad8f7e9ac936089854216a559653eb1a7a0344687287a0268c4d6d66768ed4465ac3a5c731fe7a985d8c1c0100a449d826f2e9dc764256ed00d95b3a72c7e043824873250b5b4e48c37791e9900a0dda2601dc92cf99aa3900dc1267bc4d7", 0xee, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r4, 0x0) keyctl$KEYCTL_MOVE(0x1e, r3, 0xfffffffffffffffb, r2, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 1440.501966] loop5: detected capacity change from 0 to 512 01:58:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 72) [ 1440.521942] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1440.523464] EXT4-fs (loop5): group descriptors corrupted! [ 1440.540016] loop2: detected capacity change from 0 to 512 [ 1440.541670] FAULT_INJECTION: forcing a failure. [ 1440.541670] name failslab, interval 1, probability 0, space 0, times 0 [ 1440.542683] CPU: 0 UID: 0 PID: 10571 Comm: syz-executor.2 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1440.542701] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1440.542709] Call Trace: [ 1440.542714] [ 1440.542720] dump_stack_lvl+0xfa/0x120 [ 1440.542743] should_fail_ex+0x4d7/0x5e0 [ 1440.542762] should_failslab+0xc2/0x120 [ 1440.542786] __kmalloc_noprof+0xcd/0x680 [ 1440.542807] ? mark_held_locks+0x49/0x80 [ 1440.542825] ? ext4_find_extent+0x7f5/0xa00 [ 1440.542843] ext4_find_extent+0x7f5/0xa00 [ 1440.542861] ext4_ext_map_blocks+0x1cc/0x5f70 [ 1440.542888] ? perf_trace_lock_acquire+0xc9/0x700 [ 1440.542909] ? perf_trace_lock_acquire+0xc9/0x700 [ 1440.542932] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1440.542956] ? lock_acquire+0x15e/0x2f0 [ 1440.542972] ? ext4_map_blocks+0x55b/0x14a0 [ 1440.542998] ? down_write+0x119/0x1f0 [ 1440.543017] ? __pfx_down_write+0x10/0x10 [ 1440.543034] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1440.543056] ext4_map_blocks+0x624/0x14a0 [ 1440.543076] ? __up_read+0x197/0x750 [ 1440.543098] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1440.543114] ? __pfx___up_read+0x10/0x10 [ 1440.543134] ? lock_release+0xc8/0x290 [ 1440.543155] ? ext4_map_blocks+0x1e0/0x14a0 [ 1440.543177] ext4_getblk+0x682/0x8e0 [ 1440.543195] ? __pfx_ext4_getblk+0x10/0x10 [ 1440.543210] ? __pfx_security_inode_init_security+0x10/0x10 [ 1440.543228] ? crc32c+0x1ae/0x350 [ 1440.543245] ext4_bread+0x2e/0x1a0 [ 1440.543263] ext4_append+0x224/0x530 [ 1440.543285] ? __pfx_ext4_append+0x10/0x10 [ 1440.543305] ? __pfx___ext4_new_inode+0x10/0x10 [ 1440.543330] ext4_init_new_dir+0x13c/0x240 [ 1440.543344] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1440.543365] ext4_mkdir+0x3c5/0xb30 [ 1440.543383] ? __pfx_ext4_mkdir+0x10/0x10 [ 1440.543396] ? security_inode_permission+0x72/0xe0 [ 1440.543419] vfs_mkdir+0x59a/0x8d0 [ 1440.543437] do_mkdirat+0x19f/0x3d0 [ 1440.543455] ? __pfx_do_mkdirat+0x10/0x10 [ 1440.543479] __x64_sys_mkdir+0xf3/0x140 [ 1440.543497] do_syscall_64+0xbf/0x390 [ 1440.543517] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1440.543530] RIP: 0033:0x7fd2e6304c27 [ 1440.543540] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1440.543552] RSP: 002b:00007fd2e387afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1440.543564] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e6304c27 [ 1440.543573] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1440.543580] RBP: 00007fd2e387b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1440.543588] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1440.543596] R13: 0000000020000100 R14: 00007fd2e387b000 R15: 0000000020013c00 [ 1440.543617] 01:58:22 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 78) [ 1440.565898] loop5: detected capacity change from 0 to 512 [ 1440.587675] loop7: detected capacity change from 0 to 512 [ 1440.591491] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1440.593039] EXT4-fs (loop5): group descriptors corrupted! 