_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) [ 2720.987220] loop5: detected capacity change from 0 to 512 [ 2721.004245] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 2721.027909] loop4: detected capacity change from 0 to 4 21:37:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x577, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2721.049147] loop2: detected capacity change from 0 to 4 [ 2721.067559] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 2721.071662] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2721.092823] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (2 blocks) 21:37:11 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0xff07000000000000, 0x700000000}) 21:37:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:37:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) (fail_nth: 1) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:37:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x601, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2721.179104] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:37:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2721.229902] loop2: detected capacity change from 0 to 4 [ 2721.233854] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 21:37:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x820, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:37:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2721.262813] loop4: detected capacity change from 0 to 4 [ 2721.268983] FAULT_INJECTION: forcing a failure. [ 2721.268983] name failslab, interval 1, probability 0, space 0, times 0 [ 2721.271590] CPU: 1 PID: 29566 Comm: syz-executor.3 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2721.273518] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2721.274190] Call Trace: [ 2721.274405] [ 2721.274598] dump_stack_lvl+0xc1/0xf0 [ 2721.275105] should_fail_ex+0x4b4/0x5b0 [ 2721.276026] ? jbd2__journal_start+0x194/0x6b0 [ 2721.276420] should_failslab+0x9/0x20 [ 2721.276790] kmem_cache_alloc+0x5a/0x320 [ 2721.277393] jbd2__journal_start+0x194/0x6b0 [ 2721.277813] __ext4_journal_start_sb+0x4c2/0x6f0 [ 2721.278922] ? ext4_fileattr_set+0x75c/0x19f0 [ 2721.279338] ext4_fileattr_set+0x75c/0x19f0 [ 2721.279717] ? __pfx_ext4_fileattr_set+0x10/0x10 [ 2721.280796] ? vfs_fileattr_set+0x14c/0xbd0 [ 2721.281783] ? lock_acquire+0x32/0xc0 [ 2721.282113] ? vfs_fileattr_set+0x14c/0xbd0 [ 2721.282470] ? cap_capable+0x1da/0x240 [ 2721.282860] ? security_capable+0x99/0xc0 [ 2721.283533] vfs_fileattr_set+0x7a2/0xbd0 [ 2721.283898] ? __pfx_vfs_fileattr_set+0x10/0x10 [ 2721.284831] do_vfs_ioctl+0xfc1/0x1690 [ 2721.285187] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 2721.286141] ? inode_has_perm+0x171/0x1d0 [ 2721.286529] ? __pfx_file_has_perm+0x10/0x10 [ 2721.287431] ? __pfx___fget_files+0x10/0x10 [ 2721.287814] ? lock_acquire+0x32/0xc0 [ 2721.288180] ? __pfx___fget_files+0x10/0x10 [ 2721.289242] ? selinux_file_ioctl+0xba/0x270 [ 2721.289680] __x64_sys_ioctl+0x110/0x210 [ 2721.290047] do_syscall_64+0x3f/0x90 [ 2721.290985] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2721.292171] RIP: 0033:0x7fb944428b19 [ 2721.292991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2721.294421] RSP: 002b:00007fb94199e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2721.296245] RAX: ffffffffffffffda RBX: 00007fb94453bf60 RCX: 00007fb944428b19 [ 2721.297853] RDX: 0000000020000040 RSI: 0000000040086602 RDI: 0000000000000004 [ 2721.299545] RBP: 00007fb94199e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2721.301233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2721.302925] R13: 00007ffeb7ab498f R14: 00007fb94199e300 R15: 0000000000022000 [ 2721.304670] [ 2721.317168] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2721.320528] loop5: detected capacity change from 0 to 512 21:37:11 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0xff0f000000000000, 0x700000000}) [ 2721.332388] EXT4-fs (loop5): invalid first ino: 0 21:37:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:37:11 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:37:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401001b00", 0x66, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:37:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8008, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:37:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:37:11 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) (fail_nth: 1) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 2721.431511] loop2: detected capacity change from 0 to 4 [ 2721.490707] loop4: detected capacity change from 0 to 4 21:37:11 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0xff1f000000000000, 0x700000000}) [ 2721.520618] loop5: detected capacity change from 0 to 512 [ 2721.521482] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2721.526324] EXT4-fs (loop4): Unsupported encryption level 189 [ 2721.527145] EXT4-fs (loop5): invalid first ino: 0 21:37:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40002, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2721.630238] FAULT_INJECTION: forcing a failure. [ 2721.630238] name failslab, interval 1, probability 0, space 0, times 0 [ 2721.631424] CPU: 1 PID: 29611 Comm: syz-executor.0 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2721.632099] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2721.632772] Call Trace: [ 2721.633013] [ 2721.633216] dump_stack_lvl+0xc1/0xf0 [ 2721.633567] should_fail_ex+0x4b4/0x5b0 [ 2721.633933] ? jbd2__journal_start+0x194/0x6b0 [ 2721.634342] should_failslab+0x9/0x20 [ 2721.635364] kmem_cache_alloc+0x5a/0x320 [ 2721.636141] jbd2__journal_start+0x194/0x6b0 [ 2721.637129] __ext4_journal_start_sb+0x4c2/0x6f0 [ 2721.638109] ? ext4_fileattr_set+0x75c/0x19f0 [ 2721.639284] ext4_fileattr_set+0x75c/0x19f0 [ 2721.640463] ? __pfx_ext4_fileattr_set+0x10/0x10 [ 2721.641733] ? vfs_fileattr_set+0x14c/0xbd0 [ 2721.642865] ? lock_acquire+0x32/0xc0 [ 2721.643937] ? vfs_fileattr_set+0x14c/0xbd0 [ 2721.645154] ? cap_capable+0x1da/0x240 [ 2721.646220] ? security_capable+0x99/0xc0 [ 2721.647297] vfs_fileattr_set+0x7a2/0xbd0 [ 2721.648391] ? __pfx_vfs_fileattr_set+0x10/0x10 [ 2721.649690] do_vfs_ioctl+0xfc1/0x1690 [ 2721.650757] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 2721.651856] ? inode_has_perm+0x171/0x1d0 [ 2721.652954] ? __pfx_file_has_perm+0x10/0x10 [ 2721.654178] ? __pfx___fget_files+0x10/0x10 [ 2721.655342] ? lock_acquire+0x32/0xc0 [ 2721.656386] ? __pfx___fget_files+0x10/0x10 [ 2721.657562] ? selinux_file_ioctl+0xba/0x270 [ 2721.658781] __x64_sys_ioctl+0x110/0x210 [ 2721.659900] do_syscall_64+0x3f/0x90 [ 2721.660280] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2721.660745] RIP: 0033:0x7f1ddd9c2b19 [ 2721.661079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2721.662562] RSP: 002b:00007f1ddaf38188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2721.663205] RAX: ffffffffffffffda RBX: 00007f1dddad5f60 RCX: 00007f1ddd9c2b19 [ 2721.665127] RDX: 0000000020000040 RSI: 0000000040086602 RDI: 0000000000000005 [ 2721.666918] RBP: 00007f1ddaf381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2721.668761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2721.670623] R13: 00007ffd7aca31df R14: 00007f1ddaf38300 R15: 0000000000022000 [ 2721.672559] 21:37:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) (fail_nth: 2) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:37:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) (fail_nth: 2) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:37:28 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:37:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:37:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:37:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:37:28 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0xff3f000000000000, 0x700000000}) 21:37:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2738.276174] loop5: detected capacity change from 0 to 512 [ 2738.283012] loop2: detected capacity change from 0 to 4 [ 2738.283422] EXT4-fs (loop5): invalid first ino: 0 21:37:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40004, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2738.310959] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2738.313287] loop4: detected capacity change from 0 to 4 [ 2738.328022] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2738.414714] loop5: detected capacity change from 0 to 512 [ 2738.422162] EXT4-fs (loop5): unsupported inode size: 0 [ 2738.422667] EXT4-fs (loop5): blocksize: 1024 21:37:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) (fail_nth: 3) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:37:28 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0xff7f000000000000, 0x700000000}) 21:37:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40005, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:37:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000", 0x57, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:37:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000", 0x57, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:37:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:37:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40006, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2738.853036] loop2: detected capacity change from 0 to 4 [ 2738.866973] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2738.912433] FAULT_INJECTION: forcing a failure. [ 2738.912433] name failslab, interval 1, probability 0, space 0, times 0 [ 2738.913642] CPU: 0 PID: 29855 Comm: syz-executor.0 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2738.915282] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2738.917034] Call Trace: [ 2738.917284] [ 2738.917477] dump_stack_lvl+0xc1/0xf0 [ 2738.917812] should_fail_ex+0x4b4/0x5b0 [ 2738.918184] ? jbd2__journal_start+0x194/0x6b0 [ 2738.918561] should_failslab+0x9/0x20 [ 2738.919132] kmem_cache_alloc+0x5a/0x320 [ 2738.919858] jbd2__journal_start+0x194/0x6b0 [ 2738.920800] __ext4_journal_start_sb+0x4c2/0x6f0 [ 2738.921673] ? ext4_change_inode_journal_flag+0x277/0x550 [ 2738.922128] ext4_change_inode_journal_flag+0x277/0x550 [ 2738.922635] ? __ext4_journal_stop+0x10b/0x1f0 [ 2738.923467] ext4_fileattr_set+0x14fa/0x19f0 [ 2738.924423] ? __pfx_ext4_fileattr_set+0x10/0x10 [ 2738.925223] ? vfs_fileattr_set+0x14c/0xbd0 [ 2738.925590] ? cap_capable+0x1da/0x240 [ 2738.925931] ? security_capable+0x99/0xc0 [ 2738.926408] vfs_fileattr_set+0x7a2/0xbd0 [ 2738.927144] ? __pfx_vfs_fileattr_set+0x10/0x10 [ 2738.928103] do_vfs_ioctl+0xfc1/0x1690 [ 2738.928814] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 2738.929770] ? inode_has_perm+0x171/0x1d0 [ 2738.930540] ? __pfx_file_has_perm+0x10/0x10 [ 2738.931548] ? __pfx___fget_files+0x10/0x10 [ 2738.932326] ? lock_acquire+0x32/0xc0 [ 2738.932829] ? __pfx___fget_files+0x10/0x10 [ 2738.933202] ? selinux_file_ioctl+0xba/0x270 [ 2738.933626] __x64_sys_ioctl+0x110/0x210 [ 2738.933978] do_syscall_64+0x3f/0x90 [ 2738.934307] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2738.935232] RIP: 0033:0x7f1ddd9c2b19 [ 2738.935908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2738.937472] RSP: 002b:00007f1ddaf38188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2738.939174] RAX: ffffffffffffffda RBX: 00007f1dddad5f60 RCX: 00007f1ddd9c2b19 [ 2738.940474] RDX: 0000000020000040 RSI: 0000000040086602 RDI: 0000000000000005 [ 2738.941825] RBP: 00007f1ddaf381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2738.942794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2738.943360] R13: 00007ffd7aca31df R14: 00007f1ddaf38300 R15: 0000000000022000 [ 2738.944925] [ 2738.949558] loop5: detected capacity change from 0 to 512 [ 2739.021965] EXT4-fs (loop5): unsupported inode size: 0 [ 2739.023312] EXT4-fs (loop5): blocksize: 1024 21:37:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2755.526054] loop5: detected capacity change from 0 to 512 [ 2755.530990] EXT4-fs (loop5): unsupported inode size: 0 [ 2755.533588] EXT4-fs (loop5): blocksize: 1024 21:37:45 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:37:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40007, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:37:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000", 0x57, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:37:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) (fail_nth: 3) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:37:45 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0xffff070000000000, 0x700000000}) 21:37:45 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) (fail_nth: 4) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:37:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2755.545743] FAULT_INJECTION: forcing a failure. [ 2755.545743] name failslab, interval 1, probability 0, space 0, times 0 [ 2755.548244] CPU: 0 PID: 29867 Comm: syz-executor.3 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2755.550074] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2755.550777] Call Trace: [ 2755.551012] [ 2755.551225] dump_stack_lvl+0xc1/0xf0 [ 2755.551588] should_fail_ex+0x4b4/0x5b0 [ 2755.552614] ? jbd2__journal_start+0x194/0x6b0 [ 2755.553640] should_failslab+0x9/0x20 [ 2755.553982] kmem_cache_alloc+0x5a/0x320 [ 2755.554364] jbd2__journal_start+0x194/0x6b0 [ 2755.554778] __ext4_journal_start_sb+0x4c2/0x6f0 [ 2755.555203] ? ext4_change_inode_journal_flag+0x277/0x550 [ 2755.555845] ext4_change_inode_journal_flag+0x277/0x550 [ 2755.556337] ? __ext4_journal_stop+0x10b/0x1f0 [ 2755.556765] ext4_fileattr_set+0x14fa/0x19f0 [ 2755.557184] ? __pfx_ext4_fileattr_set+0x10/0x10 [ 2755.557628] ? vfs_fileattr_set+0x14c/0xbd0 [ 2755.558044] ? cap_capable+0x1da/0x240 [ 2755.558418] ? security_capable+0x99/0xc0 [ 2755.558821] vfs_fileattr_set+0x7a2/0xbd0 [ 2755.559206] ? __pfx_vfs_fileattr_set+0x10/0x10 [ 2755.559867] do_vfs_ioctl+0xfc1/0x1690 [ 2755.560264] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 2755.560692] ? inode_has_perm+0x171/0x1d0 [ 2755.561109] ? __pfx_file_has_perm+0x10/0x10 [ 2755.561529] ? __pfx___fget_files+0x10/0x10 [ 2755.561921] ? lock_acquire+0x32/0xc0 [ 2755.562279] ? __pfx___fget_files+0x10/0x10 [ 2755.562689] ? selinux_file_ioctl+0xba/0x270 [ 2755.563121] __x64_sys_ioctl+0x110/0x210 [ 2755.563503] do_syscall_64+0x3f/0x90 [ 2755.564033] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2755.564507] RIP: 0033:0x7fb944428b19 [ 2755.565403] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2755.566926] RSP: 002b:00007fb94199e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2755.567588] RAX: ffffffffffffffda RBX: 00007fb94453bf60 RCX: 00007fb944428b19 [ 2755.569191] RDX: 0000000020000040 RSI: 0000000040086602 RDI: 0000000000000004 [ 2755.569596] loop2: detected capacity change from 0 to 4 [ 2755.569804] RBP: 00007fb94199e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2755.569821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2755.571213] loop4: detected capacity change from 0 to 4 [ 2755.571667] R13: 00007ffeb7ab498f R14: 00007fb94199e300 R15: 0000000000022000 [ 2755.571924] [ 2755.596546] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2755.599910] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 21:37:46 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0xffffffff00000000, 0x700000000}) 21:37:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:37:46 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) (fail_nth: 5) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:37:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2755.771326] loop5: detected capacity change from 0 to 512 [ 2755.790229] EXT4-fs (loop5): unsupported inode size: 0 [ 2755.791812] EXT4-fs (loop5): blocksize: 1024 [ 2755.801274] loop2: detected capacity change from 0 to 4 [ 2755.815466] FAULT_INJECTION: forcing a failure. [ 2755.815466] name failslab, interval 1, probability 0, space 0, times 0 [ 2755.818748] CPU: 0 PID: 29931 Comm: syz-executor.0 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2755.820938] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2755.823121] Call Trace: [ 2755.823831] [ 2755.824446] dump_stack_lvl+0xc1/0xf0 [ 2755.824845] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2755.825470] should_fail_ex+0x4b4/0x5b0 [ 2755.827909] ? jbd2__journal_start+0x194/0x6b0 [ 2755.829196] should_failslab+0x9/0x20 [ 2755.830263] kmem_cache_alloc+0x5a/0x320 [ 2755.831407] jbd2__journal_start+0x194/0x6b0 [ 2755.832616] __ext4_journal_start_sb+0x4c2/0x6f0 [ 2755.833885] ? ext4_ind_migrate+0x2cb/0x840 [ 2755.834887] ext4_ind_migrate+0x2cb/0x840 [ 2755.835961] ? ext4_change_inode_journal_flag+0x361/0x550 [ 2755.837467] ? __ext4_journal_stop+0x10b/0x1f0 [ 2755.838705] ext4_fileattr_set+0x1521/0x19f0 [ 2755.839895] ? __pfx_ext4_fileattr_set+0x10/0x10 [ 2755.841122] ? vfs_fileattr_set+0x14c/0xbd0 [ 2755.842173] ? cap_capable+0x1da/0x240 [ 2755.843229] ? security_capable+0x99/0xc0 [ 2755.844306] vfs_fileattr_set+0x7a2/0xbd0 [ 2755.845373] ? __pfx_vfs_fileattr_set+0x10/0x10 [ 2755.846654] do_vfs_ioctl+0xfc1/0x1690 [ 2755.847696] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 2755.848863] ? inode_has_perm+0x171/0x1d0 [ 2755.849994] ? __pfx_file_has_perm+0x10/0x10 [ 2755.851189] ? __pfx___fget_files+0x10/0x10 [ 2755.852390] ? lock_acquire+0x32/0xc0 [ 2755.853441] ? __pfx___fget_files+0x10/0x10 [ 2755.854626] ? selinux_file_ioctl+0xba/0x270 [ 2755.855846] __x64_sys_ioctl+0x110/0x210 [ 2755.856959] do_syscall_64+0x3f/0x90 [ 2755.858001] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2755.859380] RIP: 0033:0x7f1ddd9c2b19 [ 2755.860414] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2755.865218] RSP: 002b:00007f1ddaf38188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2755.867079] RAX: ffffffffffffffda RBX: 00007f1dddad5f60 RCX: 00007f1ddd9c2b19 [ 2755.868735] RDX: 0000000020000040 RSI: 0000000040086602 RDI: 0000000000000005 [ 2755.870399] RBP: 00007f1ddaf381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2755.872080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2755.873602] R13: 00007ffd7aca31df R14: 00007f1ddaf38300 R15: 0000000000022000 [ 