01:58:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 73) 01:58:22 executing program 0: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x8, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) copy_file_range(0xffffffffffffffff, &(0x7f0000000640)=0x1, 0xffffffffffffffff, &(0x7f00000059c0)=0x80000001, 0x8, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = fork() tkill(r2, 0x24) clock_gettime(0x0, &(0x7f0000005740)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000055c0)=[{{&(0x7f0000000300), 0x6e, &(0x7f0000000580)=[{&(0x7f0000000380)=""/54, 0x36}, {&(0x7f00000003c0)=""/244, 0xf4}, {&(0x7f00000004c0)=""/129, 0x81}], 0x3, &(0x7f00000057c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="e6eebd711c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xa0}}, {{&(0x7f0000000680), 0x6e, &(0x7f0000000980)=[{&(0x7f0000000700)=""/187, 0xbb}, {&(0x7f00000007c0)=""/185, 0xb9}, {&(0x7f0000000880)=""/198, 0xc6}], 0x3}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000000bc0)=[{&(0x7f0000000a40)=""/183, 0xb7}, {&(0x7f0000000b00)=""/140, 0x8c}], 0x2, &(0x7f0000000c00)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000001000000010000000000000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x138}}, {{&(0x7f0000000d40)=@abs, 0x6e, &(0x7f0000001f80)=[{&(0x7f0000000dc0)=""/4096, 0x1000}, {&(0x7f0000001dc0)=""/132, 0x84}, {&(0x7f0000001e80)=""/247, 0xf7}], 0x3, &(0x7f0000001fc0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa8}}, {{&(0x7f0000002080)=@abs, 0x6e, &(0x7f00000043c0)=[{&(0x7f0000002100)=""/4096, 0x1000}, {&(0x7f0000003100)=""/171, 0xab}, {&(0x7f00000031c0)=""/166, 0xa6}, {&(0x7f0000003280)=""/9, 0x9}, {&(0x7f00000032c0)=""/111, 0x6f}, {&(0x7f0000003340)=""/51, 0x33}, {&(0x7f0000003380)=""/8, 0x8}, {&(0x7f00000033c0)=""/4096, 0x1000}], 0x8, &(0x7f0000004440)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}, {{&(0x7f0000004480)=@abs, 0x6e, &(0x7f0000005500)=[{&(0x7f0000004500)=""/4096, 0x1000}], 0x1, &(0x7f0000005540)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x78}}], 0x6, 0x0, &(0x7f0000005780)={r3, r4+10000000}) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x80, 0x80, 0x1, 0x0, 0x8a, 0x4804, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0xce71, 0x56f5d5af}, 0x1024, 0x8000, 0x26, 0x2, 0x401, 0x4, 0x3, 0x0, 0xffffffff, 0x0, 0x1}, r2, 0x7, r5, 0x1) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r7 = semget$private(0x0, 0x4, 0x0) semctl$GETNCNT(r7, 0x0, 0xe, 0x0) semctl$GETALL(r7, 0x0, 0xd, &(0x7f0000000280)=""/151) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) semtimedop(r7, &(0x7f0000000400)=[{0x2, 0x401, 0x800}, {0x4, 0x1, 0x1000}, {0x2, 0x9, 0x1000}, {0x4, 0x1ff, 0x1000}, {0x1, 0x9, 0x1800}, {0x2, 0x2, 0x1c00}], 0x6, &(0x7f0000000480)={r8, r9+10000000}) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x192024, &(0x7f00000004c0)=ANY=[@ANYRES64=r7, @ANYBLOB="75c52b8c31ad4b40b70450a3c94f53225216a03c1676d9d9432c02757a0fb60c440da69422299db3cf03d820d60d15532d2d5dd137749c0cb0d5e169183c2b1a4896cdb31ff6cdb1276a910118f88c4c071d94952dbabdbb7e6170ddbe027658545aa82758fe5ae58b53ba5429238b62204138ea56a82d0a31073a9d47dea0fa3b0ecb89964d6998b366806295ef623efddda0fc006c2483d28d9ca89c0f7f5f73e23f354e002a29327f32e9fd7871087a781079c682da4dbd53d14964a9bbca25de62f2b1c2a45302862c86d97bffd4eafdfaa9723b06ec1d4e130a0010a5209e743c9a2e90", @ANYRES16, @ANYRESHEX=r8, @ANYBLOB="6fb608f041031793e8c47be7cc84b4e1729bff11ebf0eceae0b900f9a9aedae23f93c7b49235f584df473c95c2ef17e313cb7984"]) semtimedop(r7, &(0x7f00000005c0)=[{0x2, 0xfffb, 0x800}, {0x2, 0x9, 0x1000}, {0x4, 0x34, 0x1000}, {0x3, 0x81}, {0x4, 0x113d, 0x1000}, {0x2, 0x200, 0x1800}], 0x6, &(0x7f0000000600)) keyctl$KEYCTL_MOVE(0x1e, r6, r0, r1, 0x0) 01:58:34 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) ppoll(&(0x7f0000000280)=[{r0, 0xa008}], 0x1, &(0x7f00000002c0)={0x0, 0x3938700}, &(0x7f0000000300)={[0xa8e2]}, 