2755.875158] 21:38:01 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) (fail_nth: 6) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:38:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40008, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:38:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:01 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000002}) 21:38:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) (fail_nth: 4) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:38:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:01 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) [ 2771.544168] loop4: detected capacity change from 0 to 4 [ 2771.548363] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2771.554712] loop2: detected capacity change from 0 to 4 [ 2771.577969] loop5: detected capacity change from 0 to 512 21:38:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) (fail_nth: 5) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2771.599932] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2771.602932] loop4: detected capacity change from 0 to 4 [ 2771.604678] EXT4-fs (loop4): Unsupported encryption level 189 [ 2771.616846] EXT4-fs (loop5): unsupported inode size: 0 [ 2771.617209] EXT4-fs (loop5): blocksize: 1024 21:38:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40018, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:38:02 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) (fail_nth: 7) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:38:02 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000003}) 21:38:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2771.775095] FAULT_INJECTION: forcing a failure. [ 2771.775095] name failslab, interval 1, probability 0, space 0, times 0 [ 2771.776679] CPU: 1 PID: 30054 Comm: syz-executor.3 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2771.777762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2771.778838] Call Trace: [ 2771.779189] [ 2771.779506] dump_stack_lvl+0xc1/0xf0 [ 2771.780064] should_fail_ex+0x4b4/0x5b0 [ 2771.780639] ? jbd2__journal_start+0x194/0x6b0 [ 2771.781280] should_failslab+0x9/0x20 [ 2771.781810] kmem_cache_alloc+0x5a/0x320 [ 2771.782377] jbd2__journal_start+0x194/0x6b0 [ 2771.783003] __ext4_journal_start_sb+0x4c2/0x6f0 [ 2771.783665] ? ext4_ind_migrate+0x2cb/0x840 [ 2771.784288] ext4_ind_migrate+0x2cb/0x840 [ 2771.784873] ? ext4_change_inode_journal_flag+0x361/0x550 [ 2771.785635] ? __ext4_journal_stop+0x10b/0x1f0 [ 2771.786284] ext4_fileattr_set+0x1521/0x19f0 [ 2771.786931] ? __pfx_ext4_fileattr_set+0x10/0x10 [ 2771.787598] ? vfs_fileattr_set+0x14c/0xbd0 [ 2771.788219] ? cap_capable+0x1da/0x240 [ 2771.788785] ? security_capable+0x99/0xc0 [ 2771.789382] vfs_fileattr_set+0x7a2/0xbd0 [ 2771.789971] ? __pfx_vfs_fileattr_set+0x10/0x10 [ 2771.790648] do_vfs_ioctl+0xfc1/0x1690 [ 2771.791201] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 2771.791812] ? inode_has_perm+0x171/0x1d0 [ 2771.792435] ? __pfx_file_has_perm+0x10/0x10 [ 2771.793069] ? __pfx___fget_files+0x10/0x10 [ 2771.793667] ? lock_acquire+0x32/0xc0 [ 2771.794199] ? __pfx___fget_files+0x10/0x10 [ 2771.794757] ? selinux_file_ioctl+0xba/0x270 [ 2771.795382] __x64_sys_ioctl+0x110/0x210 [ 2771.795981] do_syscall_64+0x3f/0x90 [ 2771.796523] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2771.797242] RIP: 0033:0x7fb944428b19 [ 2771.797755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2771.800142] RSP: 002b:00007fb94199e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2771.801165] RAX: ffffffffffffffda RBX: 00007fb94453bf60 RCX: 00007fb944428b19 [ 2771.802118] RDX: 0000000020000040 RSI: 0000000040086602 RDI: 0000000000000004 [ 2771.803074] RBP: 00007fb94199e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2771.804037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2771.804992] R13: 00007ffeb7ab498f R14: 00007fb94199e300 R15: 0000000000022000 [ 2771.805983] [ 2771.818023] loop4: detected capacity change from 0 to 4 [ 2771.831595] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2771.844133] loop2: detected capacity change from 0 to 4 [ 2771.867595] FAULT_INJECTION: forcing a failure. [ 2771.867595] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2771.869390] CPU: 1 PID: 30052 Comm: syz-executor.0 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2771.870509] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2771.871622] Call Trace: [ 2771.872000] [ 2771.872327] dump_stack_lvl+0xc1/0xf0 [ 2771.872901] should_fail_ex+0x4b4/0x5b0 [ 2771.873444] _copy_to_user+0x2e/0x150 [ 2771.873945] simple_read_from_buffer+0xd0/0x170 [ 2771.874555] proc_fail_nth_read+0x19c/0x230 [ 2771.875111] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2771.875719] ? security_file_permission+0xb5/0xe0 [ 2771.876387] vfs_read+0x257/0x940 [ 2771.876855] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2771.877480] ? __pfx_vfs_read+0x10/0x10 [ 2771.877991] ? __pfx___fget_files+0x10/0x10 [ 2771.878561] ? __fget_files+0x270/0x480 [ 2771.879097] ksys_read+0x12b/0x260 [ 2771.879579] ? __pfx_ksys_read+0x10/0x10 [ 2771.880125] do_syscall_64+0x3f/0x90 [ 2771.880635] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2771.881305] RIP: 0033:0x7f1ddd97569c [ 2771.881782] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2771.883987] RSP: 002b:00007f1ddaf38170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2771.884937] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1ddd97569c [ 2771.885815] RDX: 000000000000000f RSI: 00007f1ddaf381e0 RDI: 0000000000000006 [ 2771.886706] RBP: 00007f1ddaf381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2771.887590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2771.888507] R13: 00007ffd7aca31df R14: 00007f1ddaf38300 R15: 0000000000022000 [ 2771.889424] [ 2771.893720] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) 21:38:15 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000004}) 21:38:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) (fail_nth: 6) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:38:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:38:15 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:38:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4001c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:38:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2784.991614] loop5: detected capacity change from 0 to 512 [ 2784.995199] loop4: detected capacity change from 0 to 4 [ 2784.997384] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2785.000246] EXT4-fs (loop5): unsupported inode size: 0 [ 2785.000617] EXT4-fs (loop5): blocksize: 1024 [ 2785.002679] loop2: detected capacity change from 0 to 4 [ 2785.006156] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) 21:38:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:38:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:15 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000005}) 21:38:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) (fail_nth: 7) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:38:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x2, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 2785.136765] loop5: detected capacity change from 0 to 512 [ 2785.147542] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2785.201306] loop4: detected capacity change from 0 to 4 [ 2785.211545] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2785.231079] FAULT_INJECTION: forcing a failure. [ 2785.231079] name failslab, interval 1, probability 0, space 0, times 0 [ 2785.231965] CPU: 1 PID: 30225 Comm: syz-executor.3 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2785.232518] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2785.233064] Call Trace: [ 2785.233244] [ 2785.233411] dump_stack_lvl+0xc1/0xf0 [ 2785.233700] should_fail_ex+0x4b4/0x5b0 [ 2785.233991] ? jbd2__journal_start+0x194/0x6b0 [ 2785.234332] should_failslab+0x9/0x20 [ 2785.234601] kmem_cache_alloc+0x5a/0x320 [ 2785.234911] jbd2__journal_start+0x194/0x6b0 [ 2785.235230] __ext4_journal_start_sb+0x4c2/0x6f0 [ 2785.235581] ? ext4_ind_migrate+0x2cb/0x840 [ 2785.235889] ext4_ind_migrate+0x2cb/0x840 [ 2785.236207] ? ext4_change_inode_journal_flag+0x361/0x550 [ 2785.236590] ? __ext4_journal_stop+0x10b/0x1f0 [ 2785.236926] ext4_fileattr_set+0x1521/0x19f0 [ 2785.237250] ? __pfx_ext4_fileattr_set+0x10/0x10 [ 2785.237600] ? vfs_fileattr_set+0x14c/0xbd0 [ 2785.237911] ? cap_capable+0x1da/0x240 [ 2785.238211] ? security_capable+0x99/0xc0 [ 2785.238506] vfs_fileattr_set+0x7a2/0xbd0 [ 2785.238812] ? __pfx_vfs_fileattr_set+0x10/0x10 [ 2785.239148] do_vfs_ioctl+0xfc1/0x1690 [ 2785.239438] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 2785.239751] ? inode_has_perm+0x171/0x1d0 [ 2785.240070] ? __pfx_file_has_perm+0x10/0x10 [ 2785.240408] ? __pfx___fget_files+0x10/0x10 [ 2785.240724] ? lock_acquire+0x32/0xc0 [ 2785.241003] ? __pfx___fget_files+0x10/0x10 [ 2785.241338] ? selinux_file_ioctl+0xba/0x270 [ 2785.241673] __x64_sys_ioctl+0x110/0x210 [ 2785.241979] do_syscall_64+0x3f/0x90 [ 2785.242253] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2785.242633] RIP: 0033:0x7fb944428b19 [ 2785.242889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2785.244144] RSP: 002b:00007fb94199e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2785.244653] RAX: ffffffffffffffda RBX: 00007fb94453bf60 RCX: 00007fb944428b19 [ 2785.245136] RDX: 0000000020000040 RSI: 0000000040086602 RDI: 0000000000000004 [ 2785.245623] RBP: 00007fb94199e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2785.246113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2785.246609] R13: 00007ffeb7ab498f R14: 00007fb94199e300 R15: 0000000000022000 [ 2785.247127] 21:38:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) (fail_nth: 8) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:38:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4003a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:38:29 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000006}) 21:38:29 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:38:29 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x4b47, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:38:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2799.313397] loop2: detected capacity change from 0 to 4 [ 2799.336269] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2799.346216] loop4: detected capacity change from 0 to 4 [ 2799.352189] loop5: detected capacity change from 0 to 512 [ 2799.364975] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2799.384992] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2799.389511] FAULT_INJECTION: forcing a failure. [ 2799.389511] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2799.391410] CPU: 1 PID: 30294 Comm: syz-executor.3 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2799.392504] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2799.393553] Call Trace: [ 2799.393907] [ 2799.394219] dump_stack_lvl+0xc1/0xf0 [ 2799.394763] should_fail_ex+0x4b4/0x5b0 [ 2799.395311] _copy_from_user+0x2e/0x180 [ 2799.395856] kstrtouint_from_user+0xb0/0x170 [ 2799.396482] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 2799.397170] ? lock_acquire.part.0+0xec/0x320 [ 2799.397790] ? ksys_write+0x12b/0x260 [ 2799.398345] proc_fail_nth_write+0x7c/0x220 [ 2799.398929] ? __pfx_proc_fail_nth_write+0x10/0x10 21:38:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40065, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2799.399584] ? ksys_write+0x12b/0x260 [ 2799.400320] ? lock_is_held_type+0x9f/0x120 [ 2799.400919] vfs_write+0x2cf/0xdc0 [ 2799.401417] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 2799.402096] ? __pfx_vfs_write+0x10/0x10 [ 2799.402652] ? __pfx___fget_files+0x10/0x10 [ 2799.403253] ? __fget_files+0x270/0x480 [ 2799.403827] ksys_write+0x12b/0x260 [ 2799.404367] ? __pfx_ksys_write+0x10/0x10 [ 2799.404969] do_syscall_64+0x3f/0x90 [ 2799.405504] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2799.406215] RIP: 0033:0x7fb9443db5ff [ 2799.406709] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 2799.409008] RSP: 002b:00007fb94199e170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 2799.409997] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb9443db5ff [ 2799.410914] RDX: 0000000000000001 RSI: 00007fb94199e1e0 RDI: 0000000000000005 [ 2799.411824] RBP: 00007fb94199e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2799.412764] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 2799.413673] R13: 00007ffeb7ab498f R14: 00007fb94199e300 R15: 0000000000022000 [ 2799.414621] 21:38:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:29 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000007}) 21:38:30 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x4b49, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 2799.578954] loop2: detected capacity change from 0 to 4 [ 2799.601932] EXT4-fs (loop2): Unsupported encryption level 189 [ 2799.618284] loop4: detected capacity change from 0 to 4 21:38:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400f0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2799.628057] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2799.659370] loop5: detected capacity change from 0 to 512 [ 2799.668016] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 21:38:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:38:44 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000008}) 21:38:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x2, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2813.689749] loop4: detected capacity change from 0 to 4 21:38:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400fe, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:38:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, 0x0) 21:38:44 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:38:44 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x541b, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:38:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2813.719917] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2813.726704] loop5: detected capacity change from 0 to 512 21:38:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2813.761598] loop2: detected capacity change from 0 to 4 [ 2813.763640] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) 21:38:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, 0x0) 21:38:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40121, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:38:44 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000000b}) [ 2813.860701] loop4: detected capacity change from 0 to 4 [ 2813.870851] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 21:38:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2813.880760] loop5: detected capacity change from 0 to 512 21:38:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x402a6, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:38:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:44 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x5421, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 2813.983680] loop2: detected capacity change from 0 to 4 [ 2813.989635] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2814.015379] loop4: detected capacity change from 0 to 4 [ 2814.021623] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 21:38:58 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:38:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, 0x0) 21:38:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x5450, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:38:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40300, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:38:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:58 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x4b47, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:38:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000000c}) 21:38:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2827.879639] loop2: detected capacity change from 0 to 4 [ 2827.953184] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2827.964193] loop5: detected capacity change from 0 to 512 [ 2827.966499] loop4: detected capacity change from 0 to 4 [ 2827.979122] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 21:38:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000000d}) 21:38:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) 21:38:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401001b00"/120, 0x78, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:38:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40480, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:38:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, 0x0) 21:38:58 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x4b49, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2828.168951] loop5: detected capacity change from 0 to 512 [ 2828.172955] loop4: detected capacity change from 0 to 4 [ 2828.176044] EXT4-fs (loop5): failed to parse options in superblock: ÷ 21:38:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x5451, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 2828.193993] loop2: detected capacity change from 0 to 4 [ 2828.209946] EXT4-fs (loop2): Unsupported encryption level 189 21:38:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000000e}) [ 2828.217369] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 2828.279601] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2843.282968] loop2: detected capacity change from 0 to 4 [ 2843.294572] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) 21:39:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:39:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x541b, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:39:13 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x5452, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:39:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, 0x0) 21:39:13 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:39:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40500, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:39:13 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000000f}) [ 2843.321181] loop4: detected capacity change from 0 to 4 21:39:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:39:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, 0x0) 21:39:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40600, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2843.424428] loop2: detected capacity change from 0 to 4 21:39:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x5421, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:39:13 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000010}) [ 2843.431672] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) 21:39:13 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x5460, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:39:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2843.521100] loop4: detected capacity change from 0 to 4 21:39:13 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:39:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) 21:39:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40700, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:39:31 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:39:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 1) 21:39:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401001b00000000000000", 0x6c, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:39:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x5450, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:39:31 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40049409, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 2860.650504] FAULT_INJECTION: forcing a failure. [ 2860.650504] name failslab, interval 1, probability 0, space 0, times 0 [ 2860.651643] CPU: 0 PID: 30972 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2860.652371] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2860.653089] Call Trace: [ 2860.653351] [ 2860.653569] dump_stack_lvl+0xc1/0xf0 [ 2860.654067] should_fail_ex+0x4b4/0x5b0 [ 2860.654452] should_failslab+0x9/0x20 [ 2860.654807] __kmem_cache_alloc_node+0x5b/0x310 [ 2860.655234] ? __do_sys_memfd_create+0x12d/0x910 [ 2860.655694] ? __do_sys_memfd_create+0x12d/0x910 [ 2860.656138] __kmalloc+0x46/0xc0 [ 2860.656474] __do_sys_memfd_create+0x12d/0x910 21:39:31 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000011}) [ 2860.656913] ? ksys_write+0x1a7/0x260 [ 2860.657495] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 2860.657991] do_syscall_64+0x3f/0x90 [ 2860.658360] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2860.658991] RIP: 0033:0x7f6840a57b19 [ 2860.659352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2860.661050] RSP: 002b:00007f683dfccf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2860.661726] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f6840a57b19 [ 2860.662365] RDX: 0000000000002c00 RSI: 0000000000000000 RDI: 00007f6840ab10fb [ 2860.663018] RBP: 0000000000000005 R08: 0000000000001600 R09: ffffffffffffffff [ 2860.663665] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2860.664312] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012900 [ 2860.664975] [ 2860.666576] loop4: detected capacity change from 0 to 4 [ 2860.669237] loop2: detected capacity change from 0 to 4 [ 2860.676911] EXT4-fs (loop4): Unsupported encryption level 189 [ 2860.683933] EXT4-fs (loop2): Unsupported encryption level 189 21:39:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41800, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:39:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41c00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:39:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:39:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 2) 21:39:31 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086604, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:39:31 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:39:31 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000024}) 21:39:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:39:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x5451, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2860.994013] loop5: detected capacity change from 0 to 512 [ 2861.004067] loop2: detected capacity change from 0 to 4 [ 2861.027013] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 2861.032233] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2861.077960] EXT4-fs warning (device sda): __ext4_ioctl:1241: Setting inode version is not supported with metadata_csum enabled. 21:39:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 1) [ 2861.090722] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 2861.105234] FAULT_INJECTION: forcing a failure. [ 2861.105234] name failslab, interval 1, probability 0, space 0, times 0 [ 2861.107739] CPU: 1 PID: 31110 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2861.109137] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2861.110772] Call Trace: [ 2861.111019] [ 2861.111224] dump_stack_lvl+0xc1/0xf0 [ 2861.111581] should_fail_ex+0x4b4/0x5b0 [ 2861.111953] should_failslab+0x9/0x20 [ 2861.112293] __kmem_cache_alloc_node+0x5b/0x310 [ 2861.112712] ? __do_sys_memfd_create+0x12d/0x910 [ 2861.113159] ? __do_sys_memfd_create+0x12d/0x910 [ 2861.113570] __kmalloc+0x46/0xc0 [ 2861.113868] __do_sys_memfd_create+0x12d/0x910 [ 2861.114266] ? ksys_write+0x1a7/0x260 [ 2861.114611] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 2861.115058] do_syscall_64+0x3f/0x90 [ 2861.116086] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2861.117257] RIP: 0033:0x7fe02d21cb19 [ 2861.117901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2861.119987] RSP: 002b:00007fe02a791f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2861.120617] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe02d21cb19 [ 2861.121239] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007fe02d2760fb [ 2861.121802] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 2861.122375] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 2861.122935] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012900 [ 2861.123535] 21:39:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42101, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2861.203042] EXT4-fs warning (device sda): __ext4_ioctl:1241: Setting inode version is not supported with metadata_csum enabled. [ 2861.213048] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:39:47 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) [ 2877.367709] loop2: detected capacity change from 0 to 4 21:39:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:39:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x43700, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:39:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 2) 21:39:47 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000048}) 21:39:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 3) 21:39:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x5452, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:39:47 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x4008660f, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 2877.382455] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) 21:39:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2877.424017] loop2: detected capacity change from 0 to 4 [ 2877.428494] FAULT_INJECTION: forcing a failure. [ 2877.428494] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2877.430212] CPU: 1 PID: 31237 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2877.431260] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2877.432303] Call Trace: [ 2877.432645] [ 2877.432959] dump_stack_lvl+0xc1/0xf0 [ 2877.433527] should_fail_ex+0x4b4/0x5b0 [ 2877.434082] _copy_from_user+0x2e/0x180 [ 2877.434622] __do_sys_memfd_create+0x1b0/0x910 [ 2877.435241] ? ksys_write+0x1a7/0x260 [ 2877.435768] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 2877.436469] do_syscall_64+0x3f/0x90 [ 2877.436799] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2877.436985] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2877.438210] RIP: 0033:0x7f6840a57b19 [ 2877.438705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 21:39:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x43a00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2877.440968] RSP: 002b:00007f683dfccf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2877.442127] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f6840a57b19 [ 2877.443040] RDX: 0000000000002c00 RSI: 0000000000000000 RDI: 00007f6840ab10fb [ 2877.443950] RBP: 0000000000000005 R08: 0000000000001600 R09: ffffffffffffffff [ 2877.444878] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2877.445829] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012900 [ 2877.446762] [ 2877.457683] loop4: detected capacity change from 0 to 4 [ 2877.473578] EXT4-fs (loop4): Unsupported encryption level 189 21:39:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401001b00", 0x66, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:39:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x5460, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:39:47 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000052}) [ 2877.575854] loop2: detected capacity change from 0 to 4 [ 2877.593878] EXT4-fs (loop2): Unsupported encryption level 189 21:40:03 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:40:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x6609, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:40:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:40:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 3) 21:40:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x46500, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:40:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 4) 21:40:03 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000055}) 21:40:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40049409, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2893.014073] loop2: detected capacity change from 0 to 4 [ 2893.018684] FAULT_INJECTION: forcing a failure. [ 2893.018684] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2893.019551] CPU: 1 PID: 31368 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2893.020121] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2893.020700] Call Trace: [ 2893.020876] [ 2893.021042] dump_stack_lvl+0xc1/0xf0 [ 2893.021328] should_fail_ex+0x4b4/0x5b0 [ 2893.021640] _copy_from_user+0x2e/0x180 [ 2893.021923] __do_sys_memfd_create+0x1b0/0x910 [ 2893.022259] ? ksys_write+0x1a7/0x260 [ 2893.022530] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 2893.022909] do_syscall_64+0x3f/0x90 [ 2893.023176] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2893.023548] RIP: 0033:0x7fe02d21cb19 [ 2893.023811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2893.025092] RSP: 002b:00007fe02a791f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2893.025678] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe02d21cb19 [ 2893.026213] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007fe02d2760fb [ 2893.026705] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 2893.027197] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 2893.027695] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012900 [ 2893.028201] [ 2893.034032] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) 21:40:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40087602, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:40:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x48004, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2893.069765] FAULT_INJECTION: forcing a failure. [ 2893.069765] name failslab, interval 1, probability 0, space 0, times 0 [ 2893.071530] CPU: 0 PID: 31375 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2893.072603] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2893.073702] Call Trace: [ 2893.074069] [ 2893.074390] dump_stack_lvl+0xc1/0xf0 [ 2893.074945] should_fail_ex+0x4b4/0x5b0 [ 2893.075513] should_failslab+0x9/0x20 [ 2893.076024] kmem_cache_alloc_lru+0x6b/0x590 [ 2893.076641] ? shmem_alloc_inode+0x27/0x50 [ 2893.077205] ? lock_release+0x1e3/0x710 [ 2893.077781] shmem_alloc_inode+0x27/0x50 [ 2893.078320] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 2893.078975] alloc_inode+0x63/0x240 [ 2893.079487] new_inode+0x25/0x1f0 [ 2893.079997] shmem_get_inode+0x181/0xe30 [ 2893.080543] ? do_raw_spin_unlock+0x53/0x220 [ 2893.081172] __shmem_file_setup+0x171/0x300 [ 2893.081760] __do_sys_memfd_create+0x32b/0x910 [ 2893.082412] ? ksys_write+0x1a7/0x260 [ 2893.082933] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 2893.083660] do_syscall_64+0x3f/0x90 [ 2893.084175] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2893.084899] RIP: 0033:0x7f6840a57b19 [ 2893.085390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2893.087776] RSP: 002b:00007f683dfccf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2893.088791] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f6840a57b19 [ 2893.089759] RDX: 0000000000002c00 RSI: 0000000000000000 RDI: 00007f6840ab10fb [ 2893.090710] RBP: 0000000000000005 R08: 0000000000001600 R09: ffffffffffffffff [ 2893.091669] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2893.092612] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012900 [ 2893.093608] 21:40:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 4) 21:40:03 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000078}) [ 2893.136924] EXT4-fs warning (device sda): __ext4_ioctl:1241: Setting inode version is not supported with metadata_csum enabled. 21:40:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2893.163816] EXT4-fs warning (device sda): __ext4_ioctl:1241: Setting inode version is not supported with metadata_csum enabled. [ 2893.181074] FAULT_INJECTION: forcing a failure. [ 2893.181074] name failslab, interval 1, probability 0, space 0, times 0 [ 2893.182610] CPU: 0 PID: 31430 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2893.183665] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2893.184706] Call Trace: [ 2893.185058] [ 2893.185374] dump_stack_lvl+0xc1/0xf0 [ 2893.185933] should_fail_ex+0x4b4/0x5b0 [ 2893.186489] should_failslab+0x9/0x20 [ 2893.187009] kmem_cache_alloc_lru+0x6b/0x590 [ 2893.187602] ? shmem_alloc_inode+0x27/0x50 [ 2893.188180] ? lock_release+0x1e3/0x710 [ 2893.188743] shmem_alloc_inode+0x27/0x50 [ 2893.189294] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 2893.189957] alloc_inode+0x63/0x240 [ 2893.190476] new_inode+0x25/0x1f0 [ 2893.190973] shmem_get_inode+0x181/0xe30 [ 2893.191547] ? do_raw_spin_unlock+0x53/0x220 [ 2893.192154] __shmem_file_setup+0x171/0x300 [ 2893.192774] __do_sys_memfd_create+0x32b/0x910 [ 2893.193516] ? ksys_write+0x1a7/0x260 [ 2893.194083] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 2893.194817] do_syscall_64+0x3f/0x90 [ 2893.195366] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2893.196098] RIP: 0033:0x7fe02d21cb19 [ 2893.196615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2893.198998] RSP: 002b:00007fe02a791f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2893.200012] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe02d21cb19 [ 2893.200950] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007fe02d2760fb [ 2893.201922] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 2893.202860] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 2893.203812] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012900 [ 2893.204801] 21:40:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:40:03 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x7000000c0}) 21:40:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4a602, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2893.303638] loop2: detected capacity change from 0 to 4 [ 2893.319438] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) 21:40:03 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:40:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 5) 21:40:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086604, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:40:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x4020940d, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:40:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2893.427235] loop5: detected capacity change from 0 to 512 [ 2893.430693] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 2893.432347] EXT4-fs warning (device sda): __ext4_ioctl:1241: Setting inode version is not supported with metadata_csum enabled. 