0x8) request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='keyring\x00', r2) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r4, r1, r3, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x2, r5, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x1f, 0x0, 0x2, 0xbe, 0x0, 0x9, 0x4000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x1, 0x7}, 0x48, 0x1, 0x5, 0x6, 0x4, 0xfffffff9, 0x9, 0x0, 0x5, 0x0, 0x937b}, 0xffffffffffffffff, 0x9, r5, 0x1) 01:58:34 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000051200010e000000000000000028001a"], 0x38}}, 0x0) 01:58:34 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 79) 01:58:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:58:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:58:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x86, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xe}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:58:34 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000000c0)={0x0, "aaa0ab4d643e39152498d8359ffb4784"}) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f00000014c0)={0x2, 0x80, 0x1, 0xfffeffff, 0x9, [{0xa5d5, 0x4, 0xffffffff00000001, '\x00', 0xb0e5a43e3af79830}, {0x4, 0x17, 0x7fffffff, '\x00', 0x1500}, {0x2, 0x400, 0x6, '\x00', 0x3300}, {0x988, 0x3f, 0x3, '\x00', 0x1000}, {0x8001, 0x5, 0x80, '\x00', 0x20ce}, {0x84b, 0x7, 0xfff, '\x00', 0x200}, {0x8, 0x80000001, 0x77b, '\x00', 0x3408}, {0x77ab, 0x2, 0xfff, '\x00', 0x400}, {0x5, 0x3f, 0x6, '\x00', 0x404}]}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f00000010c0)={0x18, 0x0, {0x1, @usage=0x8, r1, 0x9, 0x4, 0x9, 0x400, 0x9, 0x8, @usage, 0x5, 0x7, [0x80000000, 0x3, 0x40, 0x4, 0x2, 0xfffffffffffffff9]}, {0x401, @usage=0x6, 0x0, 0x3, 0x784, 0x1, 0xbc, 0x8, 0x0, @struct={0x1f, 0x7}, 0x80, 0xd0, [0x7f, 0x4, 0x800, 0x800, 0x3, 0x8]}, {0x7, @usage=0x2d, 0x0, 0x2, 0x5, 0x8, 0x101, 0x80, 0x12, @usage=0xfff, 0x9, 0x0, [0x7fffffff, 0x3, 0xc0, 0x2, 0x6]}, {0x81, 0x1ff, 0x9}}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r3, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xee01, 0xee01}}, './file0\x00'}) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) [ 1452.169142] loop7: detected capacity change from 0 to 512 [ 1452.171833] FAULT_INJECTION: forcing a failure. [ 1452.171833] name failslab, interval 1, probability 0, space 0, times 0 [ 1452.172849] CPU: 0 UID: 0 PID: 10596 Comm: syz-executor.7 Not tainted 6.18.0-rc3-next-20251031 #1 PREEMPT(voluntary) [ 1452.172866] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1452.172873] Call Trace: [ 1452.172878] [ 1452.172883] dump_stack_lvl+0xfa/0x120 [ 1452.172906] should_fail_ex+0x4d7/0x5e0 [ 1452.172921] ? __es_remove_extent+0x53f/0x1570 [ 1452.172940] ? __es_insert_extent+0xed2/0x1370 [ 1452.172953] should_failslab+0xc2/0x120 [ 1452.172972] kmem_cache_alloc_noprof+0x80/0x690 [ 1452.172986] ? __pfx___es_remove_extent+0x10/0x10 [ 1452.173006] ? __es_insert_extent+0xed2/0x1370 [ 1452.173020] __es_insert_extent+0xed2/0x1370 [ 1452.173046] ext4_es_insert_extent+0x4d0/0x1100 [ 1452.173069] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 1452.173085] ? lock_acquire+0x15e/0x2f0 [ 1452.173108] ? ext4_map_blocks+0x55b/0x14a0 [ 1452.173136] ? __pfx_down_write+0x10/0x10 [ 1452.173154] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1452.173176] ext4_map_blocks+0x7ff/0x14a0 [ 1452.173196] ? __up_read+0x197/0x750 [ 1452.173215] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1452.173231] ? __pfx___up_read+0x10/0x10 [ 1452.173251] ? lock_release+0xc8/0x290 [ 1452.173272] ? ext4_map_blocks+0x1e0/0x14a0 [ 1452.173295] ext4_getblk+0x682/0x8e0 [ 1452.173313] ? __pfx_ext4_getblk+0x10/0x10 [ 1452.173328] ? __pfx_security_inode_init_security+0x10/0x10 [ 1452.173347] ? crc32c+0x1ae/0x350 [ 1452.173364] ext4_bread+0x2e/0x1a0 [ 1452.173382] ext4_append+0x224/0x530 [ 1452.173404] ? __pfx_ext4_append+0x10/0x10 [ 1452.173424] ? __pfx___ext4_new_inode+0x10/0x10 [ 1452.173449] ext4_init_new_dir+0x13c/0x240 [ 1452.173463] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1452.173485] ext4_mkdir+0x3c5/0xb30 [ 1452.173504] ? __pfx_ext4_mkdir+0x10/0x10 [ 1452.173517] ? security_inode_permission+0x72/0xe0 [ 1452.173540] vfs_mkdir+0x59a/0x8d0 [ 1452.173558] do_mkdirat+0x19f/0x3d0 [ 1452.173577] ? __pfx_do_mkdirat+0x10/0x10 [ 1452.173601] __x64_sys_mkdir+0xf3/0x140 [ 1452.173619] do_syscall_64+0xbf/0x390 [ 1452.173639] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1452.173653] RIP: 0033:0x7f94bafeec27 [ 1452.173663] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1452.173675] RSP: 002b:00007f94b8564fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1452.173687] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f94bafeec27 [ 1452.173695] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1452.173703] RBP: 00007f94b8565040 R08: 0000000000000000 R09: ffffffffffffffff [ 1452.173711] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1452.173718] R13: 0000000020000100 R14: 00007f94b8565000 R15: 0000000020013c00 [ 1452.173739] 01:58:34 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'rose0\x00', 0x0}) [ 1452.224669] loop5: detected capacity change from 0 to 512 [ 1452.235969] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1452.236933] EXT4-fs (loop5): group descriptors corrupted! [ 1452.239116] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1452.239934] EXT4-fs (loop7): group descriptors corrupted! [ 1452.260949] loop5: detected capacity change from 0 to 512 [ 1452.272999] Process accounting resumed [ 1452.278867] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1452.279778] EXT4-fs (loop5): group descriptors corrupted! 01:58:34 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 80) [ 1452.285020] loop2: detected capacity change from 0 to 512 01:58:34 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000061200010e000000000000000028001a"], 0x38}}, 0x0) 01:58:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) add_key$fscrypt_v1(&(0x7f00000003c0), &(0x7f0000000400)={'fscrypt:', @desc4}, &(0x7f0000000440)={0x0, "b8b22ccf24302eafa56468d06fb08f7291432484096139b234eaeca98072e29f6507dbad1bcb21e06f341253d86f5f5395c2f69d6d3e0b1abd513870de33c45c", 0x14}, 0x48, r0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)="fe8c95f966bffdabd0e5769eeaf88b8dfd2858662865ea756e3d73d9701a3e36a7018dea87bcceeb0b108fb1d9dfb8f5c586bd023fc5c74ec189002f380cfaa826b37e", 0x43, r2) r4 = epoll_create(0xe9) epoll_ctl$EPOLL_CTL_ADD(r4, 0x2, r3, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x8, 0x4, 0x6e, 0x7f, 0x0, 0x4, 0x40, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f0000000100), 0xc}, 0x8010, 0x8, 0x5, 0x3, 0x2, 0xe574, 0xfff9, 0x0, 0x8, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0xf, r3, 0xa) 01:58:34 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) dup(r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r2, 0x0) [ 1452.327192] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1452.329061] EXT4-fs (loop2): group descriptors corrupted! 01:58:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1452.378088] loop7: detected capacity change from 0 to 512 [ 1452.398291] loop5: detected capacity change from 0 to 512 [ 1452.409613] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1452.410529] EXT4-fs (loop5): group descriptors corrupted! [ 1452.430762] loop5: detected capacity change from 0 to 512 [ 1452.438878] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors 01:58:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x70, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1452.440880] EXT4-fs (loop7): group descriptors corrupted! [ 1452.445531] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1452.447256] EXT4-fs (loop5): group descriptors corrupted! 