21:40:03 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x7000000e0}) 21:40:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2893.448596] EXT4-fs warning (device sda): __ext4_ioctl:1241: Setting inode version is not supported with metadata_csum enabled. [ 2893.458114] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 21:40:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4feff, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2893.520346] loop2: detected capacity change from 0 to 4 [ 2893.539449] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2893.545015] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:40:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 5) 21:40:18 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:40:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:40:18 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x80086601, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:40:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x4008660f, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:40:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 6) 21:40:18 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000300}) 21:40:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4fffe, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2908.153909] FAULT_INJECTION: forcing a failure. [ 2908.153909] name failslab, interval 1, probability 0, space 0, times 0 [ 2908.154849] CPU: 0 PID: 31634 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2908.155483] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2908.156113] Call Trace: [ 2908.156325] [ 2908.156516] dump_stack_lvl+0xc1/0xf0 [ 2908.156845] should_fail_ex+0x4b4/0x5b0 [ 2908.157181] ? security_inode_alloc+0x38/0x160 [ 2908.157555] should_failslab+0x9/0x20 [ 2908.157887] kmem_cache_alloc+0x5a/0x320 [ 2908.158235] security_inode_alloc+0x38/0x160 [ 2908.158472] loop2: detected capacity change from 0 to 4 [ 2908.158594] inode_init_always+0xbb2/0xea0 [ 2908.159394] alloc_inode+0x84/0x240 [ 2908.159696] new_inode+0x25/0x1f0 [ 2908.160006] shmem_get_inode+0x181/0xe30 [ 2908.160340] ? do_raw_spin_unlock+0x53/0x220 [ 2908.160709] __shmem_file_setup+0x171/0x300 [ 2908.161076] __do_sys_memfd_create+0x32b/0x910 [ 2908.161487] ? ksys_write+0x1a7/0x260 [ 2908.161866] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 2908.162314] do_syscall_64+0x3f/0x90 [ 2908.162641] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2908.163063] RIP: 0033:0x7f6840a57b19 [ 2908.163369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2908.164793] RSP: 002b:00007f683dfccf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2908.165417] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f6840a57b19 [ 2908.166021] RDX: 0000000000002c00 RSI: 0000000000000000 RDI: 00007f6840ab10fb [ 2908.166675] RBP: 0000000000000005 R08: 0000000000001600 R09: ffffffffffffffff [ 2908.167267] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2908.167808] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012900 [ 2908.168516] [ 2908.186464] loop4: detected capacity change from 0 to 4 [ 2908.187903] EXT4-fs (loop2): Unsupported encryption level 189 [ 2908.206666] EXT4-fs (loop4): Unsupported encryption level 189 21:40:18 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000040d}) 21:40:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:40:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:40:35 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:40:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8800000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:40:35 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x80087601, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 2924.997080] loop2: detected capacity change from 0 to 4 [ 2925.005464] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) 21:40:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 6) 21:40:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 7) 21:40:35 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000455}) 21:40:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x6609, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:40:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2925.018432] FAULT_INJECTION: forcing a failure. [ 2925.018432] name failslab, interval 1, probability 0, space 0, times 0 [ 2925.022804] CPU: 1 PID: 31769 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2925.023488] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2925.024169] Call Trace: [ 2925.024404] [ 2925.024615] dump_stack_lvl+0xc1/0xf0 [ 2925.024973] should_fail_ex+0x4b4/0x5b0 [ 2925.025341] ? security_inode_alloc+0x38/0x160 [ 2925.025744] should_failslab+0x9/0x20 [ 2925.026201] kmem_cache_alloc+0x5a/0x320 [ 2925.026571] security_inode_alloc+0x38/0x160 [ 2925.026971] inode_init_always+0xbb2/0xea0 [ 2925.027355] alloc_inode+0x84/0x240 [ 2925.027694] new_inode+0x25/0x1f0 [ 2925.028024] shmem_get_inode+0x181/0xe30 [ 2925.028388] ? do_raw_spin_unlock+0x53/0x220 [ 2925.028783] __shmem_file_setup+0x171/0x300 [ 2925.029156] __do_sys_memfd_create+0x32b/0x910 [ 2925.029566] ? ksys_write+0x1a7/0x260 [ 2925.029930] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 2925.030385] do_syscall_64+0x3f/0x90 [ 2925.030729] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2925.031188] RIP: 0033:0x7fe02d21cb19 [ 2925.031514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2925.032982] RSP: 002b:00007fe02a791f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2925.033763] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe02d21cb19 [ 2925.034432] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007fe02d2760fb [ 2925.035027] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 2925.035606] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 2925.036188] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012900 [ 2925.036790] [ 2925.084815] loop5: detected capacity change from 0 to 512 [ 2925.107260] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 2925.152938] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 21:40:35 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000459}) 21:40:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2925.184253] loop2: detected capacity change from 0 to 4 21:40:35 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x801c581f, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 2925.188912] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) 21:40:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40087602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:40:35 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:40:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 8) [ 2925.272615] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2925.298442] EXT4-fs warning (device sda): __ext4_ioctl:1241: Setting inode version is not supported with metadata_csum enabled. [ 2925.438229] FAULT_INJECTION: forcing a failure. [ 2925.438229] name failslab, interval 1, probability 0, space 0, times 0 [ 2925.439213] CPU: 0 PID: 31953 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2925.439907] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2925.440600] Call Trace: [ 2925.440837] [ 2925.441043] dump_stack_lvl+0xc1/0xf0 [ 2925.441486] should_fail_ex+0x4b4/0x5b0 [ 2925.442474] should_failslab+0x9/0x20 [ 2925.443272] kmem_cache_alloc_lru+0x6b/0x590 [ 2925.443668] ? __d_alloc+0x31/0x9c0 [ 2925.444013] __d_alloc+0x31/0x9c0 [ 2925.444464] ? get_random_u32+0x3b2/0x670 [ 2925.445379] d_alloc_pseudo+0x1d/0x70 [ 2925.446248] alloc_file_pseudo+0xd2/0x260 [ 2925.446851] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 2925.447263] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 2925.448019] ? shmem_get_inode+0x6a0/0xe30 [ 2925.448734] ? do_raw_spin_unlock+0x53/0x220 [ 2925.449133] __shmem_file_setup+0x202/0x300 [ 2925.449524] __do_sys_memfd_create+0x32b/0x910 [ 2925.449945] ? ksys_write+0x1a7/0x260 [ 2925.450314] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 2925.450773] do_syscall_64+0x3f/0x90 [ 2925.451118] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2925.451566] RIP: 0033:0x7f6840a57b19 [ 2925.451897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2925.453347] RSP: 002b:00007f683dfccf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2925.454070] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f6840a57b19 [ 2925.454651] RDX: 0000000000002c00 RSI: 0000000000000000 RDI: 00007f6840ab10fb [ 2925.455258] RBP: 0000000000000005 R08: 0000000000001600 R09: ffffffffffffffff [ 2925.455845] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2925.456425] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012900 [ 2925.457032] 21:40:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:40:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 9) 21:40:52 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:40:52 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000045a}) 21:40:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 7) 21:40:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000", 0x60, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:40:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:40:52 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0xc0045878, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 2942.050605] loop5: detected capacity change from 0 to 512 [ 2942.056525] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 2942.067066] loop4: detected capacity change from 0 to 4 [ 2942.080034] EXT4-fs (loop4): Unsupported encryption level 189 [ 2942.081769] loop2: detected capacity change from 0 to 4 [ 2942.093181] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2942.093748] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 21:40:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:40:52 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000500}) 21:40:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 8) 21:40:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 10) [ 2942.187557] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:40:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:40:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x4020940d, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:40:52 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0xc0045878, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 2942.276395] FAULT_INJECTION: forcing a failure. [ 2942.276395] name failslab, interval 1, probability 0, space 0, times 0 [ 2942.277411] CPU: 0 PID: 32085 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2942.278100] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2942.278801] Call Trace: [ 2942.279039] [ 2942.279249] dump_stack_lvl+0xc1/0xf0 [ 2942.279642] should_fail_ex+0x4b4/0x5b0 [ 2942.280003] should_failslab+0x9/0x20 [ 2942.280326] kmem_cache_alloc_lru+0x6b/0x590 [ 2942.280703] ? __d_alloc+0x31/0x9c0 [ 2942.281029] __d_alloc+0x31/0x9c0 [ 2942.281335] ? get_random_u32+0x3b2/0x670 [ 2942.281706] d_alloc_pseudo+0x1d/0x70 [ 2942.282030] alloc_file_pseudo+0xd2/0x260 [ 2942.282420] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 2942.282817] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 2942.283301] ? shmem_get_inode+0x6a0/0xe30 [ 2942.283709] ? do_raw_spin_unlock+0x53/0x220 [ 2942.284091] __shmem_file_setup+0x202/0x300 [ 2942.284480] __do_sys_memfd_create+0x32b/0x910 [ 2942.284881] ? ksys_write+0x1a7/0x260 [ 2942.285224] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 2942.285729] do_syscall_64+0x3f/0x90 [ 2942.286078] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2942.286558] RIP: 0033:0x7fe02d21cb19 [ 2942.286885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2942.288349] RSP: 002b:00007fe02a791f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2942.288990] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe02d21cb19 [ 2942.289577] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007fe02d2760fb [ 2942.290165] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 2942.290791] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 2942.291381] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012900 [ 2942.291996] 21:40:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2942.339147] FAULT_INJECTION: forcing a failure. [ 2942.339147] name failslab, interval 1, probability 0, space 0, times 0 [ 2942.340106] CPU: 0 PID: 32126 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2942.340741] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2942.341340] Call Trace: [ 2942.341548] [ 2942.341740] dump_stack_lvl+0xc1/0xf0 [ 2942.342060] should_fail_ex+0x4b4/0x5b0 [ 2942.342431] ? __alloc_file+0x21/0x240 [ 2942.342739] should_failslab+0x9/0x20 [ 2942.343048] kmem_cache_alloc+0x5a/0x320 [ 2942.343396] __alloc_file+0x21/0x240 [ 2942.343708] alloc_empty_file+0x71/0x190 [ 2942.344049] alloc_file+0x5e/0x810 [ 2942.344372] alloc_file_pseudo+0x16e/0x260 [ 2942.344792] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 2942.345199] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 2942.345708] ? do_raw_spin_unlock+0x53/0x220 [ 2942.346098] __shmem_file_setup+0x202/0x300 [ 2942.346507] __do_sys_memfd_create+0x32b/0x910 [ 2942.346875] ? ksys_write+0x1a7/0x260 [ 2942.347174] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 2942.347201] loop2: detected capacity change from 0 to 4 [ 2942.347578] do_syscall_64+0x3f/0x90 [ 2942.348346] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2942.348762] RIP: 0033:0x7f6840a57b19 [ 2942.349076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2942.350467] RSP: 002b:00007f683dfccf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2942.351065] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f6840a57b19 [ 2942.351628] RDX: 0000000000002c00 RSI: 0000000000000000 RDI: 00007f6840ab10fb [ 2942.352175] RBP: 0000000000000005 R08: 0000000000001600 R09: ffffffffffffffff [ 2942.352738] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2942.353286] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012900 [ 2942.353857] [ 2942.355275] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) 21:41:09 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000600}) 21:41:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x80086601, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:41:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0xc0189436, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:41:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 9) 21:41:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:41:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 11) 21:41:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2959.192113] loop2: detected capacity change from 0 to 4 [ 2959.201889] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) 21:41:09 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) [ 2959.209006] loop5: detected capacity change from 0 to 512 [ 2959.227422] EXT4-fs (loop5): failed to parse options in superblock: ÷ 21:41:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="06000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2959.249354] loop4: detected capacity change from 0 to 4 [ 2959.253627] EXT4-fs (loop4): Unsupported encryption level 189 21:41:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2959.289044] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 21:41:09 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x7000006c0}) 21:41:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 10) 21:41:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 12) 21:41:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0xc020660b, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 2959.352661] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:41:09 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) [ 2959.400505] loop2: detected capacity change from 0 to 4 21:41:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="07000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:41:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x80087601, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2959.493429] FAULT_INJECTION: forcing a failure. [ 2959.493429] name failslab, interval 1, probability 0, space 0, times 0 [ 2959.494368] FAULT_INJECTION: forcing a failure. [ 2959.494368] name failslab, interval 1, probability 0, space 0, times 0 [ 2959.494400] CPU: 0 PID: 32289 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2959.495960] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2959.496616] Call Trace: [ 2959.496844] [ 2959.497045] dump_stack_lvl+0xc1/0xf0 [ 2959.497395] should_fail_ex+0x4b4/0x5b0 [ 2959.497742] ? security_file_alloc+0x38/0x170 [ 2959.498148] should_failslab+0x9/0x20 [ 2959.498507] kmem_cache_alloc+0x5a/0x320 [ 2959.499563] security_file_alloc+0x38/0x170 [ 2959.500671] __alloc_file+0xb6/0x240 [ 2959.501700] alloc_empty_file+0x71/0x190 [ 2959.502770] alloc_file+0x5e/0x810 [ 2959.503622] alloc_file_pseudo+0x16e/0x260 [ 2959.504604] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 2959.505856] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 2959.507368] ? do_raw_spin_unlock+0x53/0x220 [ 2959.508558] __shmem_file_setup+0x202/0x300 [ 2959.509734] __do_sys_memfd_create+0x32b/0x910 [ 2959.510989] ? ksys_write+0x1a7/0x260 [ 2959.512022] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 2959.513404] do_syscall_64+0x3f/0x90 [ 2959.514389] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2959.515737] RIP: 0033:0x7f6840a57b19 [ 2959.516716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2959.521518] RSP: 002b:00007f683dfccf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2959.523480] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f6840a57b19 [ 2959.525382] RDX: 0000000000002c00 RSI: 0000000000000000 RDI: 00007f6840ab10fb [ 2959.527246] RBP: 0000000000000005 R08: 0000000000001600 R09: ffffffffffffffff [ 2959.529209] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 2959.531065] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012900 [ 2959.532922] [ 2959.533565] CPU: 1 PID: 32290 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2959.534364] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2959.535116] Call Trace: [ 2959.535376] [ 2959.535618] dump_stack_lvl+0xc1/0xf0 [ 2959.536039] should_fail_ex+0x4b4/0x5b0 [ 2959.536474] ? __alloc_file+0x21/0x240 [ 2959.536864] should_failslab+0x9/0x20 [ 2959.537279] kmem_cache_alloc+0x5a/0x320 [ 2959.537699] __alloc_file+0x21/0x240 [ 2959.538134] alloc_empty_file+0x71/0x190 [ 2959.538576] alloc_file+0x5e/0x810 [ 2959.538950] alloc_file_pseudo+0x16e/0x260 [ 2959.540097] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 2959.541275] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 2959.542730] ? do_raw_spin_unlock+0x53/0x220 [ 2959.543886] __shmem_file_setup+0x202/0x300 [ 2959.544957] __do_sys_memfd_create+0x32b/0x910 [ 2959.546154] ? ksys_write+0x1a7/0x260 [ 2959.547160] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 2959.548454] do_syscall_64+0x3f/0x90 [ 2959.549398] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2959.550748] RIP: 0033:0x7fe02d21cb19 [ 2959.553056] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (2 blocks) [ 2959.557184] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2959.557217] RSP: 002b:00007fe02a791f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2959.557239] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe02d21cb19 [ 2959.557255] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007fe02d2760fb [ 2959.562208] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 2959.562824] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 2959.563397] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012900 [ 2959.563984] 21:41:10 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000700}) 21:41:26 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:41:26 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000b00}) 21:41:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 13) 21:41:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="08000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:41:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x801c581f, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:41:27 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x47, 0x1, 0x0, 0x4, 0x0, 0x5, 0x40, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8001, 0x2, @perf_config_ext={0x6, 0x3}, 0x4, 0x6, 0x4, 0x2, 0x2c3b, 0x9, 0x205, 0x0, 0x1ff, 0x0, 0x8}, 0xffffffffffffffff, 0x8, r2, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) r3 = open(&(0x7f0000000140)='./file1\x00', 0x80, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)=0x4010) splice(r3, &(0x7f00000004c0)=0x7f, r4, &(0x7f0000000500), 0x200, 0xa) 21:41:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 11) 21:41:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) [ 2976.622275] loop2: detected capacity change from 0 to 4 [ 2976.628014] loop5: detected capacity change from 0 to 512 [ 2976.638228] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2976.641268] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 2976.658064] loop4: detected capacity change from 0 to 4 21:41:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1b000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2976.673220] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 2976.697510] EXT4-fs (loop4): Unsupported encryption level 189 [ 2976.720351] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:41:43 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000c00}) 21:41:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:41:43 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:41:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0xc0045878, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:41:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 12) [ 2993.583429] loop2: detected capacity change from 0 to 4 [ 2993.590395] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 21:41:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="30000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:41:44 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x2002, 0xa824, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000027c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0200000001010000260d00006c653100"]) perf_event_open(&(0x7f0000002740)={0x2, 0x80, 0x54, 0x40, 0xd8, 0xff, 0x0, 0x10001, 0x2200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xddc1, 0x4}, 0x23d0, 0x8001, 0x7, 0x0, 0x7, 0xee2, 0x62, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x5, r3, 0x9) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r1, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) pwritev(r4, &(0x7f00000026c0)=[{&(0x7f0000000440)="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"}, {&(0x7f0000001440)="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"}, {&(0x7f0000002440)="b3350c16d84ecffb772b0f99b740b75f1bbaa76d3e41677149f2f8e996af8e24fc6669c53a890ccc5d66c5dd1cc5a61abec0c96518825cff3ed063fc007f61eaf949e7a701d6a330ef84675c9330dda4c9522c345636c41638597af8965abe8b485f03082482f5b61c1be4db46d787617bfba2fb81641aaadfd1ffe7be7f9f1c5272869d9cfaad55f5920e693740f48aaacea15944cf4d681c68b9774499"}, {&(0x7f0000002500)="26b61698df5ec40ee8def9e192be920d18d44fadefa995feaf974ef287bfb3e634b253317265fdd46bb403e5d004e4399f4735fad894d4d4bf3b96d83f966d774893cf3bed6fddaf09aa6ab95bc06bc4ec03501de9c0bbbcb3f0d519eefa6697ece3791fa94f7aacfa36f3903d0b6e2b9469608de0787aad25fdf38232c4c1b1954bb3d3c4b9f5f668d2e482"}, {&(0x7f00000025c0)="589a9071880226ef8e215383de32c8173bd493b907654e85da321e7eacf2aed72ef164e03a515b0fbd26da6f183513ddd79f72545239e863b1bfdf7a1d29e30f8d4c906566dfd2a62effc81696a31602294e1bc62648f8118e94d147300aa603bb50f550e51fbd5df19699c210949d7b50f0b0c658ccfc9c4a49bb43e410ba77bbb1f8446ea41db9b9bde8e5b682cc6edcd3286325079ce2953b4ebd738fab51a09ce11d824dd811bacad51b0dbf47dae9e6b98165813b2841587fe56dc4c0406b6514f023476578f4bba766fc9c8f"}], 0x2, 0x6, 0x8) 21:41:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 14) [ 2993.633313] FAULT_INJECTION: forcing a failure. [ 2993.633313] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2993.634387] CPU: 1 PID: 32556 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2993.635411] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2993.636040] Call Trace: [ 2993.636440] [ 2993.636677] FAULT_INJECTION: forcing a failure. [ 2993.636677] name failslab, interval 1, probability 0, space 0, times 0 [ 2993.636980] dump_stack_lvl+0xc1/0xf0 [ 2993.640772] should_fail_ex+0x4b4/0x5b0 [ 2993.641753] prepare_alloc_pages+0x178/0x500 [ 2993.642226] ? lock_is_held_type+0x9f/0x120 [ 2993.642702] __alloc_pages+0x149/0x510 [ 2993.643691] ? lock_release+0x1e3/0x710 [ 2993.644125] ? __pfx___alloc_pages+0x10/0x10 [ 2993.644610] ? mark_lock.part.0+0xef/0x2f30 [ 2993.645065] ? __pfx_mark_lock.part.0+0x10/0x10 [ 2993.645591] vma_alloc_folio+0xe2/0x440 [ 2993.646038] shmem_alloc_folio+0x109/0x1d0 [ 2993.646495] ? __pfx_shmem_alloc_folio+0x10/0x10 [ 2993.647082] ? percpu_counter_add_batch+0xc8/0x180 [ 2993.647627] ? __vm_enough_memory+0x188/0x3f0 [ 2993.648140] shmem_get_folio_gfp.constprop.0+0x6ed/0x1670 [ 2993.648806] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 2993.649524] ? __mark_inode_dirty+0x68c/0xee0 [ 2993.650068] shmem_write_begin+0x148/0x360 [ 2993.650566] ? __pfx_shmem_write_begin+0x10/0x10 [ 2993.651119] generic_perform_write+0x25a/0x580 [ 2993.651613] ? __pfx_generic_perform_write+0x10/0x10 [ 2993.652147] ? __pfx_file_update_time+0x10/0x10 [ 2993.652669] ? generic_write_checks+0x2c0/0x400 [ 2993.653154] __generic_file_write_iter+0x308/0x4b0 [ 2993.653693] ? trace_lock_acquire+0x170/0x1e0 [ 2993.654257] generic_file_write_iter+0xe7/0x350 [ 2993.654823] vfs_write+0x9b4/0xdc0 [ 2993.655261] ? __pfx_vfs_write+0x10/0x10 [ 2993.655784] __x64_sys_pwrite64+0x1ff/0x260 [ 2993.656284] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 2993.656855] do_syscall_64+0x3f/0x90 [ 2993.657258] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2993.657848] RIP: 0033:0x7f6840a0aab7 [ 2993.658271] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2993.660238] RSP: 002b:00007f683dfccf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2993.660949] RAX: ffffffffffffffda RBX: 00007f6840aa1970 RCX: 00007f6840a0aab7 [ 2993.661514] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000004 [ 2993.662080] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2993.662651] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 2993.663237] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 2993.663824] [ 2993.664033] CPU: 0 PID: 32557 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2993.664746] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2993.665420] Call Trace: [ 2993.665640] [ 2993.665842] dump_stack_lvl+0xc1/0xf0 [ 2993.666187] should_fail_ex+0x4b4/0x5b0 [ 2993.666535] ? security_file_alloc+0x38/0x170 [ 2993.666951] should_failslab+0x9/0x20 [ 2993.667280] kmem_cache_alloc+0x5a/0x320 [ 2993.667640] security_file_alloc+0x38/0x170 [ 2993.668364] __alloc_file+0xb6/0x240 [ 2993.669481] alloc_empty_file+0x71/0x190 [ 2993.670488] alloc_file+0x5e/0x810 [ 2993.670830] alloc_file_pseudo+0x16e/0x260 [ 2993.671247] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 2993.671690] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 2993.673155] ? do_raw_spin_unlock+0x53/0x220 [ 2993.673583] __shmem_file_setup+0x202/0x300 [ 2993.674017] __do_sys_memfd_create+0x32b/0x910 [ 2993.674446] ? ksys_write+0x1a7/0x260 [ 2993.674804] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 2993.675308] do_syscall_64+0x3f/0x90 [ 2993.675666] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2993.676129] RIP: 0033:0x7fe02d21cb19 [ 2993.676472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2993.678057] RSP: 002b:00007fe02a791f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2993.678715] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe02d21cb19 [ 2993.679195] loop5: detected capacity change from 0 to 512 [ 2993.679388] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007fe02d2760fb [ 2993.680502] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 2993.681109] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 2993.681596] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2993.681723] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012900 [ 2993.683145] 21:41:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[@ANYBLOB]) 21:41:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20080000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2993.801012] loop2: detected capacity change from 0 to 4 [ 2993.817900] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 21:41:44 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000001680), 0x9, 0x48000) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0xd000943e, &(0x7f0000000640)={0x0, r4, "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", "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"}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x4010) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, &(0x7f0000000140)={'HL\x00'}, &(0x7f0000001640)=0x1e) 21:41:44 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000ce0}) 21:41:44 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:41:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0xc0045878, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:41:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 13) 21:41:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 15) 21:41:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, 0x0) [ 2994.181970] loop4: detected capacity change from 0 to 4 21:41:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="000c0000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2994.196253] EXT4-fs (loop4): Unsupported encryption level 189 [ 2994.215043] FAULT_INJECTION: forcing a failure. [ 2994.215043] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2994.216056] CPU: 1 PID: 32684 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 2994.216725] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2994.217389] Call Trace: [ 2994.217619] [ 2994.217827] dump_stack_lvl+0xc1/0xf0 [ 2994.218176] should_fail_ex+0x4b4/0x5b0 [ 2994.218545] copyin+0x19/0x120 [ 2994.218843] copy_page_from_iter_atomic+0x40a/0x14a0 [ 2994.219352] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 2994.219845] ? shmem_write_begin+0x15f/0x360 [ 2994.220247] ? __pfx_shmem_write_begin+0x10/0x10 [ 2994.220693] generic_perform_write+0x2cf/0x580 [ 2994.221101] ? __pfx_generic_perform_write+0x10/0x10 [ 2994.221668] ? __pfx_file_update_time+0x10/0x10 [ 2994.222084] ? generic_write_checks+0x2c0/0x400 [ 2994.222501] __generic_file_write_iter+0x308/0x4b0 [ 2994.222916] ? trace_lock_acquire+0x170/0x1e0 [ 2994.223357] generic_file_write_iter+0xe7/0x350 [ 2994.223768] vfs_write+0x9b4/0xdc0 [ 2994.224093] ? __pfx_vfs_write+0x10/0x10 [ 2994.224483] __x64_sys_pwrite64+0x1ff/0x260 [ 2994.224841] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 2994.225256] do_syscall_64+0x3f/0x90 [ 2994.225715] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2994.226157] RIP: 0033:0x7f6840a0aab7 [ 2994.226472] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2994.227928] RSP: 002b:00007f683dfccf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2994.228550] RAX: ffffffffffffffda RBX: 00007f6840aa1970 RCX: 00007f6840a0aab7 [ 2994.229120] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000004 [ 2994.229691] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2994.230264] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 2994.230849] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 2994.231510] 21:41:44 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000d00}) [ 2994.248489] loop2: detected capacity change from 0 to 4 21:41:44 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000600)='./file1\x00', 0x1c51c2, 0x40) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) sendmsg$NL80211_CMD_REGISTER_FRAME(r1, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000580)={&(0x7f0000000440)={0x128, 0x0, 0x200, 0x70bd28, 0x3f, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x3}, @NL80211_ATTR_FRAME_MATCH={0x103, 0x5b, "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"}]}, 0x128}, 0x1, 0x0, 0x0, 0x4000}, 0x40) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:41:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0xc0189436, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2994.290708] loop5: detected capacity change from 0 to 512 [ 2994.394275] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 2994.424908] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 2994.621304] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:42:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 14) 21:42:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="effd0000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:42:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0xc020660b, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:42:01 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x8, 0x80, 0x6, 0x8, 0x8001}) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r1, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:42:01 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:42:01 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000d04}) 21:42:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 16) 21:42:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, 0x0) [ 3011.079288] FAULT_INJECTION: forcing a failure. [ 3011.079288] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3011.080356] CPU: 0 PID: 32813 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3011.081045] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3011.081706] Call Trace: [ 3011.081938] [ 3011.082149] dump_stack_lvl+0xc1/0xf0 [ 3011.082493] should_fail_ex+0x4b4/0x5b0 [ 3011.082847] copyin+0x19/0x120 [ 3011.083176] copy_page_from_iter_atomic+0x40a/0x14a0 [ 3011.083635] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 3011.084105] ? shmem_write_begin+0x15f/0x360 [ 3011.084508] ? __pfx_shmem_write_begin+0x10/0x10 [ 3011.084935] generic_perform_write+0x2cf/0x580 [ 3011.085349] ? __pfx_generic_perform_write+0x10/0x10 [ 3011.085771] ? __pfx_file_update_time+0x10/0x10 [ 3011.086188] ? generic_write_checks+0x2c0/0x400 [ 3011.086609] __generic_file_write_iter+0x308/0x4b0 [ 3011.087030] ? trace_lock_acquire+0x170/0x1e0 [ 3011.087490] generic_file_write_iter+0xe7/0x350 [ 3011.087895] vfs_write+0x9b4/0xdc0 [ 3011.088223] ? __pfx_vfs_write+0x10/0x10 [ 3011.088633] __x64_sys_pwrite64+0x1ff/0x260 [ 3011.088997] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 3011.089414] do_syscall_64+0x3f/0x90 [ 3011.089726] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3011.090132] RIP: 0033:0x7f6840a0aab7 [ 3011.090430] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3011.091776] RSP: 002b:00007f683dfccf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3011.092364] RAX: ffffffffffffffda RBX: 00007f6840aa1970 RCX: 00007f6840a0aab7 [ 3011.092914] RDX: 0000000000000121 RSI: 00000000200004c0 RDI: 0000000000000004 [ 3011.093484] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 3011.094030] R10: 00000000000004e0 R11: 0000000000000293 R12: 0000000000000004 [ 3011.094586] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 3011.095182] [ 3011.113147] FAULT_INJECTION: forcing a failure. [ 3011.113147] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3011.114552] loop5: detected capacity change from 0 to 512 [ 3011.115880] CPU: 1 PID: 32820 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3011.115918] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3011.115930] Call Trace: [ 3011.115939] [ 3011.115948] dump_stack_lvl+0xc1/0xf0 [ 3011.119070] should_fail_ex+0x4b4/0x5b0 [ 3011.119470] prepare_alloc_pages+0x178/0x500 [ 3011.119861] ? lock_is_held_type+0x9f/0x120 [ 3011.120247] __alloc_pages+0x149/0x510 [ 3011.120588] ? lock_release+0x1e3/0x710 [ 3011.120935] ? __pfx___alloc_pages+0x10/0x10 [ 3011.121308] ? mark_lock.part.0+0xef/0x2f30 [ 3011.121685] ? __pfx_mark_lock.part.0+0x10/0x10 [ 3011.122099] vma_alloc_folio+0xe2/0x440 [ 3011.122488] shmem_alloc_folio+0x109/0x1d0 [ 3011.122855] ? __pfx_shmem_alloc_folio+0x10/0x10 [ 3011.123504] ? percpu_counter_add_batch+0xc8/0x180 [ 3011.123950] ? __vm_enough_memory+0x188/0x3f0 [ 3011.124351] shmem_get_folio_gfp.constprop.0+0x6ed/0x1670 [ 3011.124853] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 3011.125367] ? rcu_read_lock_sched_held+0x42/0x80 [ 3011.125802] shmem_write_begin+0x148/0x360 [ 3011.126186] ? __pfx_shmem_write_begin+0x10/0x10 [ 3011.126622] generic_perform_write+0x25a/0x580 [ 3011.127037] ? __pfx_generic_perform_write+0x10/0x10 [ 3011.127632] ? __pfx_file_update_time+0x10/0x10 [ 3011.128064] ? generic_write_checks+0x2c0/0x400 [ 3011.128413] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3011.128471] __generic_file_write_iter+0x308/0x4b0 [ 3011.129393] ? trace_lock_acquire+0x170/0x1e0 [ 3011.129768] generic_file_write_iter+0xe7/0x350 [ 3011.130180] vfs_write+0x9b4/0xdc0 [ 3011.130663] ? __pfx_vfs_write+0x10/0x10 [ 3011.131064] __x64_sys_pwrite64+0x1ff/0x260 [ 3011.131780] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 3011.132211] do_syscall_64+0x3f/0x90 [ 3011.132554] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3011.132982] RIP: 0033:0x7fe02d1cfab7 [ 3011.133290] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3011.134753] RSP: 002b:00007fe02a791f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3011.135414] RAX: ffffffffffffffda RBX: 00007fe02d266970 RCX: 00007fe02d1cfab7 [ 3011.135998] RDX: 0000000000000063 RSI: 0000000020010000 RDI: 0000000000000004 [ 3011.136576] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 3011.137168] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 3011.137801] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 3011.138404] [ 3011.149623] loop2: detected capacity change from 0 to 4 21:42:01 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000d10}) [ 