01:58:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) 01:58:34 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @loopback}, @ethernet={0x0, @random="ba005189dd71"}, @qipcrtr, 0xbdae, 0x0, 0x0, 0x0, 0x7f}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000340)={'ip6tnl0\x00', &(0x7f0000000280)=@ethtool_flash={0x33, 0x8ab7, './file0\x00'}}) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"/328], 0x148}, 0x1, 0x0, 0x0, 0x10800}, 0x20040000) 01:58:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40005, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) [ 1452.593852] loop2: detected capacity change from 0 to 8 [ 1452.595483] loop5: detected capacity change from 0 to 512 01:58:34 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000071200010e000000000000000028001a"], 0x38}}, 0x0) [ 1452.606899] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1452.607811] EXT4-fs (loop5): group descriptors corrupted! [ 1452.616199] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (2 blocks) [ 1452.629629] loop5: detected capacity change from 0 to 512 [ 1452.636307] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1452.637141] EXT4-fs (loop5): group descriptors corrupted! [ 1452.638538] loop2: detected capacity change from 0 to 8 [ 1452.648166] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (2 blocks) 01:58:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0xe9) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x8, 0x0, 0xcd, 0xff, 0x0, 0xbe, 0x21500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x709a9e52327a2bb0, @perf_config_ext={0x0, 0xccb2}, 0x40100, 0x80000000, 0x8, 0x9, 0x2, 0x1, 0x8, 0x0, 0x8, 0x0, 0x100}, 0x0, 0x4, r0, 0x9) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r2, 0x0) 01:58:44 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x81, 0x8, 0xe1, 0x81, 0x0, 0x381, 0x40810, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x4, 0x5}, 0x40000, 0x2, 0x336, 0x8, 0x2, 0x9, 0x3, 0x0, 0x8, 0x0, 0x79a80cb8}, 0x0, 0x2, r0, 0x8) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r2, 0x0) 01:58:44 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r0, 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV(r0, 0x5000940b, &(0x7f00000000c0)={{r0}, "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"}) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f00000010c0)) ioctl$CDROMPLAYTRKIND(0xffffffffffffffff, 0x5304, &(0x7f0000001100)={0x5, 0x20, 0xa2, 0xe0}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000040)=0x3) 01:58:44 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000091200010e000000000000000028001a"], 0x38}}, 0x0) 01:58:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40006, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:58:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x13b6, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) 01:58:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 81) [ 1462.062200] loop5: detected capacity change from 0 to 512 [ 1462.063542] loop2: detected capacity change from 0 to 9 [ 1462.066081] loop7: detected capacity change from 0 to 512 01:58:44 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000a1200010e000000000000000028001a"], 0x38}}, 0x0) 01:58:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = memfd_secret(0x0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0xff, 0x9, 0x81, 0x0, 0x1, 0x20100, 0x9, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x535, 0x5}, 0x5402, 0x5, 0x6, 0x1, 0x9, 0x8, 0x1fc, 0x0, 0x0, 0x0, 0xda4}, 0x0, 0x2, r1, 0x8) r2 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r4, r0, r3, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r6 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r5) r8 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r6) keyctl$KEYCTL_MOVE(0x1e, r8, r5, r7, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r8) [ 1462.093420] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1462.095043] EXT4-fs (loop5): group