3011.182991] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 3011.188283] loop4: detected capacity change from 0 to 4 [ 3011.190660] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 21:42:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, 0x0) [ 3011.289545] loop2: detected capacity change from 0 to 4 [ 3011.353565] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:42:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) 21:42:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="effdffff000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:42:18 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:42:18 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000dd0}) 21:42:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 17) 21:42:18 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r0, @in_args={0x2}}, './file1\x00'}) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x1, 0x40, 0x0, 0x20, 0x0, 0x1, 0x20000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xf5f, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0x120c0, 0x6b13, 0x8, 0x7, 0x0, 0x2, 0x9c, 0x0, 0x4a2f, 0x0, 0x9}, 0x0, 0x3, r2, 0xa) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x8, 0x8, 0x81, 0x6, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 3027.994425] loop2: detected capacity change from 0 to 4 21:42:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 15) 21:42:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) execveat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000400)=[&(0x7f0000000200)='@$:\x00', &(0x7f0000000240)=')\x00', &(0x7f0000000300)=':,*#[*\xe0-@\x00', &(0x7f0000000340)=':)]:\x00', &(0x7f0000000380)='*]*\x00', &(0x7f00000003c0)='(\x00'], &(0x7f0000000500)=[&(0x7f0000000440)='+${+*\x00', &(0x7f0000000480)='&&)[\\%[{}}!./\x00', &(0x7f00000004c0)=':+-&+(,\x00'], 0x3247c004339e5803) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x4, 0x3, 0x7, 0xae, 0x0, 0xfd1, 0x40000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x54a5, 0x5, @perf_bp={&(0x7f0000000000), 0xc}, 0x160, 0x2, 0xf483000, 0x2, 0xffff, 0xfffffe01, 0xfff, 0x0, 0xffffffe0, 0x0, 0x80}, 0x0, 0xc, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3028.014093] EXT4-fs (loop2): Unsupported encryption level 189 [ 3028.018427] FAULT_INJECTION: forcing a failure. [ 3028.018427] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3028.018989] FAULT_INJECTION: forcing a failure. [ 3028.018989] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3028.022628] CPU: 1 PID: 32955 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3028.023359] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3028.024132] Call Trace: [ 3028.024398] [ 3028.024624] dump_stack_lvl+0xc1/0xf0 [ 3028.025028] should_fail_ex+0x4b4/0x5b0 [ 3028.025449] copyin+0x19/0x120 [ 3028.025809] copy_page_from_iter_atomic+0x40a/0x14a0 [ 3028.026381] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 3028.026931] ? shmem_write_begin+0x15f/0x360 [ 3028.027576] ? __pfx_shmem_write_begin+0x10/0x10 [ 3028.028055] generic_perform_write+0x2cf/0x580 [ 3028.028562] ? __pfx_generic_perform_write+0x10/0x10 [ 3028.029056] ? __pfx_file_update_time+0x10/0x10 [ 3028.029536] ? generic_write_checks+0x2c0/0x400 [ 3028.030024] __generic_file_write_iter+0x308/0x4b0 [ 3028.030503] ? trace_lock_acquire+0x170/0x1e0 [ 3028.030968] generic_file_write_iter+0xe7/0x350 [ 3028.031468] vfs_write+0x9b4/0xdc0 [ 3028.031813] ? __pfx_vfs_write+0x10/0x10 [ 3028.032245] __x64_sys_pwrite64+0x1ff/0x260 [ 3028.032621] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 3028.033050] do_syscall_64+0x3f/0x90 [ 3028.033445] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3028.033895] RIP: 0033:0x7f6840a0aab7 [ 3028.034250] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3028.039801] RSP: 002b:00007f683dfccf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3028.040510] RAX: ffffffffffffffda RBX: 00007f6840aa1970 RCX: 00007f6840a0aab7 [ 3028.041114] RDX: 0000000000000037 RSI: 0000000020010200 RDI: 0000000000000004 [ 3028.041712] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 3028.042374] R10: 0000000000000540 R11: 0000000000000293 R12: 0000000000000004 [ 3028.043004] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3028.043665] [ 3028.043889] CPU: 0 PID: 32951 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3028.045527] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3028.047207] Call Trace: [ 3028.047769] [ 3028.048185] dump_stack_lvl+0xc1/0xf0 [ 3028.048975] should_fail_ex+0x4b4/0x5b0 [ 3028.049800] copyin+0x19/0x120 [ 3028.050463] copy_page_from_iter_atomic+0x40a/0x14a0 [ 3028.051527] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 3028.052950] ? shmem_write_begin+0x15f/0x360 [ 3028.053870] ? __pfx_shmem_write_begin+0x10/0x10 [ 3028.054918] generic_perform_write+0x2cf/0x580 [ 3028.055902] ? __pfx_generic_perform_write+0x10/0x10 [ 3028.056240] loop5: detected capacity change from 0 to 512 [ 3028.056824] ? __pfx_file_update_time+0x10/0x10 [ 3028.056865] ? generic_write_checks+0x2c0/0x400 [ 3028.059122] __generic_file_write_iter+0x308/0x4b0 [ 3028.060307] ? trace_lock_acquire+0x170/0x1e0 [ 3028.061245] generic_file_write_iter+0xe7/0x350 [ 3028.062236] vfs_write+0x9b4/0xdc0 [ 3028.062984] ? __pfx_vfs_write+0x10/0x10 [ 3028.064004] __x64_sys_pwrite64+0x1ff/0x260 [ 3028.064923] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 3028.065922] do_syscall_64+0x3f/0x90 [ 3028.066724] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3028.068004] RIP: 0033:0x7fe02d1cfab7 [ 3028.068784] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3028.071856] RSP: 002b:00007fe02a791f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3028.072486] RAX: ffffffffffffffda RBX: 00007fe02d266970 RCX: 00007fe02d1cfab7 [ 3028.073077] RDX: 0000000000000063 RSI: 0000000020010000 RDI: 0000000000000004 [ 3028.073668] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 3028.074256] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 3028.074841] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 3028.075581] [ 3028.100266] loop4: detected capacity change from 0 to 4 21:42:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20020000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3028.122077] EXT4-fs (loop4): Unsupported encryption level 189 [ 3028.124473] EXT4-fs (loop5): failed to parse options in superblock: ÷ 21:42:18 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000dde}) [ 3028.188018] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 21:42:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20030000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:42:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 16) 21:42:18 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000010000000000", @ANYRES32=r0, @ANYBLOB="faffffff000000002e2f66696c653100"]) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000300)='oom_score\x00') perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x8, 0x5, 0x20, 0x8, 0x0, 0x1, 0x10, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x5, 0x1ff}, 0x4380, 0x7fc, 0x80000001, 0x8, 0x13be, 0x1, 0x0, 0x0, 0x8, 0x0, 0x58}, r2, 0xb, r0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x0, 0x0, 0x6, 0x7, 0x0, 0x3844, 0x20c0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x840e, 0x3}, 0x21000, 0x7, 0x7fff, 0x7, 0x3, 0x4238b13c, 0x1e20, 0x0, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0xf, r1, 0x2) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xe0, 0x1, 0x0, 0x80, 0x0, 0x3, 0x36180, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x8000, 0x1}, 0x3000, 0x3, 0xfffffffe, 0x1, 0x3, 0xfffffffd, 0x2, 0x0, 0x600000, 0x0, 0xb220}, r2, 0xffffffffffffffff, r1, 0x9) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r4, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) r5 = pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x4007, 0x0, 0xd}, 0xffffffffffffffff, 0x1, r4, 0x2) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000640)=@v2={0x2, @aes128, 0x8, '\x00', @a}) syz_mount_image$nfs(&(0x7f0000001880), &(0x7f00000018c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) pidfd_send_signal(r5, 0x13, &(0x7f00000004c0)={0x34, 0x9, 0x7db2}, 0x0) 21:42:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 18) 21:42:18 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:42:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20040000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:42:18 executing program 2: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x8, 0x80, 0x6, 0x8, 0x8001}) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r1, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 3028.456358] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 3028.489994] FAULT_INJECTION: forcing a failure. [ 3028.489994] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3028.490955] CPU: 1 PID: 33075 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3028.491839] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3028.492499] Call Trace: [ 3028.492718] [ 3028.492915] dump_stack_lvl+0xc1/0xf0 [ 3028.493260] should_fail_ex+0x4b4/0x5b0 [ 3028.493609] copyin+0x19/0x120 [ 3028.493904] copy_page_from_iter_atomic+0x40a/0x14a0 [ 3028.494400] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 3028.494863] ? shmem_write_begin+0x15f/0x360 [ 3028.495254] ? __pfx_shmem_write_begin+0x10/0x10 [ 3028.495799] generic_perform_write+0x2cf/0x580 [ 3028.496188] ? __pfx_generic_perform_write+0x10/0x10 [ 3028.496602] ? __pfx_file_update_time+0x10/0x10 [ 3028.497007] ? generic_write_checks+0x2c0/0x400 [ 3028.497405] __generic_file_write_iter+0x308/0x4b0 [ 3028.497817] ? trace_lock_acquire+0x170/0x1e0 [ 3028.498267] generic_file_write_iter+0xe7/0x350 [ 3028.498678] vfs_write+0x9b4/0xdc0 [ 3028.499011] ? __pfx_vfs_write+0x10/0x10 [ 3028.499521] __x64_sys_pwrite64+0x1ff/0x260 [ 3028.499905] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 3028.500326] do_syscall_64+0x3f/0x90 [ 3028.500658] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3028.501091] RIP: 0033:0x7fe02d1cfab7 [ 3028.501396] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3028.502824] RSP: 002b:00007fe02a791f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3028.503586] RAX: ffffffffffffffda RBX: 00007fe02d266970 RCX: 00007fe02d1cfab7 [ 3028.504163] RDX: 0000000000000097 RSI: 00000000200004c0 RDI: 0000000000000004 [ 3028.504746] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 3028.505325] R10: 00000000000004e0 R11: 0000000000000293 R12: 0000000000000004 [ 3028.505903] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 3028.506505] 21:42:18 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000de9}) [ 3028.537533] loop4: detected capacity change from 0 to 4 [ 3028.583379] nfs: Unknown parameter '0QMB#µâ™û‚2A ‡ãMõKæDß~qŽ5»”È1ý`ò}/g\ì‚N®FmüÙUÇ¢@Q$[¹’rZ¡›{H1g÷ÏîïAEî´RY§Eñ?* Ì%VVg¢È«C$%èÞMu´Ø Ko [ 3028.583379] ¡V8<5)AÒ÷ù' [ 3028.593655] FAULT_INJECTION: forcing a failure. [ 3028.593655] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3028.594761] CPU: 1 PID: 33083 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3028.595473] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3028.596119] Call Trace: [ 3028.596338] [ 3028.596535] dump_stack_lvl+0xc1/0xf0 [ 3028.596880] should_fail_ex+0x4b4/0x5b0 [ 3028.597241] copyin+0x19/0x120 [ 3028.597536] copy_page_from_iter_atomic+0x40a/0x14a0 [ 3028.597965] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 3028.598418] ? shmem_write_begin+0x15f/0x360 [ 3028.598806] ? __pfx_shmem_write_begin+0x10/0x10 [ 3028.599243] generic_perform_write+0x2cf/0x580 [ 3028.600100] ? __pfx_generic_perform_write+0x10/0x10 [ 3028.601093] ? __pfx_file_update_time+0x10/0x10 [ 3028.602022] ? generic_write_checks+0x2c0/0x400 [ 3028.602960] __generic_file_write_iter+0x308/0x4b0 [ 3028.603697] ? trace_lock_acquire+0x170/0x1e0 [ 3028.604097] generic_file_write_iter+0xe7/0x350 [ 3028.604545] vfs_write+0x9b4/0xdc0 [ 3028.604882] ? __pfx_vfs_write+0x10/0x10 [ 3028.605275] __x64_sys_pwrite64+0x1ff/0x260 [ 3028.605646] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 3028.606069] do_syscall_64+0x3f/0x90 [ 3028.606418] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3028.606863] RIP: 0033:0x7f6840a0aab7 [ 3028.607183] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3028.608717] RSP: 002b:00007f683dfccf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3028.609355] RAX: ffffffffffffffda RBX: 00007f6840aa1970 RCX: 00007f6840a0aab7 [ 3028.609941] RDX: 0000000000000020 RSI: 0000000020010400 RDI: 0000000000000004 [ 3028.611960] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 3028.612541] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 3028.613129] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 3028.613740] [ 3028.614574] EXT4-fs (loop4): Unsupported encryption level 189 [ 3028.698274] nfs: Unknown parameter '0QMB#µâ™û‚2A ‡ãMõKæDß~qŽ5»”È1ý`ò}/g\ì‚N®FmüÙUÇ¢@Q$[¹’rZ¡›{H1g÷ÏîïAEî´RY§Eñ?* Ì%VVg¢È«C$%èÞMu´Ø Ko [ 3028.698274] ¡V8<5)AÒ÷ù' [ 3028.725322] loop5: detected capacity change from 0 to 512 [ 3028.759281] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3028.778142] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 3028.812061] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:42:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20050000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:42:36 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:42:36 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000005c0)=0x800) sendfile(r3, r2, &(0x7f0000000500)=0x94, 0x3) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0x2, 0x7f, 0x7, 0x4, 0x0, 0x2317, 0x20, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x3f, 0x23}, 0x40118, 0x6668000000000, 0x0, 0x4, 0xfb01, 0xfffffff9, 0x1, 0x0, 0x1, 0x0, 0x2}, 0x0, 0x5, r2, 0x3) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r4, &(0x7f0000000300)='oom_score\x00') r5 = syz_open_dev$vcsn(&(0x7f00000004c0), 0x6, 0x4000) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x80, 0x40, 0x5, 0x9, 0x0, 0x6, 0x20080, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f0000000140), 0x4}, 0x40000, 0x8, 0x2, 0x0, 0x6, 0x2, 0x8, 0x0, 0x1f, 0x0, 0x9}, r4, 0x5, r5, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x4010) fallocate(r6, 0x0, 0x1, 0x1) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x7ff, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x3, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0xc, r1, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:42:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 17) [ 3045.595767] FAULT_INJECTION: forcing a failure. [ 3045.595767] name failslab, interval 1, probability 0, space 0, times 0 [ 3045.596870] CPU: 0 PID: 33194 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3045.597538] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3045.598206] Call Trace: [ 3045.598479] [ 3045.598688] dump_stack_lvl+0xc1/0xf0 [ 3045.599044] should_fail_ex+0x4b4/0x5b0 [ 3045.599707] ? getname_flags.part.0+0x50/0x4f0 [ 3045.600113] should_failslab+0x9/0x20 [ 3045.600456] kmem_cache_alloc+0x5a/0x320 [ 3045.600824] getname_flags.part.0+0x50/0x4f0 [ 3045.601223] ? vfs_write+0x488/0xdc0 [ 3045.601613] getname+0x92/0xe0 [ 3045.601920] do_sys_openat2+0xf9/0x4c0 [ 3045.602293] ? __pfx_do_sys_openat2+0x10/0x10 [ 3045.602718] __x64_sys_openat+0x143/0x200 [ 3045.603091] ? __pfx___x64_sys_openat+0x10/0x10 [ 3045.603518] do_syscall_64+0x3f/0x90 [ 3045.607939] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3045.608401] RIP: 0033:0x7fe02d1cfa04 [ 3045.608735] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3045.610220] RSP: 002b:00007fe02a791ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3045.610890] RAX: ffffffffffffffda RBX: 00007fe02d266970 RCX: 00007fe02d1cfa04 [ 3045.611483] RDX: 0000000000000002 RSI: 00007fe02a792000 RDI: 00000000ffffff9c [ 3045.612091] RBP: 00007fe02a792000 R08: 0000000000000000 R09: ffffffffffffffff [ 3045.612651] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 21:42:36 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x80087601, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:42:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x800000, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x1, 0xffffffffffffffff}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r2, &(0x7f0000000300)='oom_score\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)=0x4010) rmdir(&(0x7f0000000200)='./file1/file0\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r4, &(0x7f0000000300)='oom_score\x00') r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x4010) setsockopt$netlink_NETLINK_RX_RING(r5, 0x10e, 0x6, &(0x7f0000000240)={0x8, 0xfff, 0x5, 0x8000}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xf1, 0x2, 0x6, 0x3, 0x0, 0x6, 0xb4868, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x200, 0x0, 0xc86, 0x6, 0x0, 0x1, 0x1ff, 0x0, 0x1, 0x0, 0x10001}, r4, 0xa, r3, 0xa) 21:42:36 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000e00}) [ 3045.613225] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3045.613842] 21:42:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 19) 21:42:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 18) [ 3045.710946] FAULT_INJECTION: forcing a failure. [ 3045.710946] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3045.712098] CPU: 0 PID: 33208 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3045.712744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3045.713400] Call Trace: [ 3045.713629] [ 3045.713837] dump_stack_lvl+0xc1/0xf0 [ 3045.714191] should_fail_ex+0x4b4/0x5b0 [ 3045.714563] prepare_alloc_pages+0x178/0x500 [ 3045.714960] ? lock_is_held_type+0x9f/0x120 [ 3045.715351] __alloc_pages+0x149/0x510 [ 3045.715717] ? lock_release+0x1e3/0x710 [ 3045.716087] ? __pfx___alloc_pages+0x10/0x10 [ 3045.716489] ? mark_lock.part.0+0xef/0x2f30 [ 3045.716882] ? __pfx_mark_lock.part.0+0x10/0x10 [ 3045.717316] vma_alloc_folio+0xe2/0x440 [ 3045.717679] shmem_alloc_folio+0x109/0x1d0 [ 3045.718060] ? __pfx_shmem_alloc_folio+0x10/0x10 [ 3045.718501] ? percpu_counter_add_batch+0xc8/0x180 [ 3045.718942] ? __vm_enough_memory+0x188/0x3f0 [ 3045.719348] shmem_get_folio_gfp.constprop.0+0x6ed/0x1670 [ 3045.719879] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 3045.720379] ? rcu_read_lock_sched_held+0x42/0x80 [ 3045.720806] shmem_write_begin+0x148/0x360 [ 3045.721176] ? __pfx_shmem_write_begin+0x10/0x10 [ 3045.721616] generic_perform_write+0x25a/0x580 [ 3045.722021] ? __pfx_generic_perform_write+0x10/0x10 [ 3045.722446] ? __pfx_file_update_time+0x10/0x10 [ 3045.722860] ? generic_write_checks+0x2c0/0x400 [ 3045.723263] __generic_file_write_iter+0x308/0x4b0 [ 3045.723706] ? trace_lock_acquire+0x170/0x1e0 [ 3045.724114] generic_file_write_iter+0xe7/0x350 [ 3045.724519] vfs_write+0x9b4/0xdc0 [ 3045.724849] ? __pfx_vfs_write+0x10/0x10 [ 3045.725257] __x64_sys_pwrite64+0x1ff/0x260 [ 3045.725638] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 3045.726060] do_syscall_64+0x3f/0x90 [ 3045.726402] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3045.726854] RIP: 0033:0x7f6840a0aab7 [ 3045.727160] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3045.728608] RSP: 002b:00007f683dfccf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3045.729209] RAX: ffffffffffffffda RBX: 00007f6840aa1970 RCX: 00007f6840a0aab7 [ 3045.729798] RDX: 000000000000001d RSI: 0000000020010e00 RDI: 0000000000000004 [ 3045.730369] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 3045.730953] R10: 0000000000001600 R11: 0000000000000293 R12: 0000000000000004 [ 3045.731528] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 3045.732167] [ 3045.764625] loop4: detected capacity change from 0 to 4 21:42:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 1) 21:42:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20060000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3045.784989] EXT4-fs (loop4): Unsupported encryption level 189 [ 3045.806366] FAULT_INJECTION: forcing a failure. [ 3045.806366] name failslab, interval 1, probability 0, space 0, times 0 [ 3045.807447] CPU: 1 PID: 33238 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3045.808159] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3045.808820] Call Trace: [ 3045.809044] [ 3045.809246] dump_stack_lvl+0xc1/0xf0 [ 3045.809596] should_fail_ex+0x4b4/0x5b0 [ 3045.809954] should_failslab+0x9/0x20 [ 3045.810298] __kmem_cache_alloc_node+0x5b/0x310 [ 3045.810705] ? __do_sys_memfd_create+0x12d/0x910 [ 3045.811133] ? __do_sys_memfd_create+0x12d/0x910 [ 3045.811557] __kmalloc+0x46/0xc0 [ 3045.811947] __do_sys_memfd_create+0x12d/0x910 [ 3045.812359] ? ksys_write+0x1a7/0x260 [ 3045.812716] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 3045.813178] do_syscall_64+0x3f/0x90 [ 3045.813529] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3045.813987] RIP: 0033:0x7f226f89db19 [ 3045.814313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3045.819821] RSP: 002b:00007f226ce12f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3045.820456] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f226f89db19 [ 3045.821074] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f226f8f70fb [ 3045.823736] loop5: detected capacity change from 0 to 512 [ 3045.824113] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 3045.824133] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 3045.824148] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012900 [ 3045.824184] 21:42:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) r4 = openat2(r1, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)={0x222000, 0x1a, 0x8}, 0x18) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x5e, 0x3f, 0x7, 0x7, 0x0, 0x7, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x5, 0x100}, 0x47408, 0x3, 0x4, 0x2, 0x3, 0x6, 0x7, 0x0, 0x6, 0x0, 0x6}, r2, 0x1, r4, 0x3) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:42:36 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000f00}) 21:42:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 19) 21:42:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:42:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 2) 21:42:36 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) [ 3046.092994] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3046.099230] loop2: detected capacity change from 0 to 4 [ 3046.117033] EXT4-fs (loop2): Unsupported encryption level 189 [ 3046.121543] EXT4-fs error (device loop5): __ext4_fill_super:5366: inode #2: comm syz-executor.5: iget: root inode unallocated [ 3046.123395] EXT4-fs (loop5): get root inode failed [ 3046.123999] EXT4-fs (loop5): mount failed [ 3046.161672] FAULT_INJECTION: forcing a failure. [ 3046.161672] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3046.162652] CPU: 0 PID: 33328 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3046.163324] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3046.163997] Call Trace: [ 3046.164220] [ 3046.164417] dump_stack_lvl+0xc1/0xf0 [ 3046.164757] should_fail_ex+0x4b4/0x5b0 [ 3046.165119] strncpy_from_user+0x38/0x3e0 [ 3046.165489] getname_flags.part.0+0x95/0x4f0 [ 3046.165870] ? vfs_write+0x488/0xdc0 [ 3046.166214] getname+0x92/0xe0 [ 3046.166560] do_sys_openat2+0xf9/0x4c0 [ 3046.166896] ? __pfx_do_sys_openat2+0x10/0x10 [ 3046.167305] __x64_sys_openat+0x143/0x200 [ 3046.167708] ? __pfx___x64_sys_openat+0x10/0x10 [ 3046.168124] do_syscall_64+0x3f/0x90 [ 3046.168462] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3046.168917] RIP: 0033:0x7fe02d1cfa04 [ 3046.169231] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3046.170651] RSP: 002b:00007fe02a791ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3046.171257] RAX: ffffffffffffffda RBX: 00007fe02d266970 RCX: 00007fe02d1cfa04 [ 3046.171841] RDX: 0000000000000002 RSI: 00007fe02a792000 RDI: 00000000ffffff9c [ 3046.172412] RBP: 00007fe02a792000 R08: 0000000000000000 R09: ffffffffffffffff [ 3046.172988] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3046.173559] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3046.174152] 21:42:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20070000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:42:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 20) 21:42:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 3) [ 3046.223121] loop5: detected capacity change from 0 to 512 [ 3046.313978] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3046.320834] FAULT_INJECTION: forcing a failure. [ 3046.320834] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3046.321826] CPU: 0 PID: 33380 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3046.322450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3046.323084] Call Trace: [ 3046.323309] [ 3046.323503] dump_stack_lvl+0xc1/0xf0 [ 3046.323868] should_fail_ex+0x4b4/0x5b0 [ 3046.324221] _copy_from_user+0x2e/0x180 [ 3046.324569] __do_sys_memfd_create+0x1b0/0x910 [ 3046.324963] ? ksys_write+0x1a7/0x260 [ 3046.325308] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 3046.325754] do_syscall_64+0x3f/0x90 [ 3046.326086] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3046.326527] RIP: 0033:0x7f226f89db19 [ 3046.326835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3046.328254] RSP: 002b:00007f226ce12f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3046.328837] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f226f89db19 [ 3046.329385] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f226f8f70fb [ 3046.329950] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 3046.330497] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 3046.331041] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012900 [ 3046.331609] 21:42:36 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000100d}) [ 3046.344965] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 21:42:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 3046.387031] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 3063.443149] FAULT_INJECTION: forcing a failure. [ 3063.443149] name failslab, interval 1, probability 0, space 0, times 0 [ 3063.444208] CPU: 1 PID: 33458 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3063.444855] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3063.445496] Call Trace: [ 3063.445711] [ 3063.445921] dump_stack_lvl+0xc1/0xf0 [ 3063.446291] should_fail_ex+0x4b4/0x5b0 [ 3063.446639] ? __alloc_file+0x21/0x240 [ 3063.446971] should_failslab+0x9/0x20 [ 3063.447296] kmem_cache_alloc+0x5a/0x320 [ 3063.447647] __alloc_file+0x21/0x240 [ 3063.448000] alloc_empty_file+0x71/0x190 [ 3063.448353] path_openat+0xd8/0x2750 [ 3063.448693] ? __pfx_path_openat+0x10/0x10 [ 3063.449057] ? __pfx___lock_acquire+0x10/0x10 [ 3063.449444] ? __create_object+0x3ee/0xc90 [ 3063.449816] do_filp_open+0x1ba/0x410 [ 3063.449876] loop5: detected capacity change from 0 to 512 [ 3063.450140] ? __pfx_do_filp_open+0x10/0x10 [ 3063.450983] ? find_held_lock+0x2c/0x110 [ 3063.451331] ? alloc_fd+0x2eb/0x760 [ 3063.451646] ? lock_release+0x1e3/0x710 [ 3063.452049] ? do_raw_spin_lock+0x125/0x270 [ 3063.452409] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 3063.452800] ? lock_acquire+0x32/0xc0 [ 3063.453133] ? alloc_fd+0x6e/0x760 [ 3063.453448] ? _raw_spin_unlock+0x1e/0x40 [ 3063.453799] ? alloc_fd+0x2eb/0x760 [ 3063.454126] do_sys_openat2+0x171/0x4c0 [ 3063.454923] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3063.456574] ? __pfx_do_sys_openat2+0x10/0x10 [ 3063.456615] ? xfd_validate_state+0x51/0x170 [ 3063.458235] __x64_sys_openat+0x143/0x200 21:42:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 20) 21:42:53 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x2, 0x4, 0x6, 0x3f, 0x0, 0x0, 0x420, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff800, 0x4, @perf_config_ext={0x7ff, 0x2}, 0x2004, 0x81, 0x7, 0x9, 0x9, 0x1d, 0x1, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x7, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x6, 0xf8, 0xf6, 0x5, 0x0, 0x10001, 0x112, 0x9, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0xbf00000, 0xc5}, 0x20, 0x54, 0x3, 0x4, 0x1, 0x8000, 0x400, 0x0, 0x2, 0x0, 0x9}, 0xffffffffffffffff, 0xc, r0, 0x1) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:42:53 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700001100}) 21:42:53 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:42:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 21) 21:42:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20080000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:42:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 4) 21:42:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0xb7, 0x8, 0x4c, 0x0, 0x7, 0x1, 0x9, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp, 0x28, 0xffffffffffffff03, 0x0, 0x7, 0x4, 0x1, 0x40, 0x0, 0x7, 0x0, 0x81}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0xfffffffffffffd13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3063.459213] ? __pfx___x64_sys_openat+0x10/0x10 [ 3063.460477] do_syscall_64+0x3f/0x90 [ 3063.461178] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3063.464482] RIP: 0033:0x7fe02d1cfa04 [ 3063.465178] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3063.471440] RSP: 002b:00007fe02a791ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3063.472332] RAX: ffffffffffffffda RBX: 00007fe02d266970 RCX: 00007fe02d1cfa04 [ 3063.472895] RDX: 0000000000000002 RSI: 00007fe02a792000 RDI: 00000000ffffff9c [ 3063.473457] RBP: 00007fe02a792000 R08: 0000000000000000 R09: ffffffffffffffff [ 3063.474020] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3063.474579] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3063.475161] [ 3063.519464] FAULT_INJECTION: forcing a failure. [ 3063.519464] name failslab, interval 1, probability 0, space 0, times 0 [ 3063.521824] CPU: 1 PID: 33472 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3063.523277] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3063.524974] Call Trace: [ 3063.525547] [ 3063.525954] dump_stack_lvl+0xc1/0xf0 [ 3063.526782] should_fail_ex+0x4b4/0x5b0 [ 3063.527148] should_failslab+0x9/0x20 [ 3063.527476] kmem_cache_alloc_lru+0x6b/0x590 [ 3063.527855] ? shmem_alloc_inode+0x27/0x50 [ 3063.528234] ? lock_release+0x1e3/0x710 [ 3063.528585] shmem_alloc_inode+0x27/0x50 [ 3063.528938] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 3063.529332] alloc_inode+0x63/0x240 [ 3063.529653] new_inode+0x25/0x1f0 [ 3063.529980] shmem_get_inode+0x181/0xe30 [ 3063.530332] ? do_raw_spin_unlock+0x53/0x220 [ 3063.530741] __shmem_file_setup+0x171/0x300 [ 3063.531118] __do_sys_memfd_create+0x32b/0x910 [ 3063.531508] ? ksys_write+0x1a7/0x260 [ 3063.531840] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 3063.533059] do_syscall_64+0x3f/0x90 [ 3063.533908] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3063.534836] RIP: 0033:0x7f226f89db19 [ 3063.535503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3063.537319] RSP: 002b:00007f226ce12f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3063.537969] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f226f89db19 [ 3063.538556] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f226f8f70fb [ 3063.539161] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff 21:42:53 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700001f00}) [ 3063.539713] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 3063.540313] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012900 [ 3063.540886] [ 3063.551206] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 21:42:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20180000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:42:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000440)="fbf8ae9cb06653599533ba7c04ea693822d823a50da5172c777478756b146f36eba847320403ace88f4a48b4662478c6accdc154778da57efab7cbce15c57cc7e9e6a64b67ac0de5b94c6f49bc64ebc7f0ae403a9329b0398041658999955addd39e2bc8f1beaf1b0ca4f5133c4aac3e724dd7f849ec9b895c936511fb7f36af603e1bbdbe7cd995cd941f69c08713c560e50b32419afdcdba058e4e6e530b30dabb411324ed674b35589cfe449b6c0bf5be82be4e468f2540c7204126b0f0c34259b553e2efc9d8ae7fdf114f5d0fdd984c754a69d6eea362e6e8c17c5c8954189ae9b6ff69db71bbeb1996", 0xec}, {&(0x7f0000000580)="83f66b432cdca549f2a0abf243307c9fe51d", 0x12}], 0x0, 0x3, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 3063.621130] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:42:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 22) 21:42:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 5) 21:42:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 21) [ 3063.760392] loop4: detected capacity change from 0 to 4 [ 3063.769160] EXT4-fs (loop4): Unsupported encryption level 189 [ 3063.817339] loop2: detected capacity change from 0 to 4 [ 3063.824966] FAULT_INJECTION: forcing a failure. [ 3063.824966] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3063.826855] EXT4-fs (loop2): Unsupported encryption level 189 [ 3063.827667] CPU: 1 PID: 33592 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3063.830043] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3063.831928] Call Trace: [ 3063.832518] [ 3063.833039] dump_stack_lvl+0xc1/0xf0 [ 3063.833921] should_fail_ex+0x4b4/0x5b0 [ 3063.834834] copyin+0x19/0x120 [ 3063.835574] copy_page_from_iter_atomic+0x40a/0x14a0 [ 3063.836781] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 3063.838029] ? shmem_write_begin+0x15f/0x360 [ 3063.839050] ? __pfx_shmem_write_begin+0x10/0x10 [ 3063.840177] generic_perform_write+0x2cf/0x580 [ 3063.841226] ? __pfx_generic_perform_write+0x10/0x10 [ 3063.842377] ? __pfx_file_update_time+0x10/0x10 [ 3063.843450] ? generic_write_checks+0x2c0/0x400 [ 3063.844546] __generic_file_write_iter+0x308/0x4b0 [ 3063.845673] ? trace_lock_acquire+0x170/0x1e0 [ 3063.846767] generic_file_write_iter+0xe7/0x350 [ 3063.847829] vfs_write+0x9b4/0xdc0 [ 3063.848682] ? __pfx_vfs_write+0x10/0x10 [ 3063.849654] __x64_sys_pwrite64+0x1ff/0x260 [ 3063.850643] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 3063.851780] do_syscall_64+0x3f/0x90 [ 3063.852678] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3063.853863] RIP: 0033:0x7f6840a0aab7 [ 3063.854701] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3063.858829] RSP: 002b:00007f683dfccf20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3063.860561] RAX: ffffffffffffffda RBX: 00007f6840aa1970 RCX: 00007f6840a0aab7 [ 3063.862157] RDX: 000000000000001d RSI: 0000000020010e00 RDI: 0000000000000004 [ 3063.863746] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 3063.865368] R10: 0000000000001600 R11: 0000000000000293 R12: 0000000000000004 [ 3063.866962] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 3063.868619] [ 3063.873628] loop5: detected capacity change from 0 to 512 [ 3063.880170] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3063.897334] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 3063.934760] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:43:10 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) r3 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x80, 0x40, 0x2, 0x7, 0x3, 0x0, 0x202, 0x285d8, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_config_ext={0x52e0, 0x3}, 0x10040, 0x3, 0x7fffffff, 0x2, 0x7, 0x6, 0x3, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0xc, r2, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)=0x4010) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {r3}}, './file1\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000200)={0x7a, 0x0, &(0x7f00000001c0)=[r0, r2, r5, r1, r2, r6, r3]}, 0x7) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r8, 0x40086602, &(0x7f0000000040)=0x4010) write$binfmt_elf64(r8, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0xff, 0x6, 0x8, 0xfffffffffffffffe, 0x3, 0x6, 0x5, 0x195, 0x40, 0x1e5, 0x3, 0x6, 0x38, 0x2, 0x67, 0xb74, 0x6}, [{0x1, 0x2d, 0x3626, 0xfffffffffffffffe, 0xfffffffeffffffff, 0x101, 0xfffffffffffffffc, 0xa60}, {0x1, 0x3, 0x55b, 0x1, 0x0, 0x7fff, 0x9, 0x9}], "f4c2a281893442d10cdb9a46dee8abfb9696dc9747afe5877ca92ceb99f9aa09a02c9a920f691513c5e8f951b7a9529ee4ba4de57a569651e74405cca77f96015b938874780f", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5f6) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:43:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 6) 21:43:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 23) 21:43:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 22) 21:43:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="201c0000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:43:10 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700001fff}) 