descriptors corrupted! [ 1462.099692] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1462.101306] EXT4-fs (loop7): group descriptors corrupted! [ 1462.102944] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (2 blocks) 01:58:44 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r3, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000080)={'lo\x00', 0x0}) [ 1462.127056] loop2: detected capacity change from 0 to 9 [ 1462.129349] loop5: detected capacity change from 0 to 512 01:58:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) [ 1462.147897] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1462.149672] EXT4-fs (loop5): group descriptors corrupted! [ 1462.154197] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (2 blocks) 01:58:44 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000b1200010e000000000000000028001a"], 0x38}}, 0x0) 01:58:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000001180)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010200)="01", 0x1, 0x800}], 0x0, &(0x7f0000013c00)=ANY=[]) (fail_nth: 82) [ 1462.291856] loop7: detected capacity change from 0 to 512 [ 1462.295079] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 1462.295932] EXT4-fs (loop7): group descriptors corrupted! 2025/11/02 01:58:44 Manager.NewInput call failed: read tcp 127.0.0.1:44474->127.0.0.1:34543: i/o timeout VM DIAGNOSIS: 02:03:52 Registers: info registers vcpu 0 RAX=000000000040e8f7 RBX=0000000000000000 RCX=ffffffff84c61db7 RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff814ca6a0 RBP=dffffc0000000000 RSP=ffffffff85c07e00 R8 =0000000000000001 R9 =ffffed100d9c630a R10=ffff88806ce31853 R11=0000000000000001 R12=ffffffff86648150 R13=1ffffffff0b80fc7 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff84c60aae RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff8880e53ed000 00000000 00000000 LDT=0000 fffffe7c00000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055b4d47409ac CR3=000000001fd24000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=0bfc5692f999cba9b741e8c3eab5d0c8 XMM01=b98f1db7ed6e1d30a36080b0c81c3b02 XMM02=48ab81bd520c4986e87842b823cce6a4 XMM03=bc353b27005f6fdf9f1d4e535ae79495 XMM04=0000000000000000000000000000047f XMM05=0000000000000000000653a313c17e6c XMM06=000000000000000000000000000653a3 XMM07=000653a313c17e6c0000047f4f1e5764 XMM08=78000000840000002c00000022000000 XMM09=00000000000000000000000000000000 XMM10=d556631dafc51a90c01fff74412c6c09 XMM11=7c4413f3693ea20c1039d638b0a3a2ee XMM12=0d0c0f0e09080b0a0504070601000302 XMM13=0c0f0e0d080b0a090407060500030201 XMM14=00000000000000000000000000000200 XMM15=00000000000000000000000000000040 info registers vcpu 1 RAX=0000000000709f77 RBX=0000000000000001 RCX=ffffffff84c61db7 RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff814ca6a0 RBP=dffffc0000000000 RSP=ffff8880096efe58 R8 =0000000000000001 R9 =ffffed100d9e630a R10=ffff88806cf31853 R11=0000000000000001 R12=ffffffff86648150 R13=1ffff110012ddfd2 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff84c60aae RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff8880e54ed000 00000000 00000000 LDT=0000 fffffe5800000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f9bfa60b010 CR3=000000000ceac000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=d556631dafc51a90c01fff74412c6c09 XMM01=7c4413f3693ea20c1039d638b0a3a2ee XMM02=09a7ecd0f445d0e3cddec05cde245ef6 XMM03=8b84a36cdd19146dc5ef7cf4a9225cbc XMM04=0000000000000000000000005bc3d9c3 XMM05=000000000000000016e312c9d8e70c78 XMM06=00000000000000000000000016e312c9 XMM07=16e312c9d8e70c785bc3d9c3b2d4ed62 XMM08=84000000440000007c0000009c000000 XMM09=00000000000000000000000000000000 XMM10=a5a4f5c293b4dd2c0779ed265738349f XMM11=73786445f19ad37ca9a9a467847717af XMM12=0d0c0f0e09080b0a0504070601000302 XMM13=0c0f0e0d080b0a090407060500030201 XMM14=000000000000000000000000000001c0 XMM15=00000000000000000000000000000040