21:43:10 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) sendto$unix(r2, &(0x7f0000000440)="72f9902a055d2474", 0x8, 0x20000050, &(0x7f0000000480)=@file={0x0, './file1\x00'}, 0x6e) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)=0x4010) openat(r3, &(0x7f0000002000)='./file1\x00', 0xc0, 0x8) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x2, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) clock_gettime(0x0, &(0x7f00000030c0)={0x0, 0x0}) recvmmsg$unix(r1, &(0x7f00000084c0)=[{{0x0, 0x0, &(0x7f0000004480)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000002000)}, {&(0x7f0000004200)=""/189, 0xbd}, {&(0x7f0000002040)=""/22, 0x16}, {&(0x7f00000042c0)=""/221, 0xdd}, {&(0x7f00000043c0)=""/177, 0xb1}], 0x6, &(0x7f0000004500)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}}, {{0x0, 0x0, &(0x7f00000029c0)=[{&(0x7f0000004580)=""/4096, 0x1000}, {&(0x7f0000005580)=""/71, 0x47}, {&(0x7f0000005600)=""/184, 0xb8}], 0x3, &(0x7f0000002e00)}}, {{&(0x7f00000056c0), 0x6e, &(0x7f00000058c0)=[{&(0x7f0000005740)=""/197, 0xc5}, {&(0x7f0000005840)=""/24, 0x18}, {&(0x7f0000005880)=""/11, 0xb}], 0x3, &(0x7f0000005900)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x38}}, {{&(0x7f0000005940)=@abs, 0x6e, &(0x7f0000008000)=[{&(0x7f00000059c0)=""/164, 0xa4}, {&(0x7f0000005a80)=""/235, 0xeb}, {&(0x7f0000005b80)=""/208, 0xd0}, {&(0x7f0000005c80)=""/214, 0xd6}, {&(0x7f0000005d80)=""/4096, 0x1000}, {&(0x7f0000006d80)=""/126, 0x7e}, {&(0x7f0000006e00)=""/4096, 0x1000}, {&(0x7f0000007e00)=""/248, 0xf8}, {&(0x7f0000007f00)=""/228, 0xe4}], 0x9, &(0x7f00000080c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000008100)=@abs, 0x6e, &(0x7f0000008440)=[{&(0x7f0000008180)=""/137, 0x89}, {&(0x7f0000008240)=""/200, 0xc8}, {&(0x7f0000008340)=""/144, 0x90}, {&(0x7f0000008400)=""/64, 0x40}], 0x4, &(0x7f0000008480)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}], 0x5, 0x0, &(0x7f0000008600)) fsconfig$FSCONFIG_SET_PATH(r6, 0x3, &(0x7f0000008640)='@\x00', &(0x7f0000008680)='./file1\x00', r2) lsetxattr(&(0x7f0000002e00)='./file1\x00', &(0x7f00000086c0)=@known='trusted.overlay.origin\x00', &(0x7f0000008700)='@\x00', 0x2, 0x2) recvmmsg(r1, &(0x7f0000002f00)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/124, 0x7c}, {&(0x7f0000000580)=""/172, 0xac}, {&(0x7f0000000640)=""/71, 0x47}], 0x3, &(0x7f0000000700)=""/176, 0xb0}, 0x599}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f00000007c0)=""/127, 0x7f}, {&(0x7f0000000840)=""/61, 0x3d}, {&(0x7f0000000880)=""/175, 0xaf}, {&(0x7f0000000940)=""/248, 0xf8}, {&(0x7f0000000a40)=""/252, 0xfc}, {&(0x7f0000000b40)=""/121, 0x79}, {&(0x7f0000000bc0)=""/33, 0x21}], 0x7, &(0x7f0000000c80)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001c80)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001d00)=""/194, 0xc2}, {&(0x7f0000001e00)=""/147, 0x93}, {&(0x7f0000001ec0)=""/145, 0x91}, {&(0x7f0000001f80)=""/62, 0x3e}, {&(0x7f0000003140)=""/131, 0x83}, {&(0x7f0000002080)=""/141, 0x8d}, {&(0x7f0000002140)=""/100, 0x64}], 0x7, &(0x7f0000002240)=""/165, 0xa5}, 0xffff}, {{&(0x7f0000002300)=@caif=@util, 0x80, &(0x7f00000026c0)=[{&(0x7f0000002380)=""/109, 0x6d}, {&(0x7f0000002400)=""/40, 0x28}, {&(0x7f0000002440)=""/149, 0x95}, {&(0x7f0000002500)=""/146, 0x92}, {&(0x7f00000025c0)=""/58, 0x3a}, {&(0x7f0000002600)=""/157, 0x9d}], 0x6, &(0x7f0000002740)=""/194, 0xc2}, 0x7ff}, {{&(0x7f0000002840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000001fc0)=[{&(0x7f00000028c0)=""/250, 0xfa}], 0x1}, 0x7}, {{&(0x7f0000002a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000002d00)=[{&(0x7f0000002a80)=""/149, 0x95}, {&(0x7f0000002b40)=""/94, 0x5e}, {&(0x7f0000002bc0)=""/114, 0x72}, {&(0x7f0000002c40)=""/132, 0x84}], 0x4, &(0x7f0000002d40)=""/58, 0x3a}, 0x20}, {{&(0x7f0000002d80)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000002e00)}, {&(0x7f0000002e40)=""/98, 0x62}], 0x2}, 0x9}], 0x7, 0x103, &(0x7f0000003100)={r4, r5+10000000}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 3080.440564] FAULT_INJECTION: forcing a failure. [ 3080.440564] name failslab, interval 1, probability 0, space 0, times 0 [ 3080.441558] CPU: 0 PID: 33604 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3080.442237] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3080.442907] Call Trace: [ 3080.443140] [ 3080.443347] dump_stack_lvl+0xc1/0xf0 [ 3080.443705] should_fail_ex+0x4b4/0x5b0 [ 3080.444068] ? security_inode_alloc+0x38/0x160 [ 3080.444655] FAULT_INJECTION: forcing a failure. [ 3080.444655] name failslab, interval 1, probability 0, space 0, times 0 [ 3080.449376] should_failslab+0x9/0x20 [ 3080.449712] kmem_cache_alloc+0x5a/0x320 [ 3080.450077] security_inode_alloc+0x38/0x160 [ 3080.450460] inode_init_always+0xbb2/0xea0 [ 3080.450832] alloc_inode+0x84/0x240 [ 3080.451173] new_inode+0x25/0x1f0 [ 3080.451492] shmem_get_inode+0x181/0xe30 [ 3080.451836] ? do_raw_spin_unlock+0x53/0x220 [ 3080.452231] __shmem_file_setup+0x171/0x300 [ 3080.452616] __do_sys_memfd_create+0x32b/0x910 [ 3080.453018] ? ksys_write+0x1a7/0x260 [ 3080.453366] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 3080.453818] do_syscall_64+0x3f/0x90 [ 3080.454166] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3080.454617] RIP: 0033:0x7f226f89db19 [ 3080.454942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3080.456432] RSP: 002b:00007f226ce12f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3080.457046] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f226f89db19 [ 3080.457607] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f226f8f70fb [ 3080.458191] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 3080.458760] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 3080.459335] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012900 [ 3080.459918] [ 3080.460148] CPU: 1 PID: 33606 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3080.460942] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3080.461600] Call Trace: [ 3080.461941] [ 3080.462151] dump_stack_lvl+0xc1/0xf0 [ 3080.462509] should_fail_ex+0x4b4/0x5b0 [ 3080.462929] ? getname_flags.part.0+0x50/0x4f0 [ 3080.463341] should_failslab+0x9/0x20 [ 3080.463745] kmem_cache_alloc+0x5a/0x320 [ 3080.464155] getname_flags.part.0+0x50/0x4f0 [ 3080.464556] ? vfs_write+0x488/0xdc0 [ 3080.464958] getname+0x92/0xe0 [ 3080.465267] do_sys_openat2+0xf9/0x4c0 [ 3080.465622] ? __pfx_do_sys_openat2+0x10/0x10 [ 3080.466139] __x64_sys_openat+0x143/0x200 [ 3080.466500] ? __pfx___x64_sys_openat+0x10/0x10 [ 3080.466991] do_syscall_64+0x3f/0x90 [ 3080.467331] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3080.467855] RIP: 0033:0x7f6840a0aa04 [ 3080.468239] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3080.469909] RSP: 002b:00007f683dfcced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3080.470537] RAX: ffffffffffffffda RBX: 00007f6840aa1970 RCX: 00007f6840a0aa04 [ 3080.471187] RDX: 0000000000000002 RSI: 00007f683dfcd000 RDI: 00000000ffffff9c [ 3080.471829] RBP: 00007f683dfcd000 R08: 0000000000000000 R09: ffffffffffffffff [ 3080.472466] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3080.473107] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 3080.473788] [ 3080.487773] FAULT_INJECTION: forcing a failure. [ 3080.487773] name failslab, interval 1, probability 0, space 0, times 0 [ 3080.488859] CPU: 1 PID: 33609 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3080.489519] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3080.490298] Call Trace: [ 3080.490532] [ 3080.490795] dump_stack_lvl+0xc1/0xf0 [ 3080.491156] should_fail_ex+0x4b4/0x5b0 [ 3080.491518] ? security_file_alloc+0x38/0x170 [ 3080.491975] should_failslab+0x9/0x20 [ 3080.492363] kmem_cache_alloc+0x5a/0x320 [ 3080.492787] security_file_alloc+0x38/0x170 [ 3080.493187] __alloc_file+0xb6/0x240 [ 3080.493526] alloc_empty_file+0x71/0x190 [ 3080.493995] path_openat+0xd8/0x2750 [ 3080.494359] ? __pfx_path_openat+0x10/0x10 [ 3080.494793] ? __pfx___lock_acquire+0x10/0x10 [ 3080.495197] ? __create_object+0x3ee/0xc90 [ 3080.497082] do_filp_open+0x1ba/0x410 [ 3080.498560] ? __pfx_do_filp_open+0x10/0x10 [ 3080.499056] ? find_held_lock+0x2c/0x110 [ 3080.499423] ? alloc_fd+0x2eb/0x760 [ 3080.499810] ? lock_release+0x1e3/0x710 21:43:10 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) [ 3080.500194] ? do_raw_spin_lock+0x125/0x270 [ 3080.500574] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 3080.501790] ? lock_acquire+0x32/0xc0 [ 3080.502184] ? alloc_fd+0x6e/0x760 [ 3080.502528] ? _raw_spin_unlock+0x1e/0x40 [ 3080.502967] ? alloc_fd+0x2eb/0x760 [ 3080.503317] do_sys_openat2+0x171/0x4c0 [ 3080.503731] ? __pfx_do_sys_openat2+0x10/0x10 [ 3080.504213] __x64_sys_openat+0x143/0x200 [ 3080.504593] ? __pfx___x64_sys_openat+0x10/0x10 [ 3080.505081] do_syscall_64+0x3f/0x90 [ 3080.505435] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3080.505995] RIP: 0033:0x7fe02d1cfa04 [ 3080.506326] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3080.507903] RSP: 002b:00007fe02a791ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3080.508581] RAX: ffffffffffffffda RBX: 00007fe02d266970 RCX: 00007fe02d1cfa04 [ 3080.509227] RDX: 0000000000000002 RSI: 00007fe02a792000 RDI: 00000000ffffff9c [ 3080.509908] RBP: 00007fe02a792000 R08: 0000000000000000 R09: ffffffffffffffff [ 3080.510499] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3080.511152] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3080.511819] 21:43:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 7) 21:43:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 23) 21:43:11 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700002400}) 21:43:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20370000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3080.641097] loop2: detected capacity change from 0 to 4 [ 3080.674327] EXT4-fs (loop2): Unsupported encryption level 189 21:43:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 24) 21:43:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x16}, 0x16858, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8005}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x7f, 0x4, 0xff, 0x1, 0x0, 0x7, 0x40010, 0x5, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x19, 0x4, @perf_bp={&(0x7f0000000000), 0x9}, 0x50380, 0x100, 0xfffffffa, 0x9, 0x4, 0x101, 0xfff9, 0x0, 0x7, 0x0, 0x6}, r1, 0xf, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:43:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 8) 21:43:11 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = io_uring_setup(0x7714, &(0x7f00000005c0)={0x0, 0xb7d3, 0x8, 0x3, 0x10b}) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x5, 0x1}) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xa824, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0xff, 0x22, 0x1, 0x32, 0x0, 0x7fff, 0x84000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x4, @perf_config_ext={0xfffffffffbc11386, 0xfffffffffffffffb}, 0x1150, 0xfffffffffffff171, 0x4, 0xa, 0x6, 0xde85, 0x6, 0x0, 0x3, 0x0, 0x10001}, 0x0, 0x7, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x3d, 0x53, 0x1f, 0xfa, 0x0, 0x4, 0x38000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xfffffffffffffffb, 0x59}, 0x14434, 0x6, 0xfffffff8, 0x7, 0x9, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x5bee9772}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x8) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r3, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:43:11 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) [ 3081.043769] loop5: detected capacity change from 0 to 512 21:43:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="203a0000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3081.170442] loop4: detected capacity change from 0 to 4 [ 3081.172509] FAULT_INJECTION: forcing a failure. [ 3081.172509] name failslab, interval 1, probability 0, space 0, times 0 [ 3081.173444] CPU: 1 PID: 33734 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3081.174115] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3081.174792] Call Trace: [ 3081.175025] [ 3081.175234] dump_stack_lvl+0xc1/0xf0 [ 3081.175589] should_fail_ex+0x4b4/0x5b0 [ 3081.175944] should_failslab+0x9/0x20 [ 3081.176317] kmem_cache_alloc_lru+0x6b/0x590 [ 3081.176749] ? __d_alloc+0x31/0x9c0 [ 3081.177094] __d_alloc+0x31/0x9c0 [ 3081.177456] ? get_random_u32+0x3b2/0x670 [ 3081.177825] d_alloc_pseudo+0x1d/0x70 [ 3081.178165] alloc_file_pseudo+0xd2/0x260 [ 3081.178534] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 3081.178948] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 3081.179429] ? shmem_get_inode+0x6a0/0xe30 [ 3081.179799] ? do_raw_spin_unlock+0x53/0x220 [ 3081.180230] __shmem_file_setup+0x202/0x300 [ 3081.180624] __do_sys_memfd_create+0x32b/0x910 [ 3081.181036] ? ksys_write+0x1a7/0x260 [ 3081.181389] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 3081.181842] do_syscall_64+0x3f/0x90 [ 3081.182188] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3081.182641] RIP: 0033:0x7f226f89db19 [ 3081.182972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3081.184444] RSP: 002b:00007f226ce12f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3081.185069] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f226f89db19 [ 3081.185689] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f226f8f70fb [ 3081.186273] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 3081.186859] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 3081.187481] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012900 [ 3081.188157] [ 3081.190395] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3081.197935] EXT4-fs (loop4): Unsupported encryption level 189 [ 3081.238609] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 21:43:11 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700003f00}) [ 3081.709759] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:43:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 24) 21:43:28 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:43:28 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700003fff}) 21:43:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 9) 21:43:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_SPACE_INFO(r1, 0xc0109414, &(0x7f0000000300)={0xf8f, 0x4, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:43:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 25) 21:43:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) ioctl$BTRFS_IOC_INO_PATHS(r0, 0xc0389423, &(0x7f0000000540)={0x9, 0x30, [0x6, 0x4, 0x7fffffff, 0xbd50], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000440)=""/129, 0x81}], 0x1) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:43:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20650000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3098.317155] loop2: detected capacity change from 0 to 4 [ 3098.336190] FAULT_INJECTION: forcing a failure. [ 3098.336190] name failslab, interval 1, probability 0, space 0, times 0 [ 3098.337171] CPU: 0 PID: 33865 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3098.337815] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3098.338453] Call Trace: [ 3098.338674] [ 3098.338877] dump_stack_lvl+0xc1/0xf0 [ 3098.339220] should_fail_ex+0x4b4/0x5b0 [ 3098.339568] ? __kernfs_new_node+0xd4/0x870 [ 3098.339942] should_failslab+0x9/0x20 [ 3098.340269] kmem_cache_alloc+0x5a/0x320 [ 3098.340706] __kernfs_new_node+0xd4/0x870 [ 3098.341073] ? __pfx___kernfs_new_node+0x10/0x10 [ 3098.341477] ? selinux_sb_statfs+0x1c3/0x260 [ 3098.341852] ? __pfx___lock_acquire+0x10/0x10 [ 3098.342239] ? __pfx_selinux_sb_statfs+0x10/0x10 [ 3098.342610] ? loop_configure+0x2fb/0x1a00 [ 3098.342947] ? rcu_read_lock_sched_held+0x42/0x80 [ 3098.343343] ? trace_lock_acquire+0x170/0x1e0 [ 3098.343751] ? shmem_statfs+0x1b7/0x3e0 21:43:28 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700004800}) [ 3098.344109] kernfs_create_dir_ns+0xa0/0x230 [ 3098.344526] internal_create_group+0x786/0xb90 [ 3098.344936] ? __pfx_internal_create_group+0x10/0x10 [ 3098.345389] loop_configure+0xf37/0x1a00 [ 3098.345774] lo_ioctl+0x93a/0x19a0 [ 3098.346096] ? putname+0x102/0x140 [ 3098.346418] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3098.346890] ? __pfx_lo_ioctl+0x10/0x10 [ 3098.347231] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 3098.347691] ? __pfx___lock_acquire+0x10/0x10 [ 3098.352554] ? __lock_acquire+0xbd4/0x63b0 [ 3098.352979] ? __pfx_lock_release+0x10/0x10 [ 3098.353338] ? trace_lock_acquire+0x170/0x1e0 [ 3098.353716] ? __pfx___fget_files+0x10/0x10 [ 3098.354077] ? lock_acquire+0x32/0xc0 [ 3098.354401] ? __pfx_lo_ioctl+0x10/0x10 [ 3098.354731] blkdev_ioctl+0x361/0x7f0 [ 3098.355052] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3098.355402] ? selinux_file_ioctl+0xba/0x270 [ 3098.355770] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3098.356122] __x64_sys_ioctl+0x19e/0x210 [ 3098.356488] do_syscall_64+0x3f/0x90 [ 3098.356809] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3098.357231] RIP: 0033:0x7fe02d21c8d7 [ 3098.357530] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3098.358874] RSP: 002b:00007fe02a791f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3098.359459] RAX: ffffffffffffffda RBX: 00007fe02d266970 RCX: 00007fe02d21c8d7 [ 3098.360002] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 3098.360575] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 3098.361120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 3098.361666] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3098.362234] [ 3098.362558] loop4: detected capacity change from 0 to 4 [ 3098.371667] EXT4-fs (loop2): Unsupported encryption level 189 [ 3098.375409] FAULT_INJECTION: forcing a failure. [ 3098.375409] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3098.376509] CPU: 0 PID: 33866 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3098.377157] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3098.377802] Call Trace: [ 3098.378018] [ 3098.378214] dump_stack_lvl+0xc1/0xf0 [ 3098.378557] should_fail_ex+0x4b4/0x5b0 [ 3098.378919] strncpy_from_user+0x38/0x3e0 [ 3098.379286] getname_flags.part.0+0x95/0x4f0 [ 3098.379670] ? vfs_write+0x488/0xdc0 [ 3098.380008] getname+0x92/0xe0 [ 3098.380303] do_sys_openat2+0xf9/0x4c0 [ 3098.384624] ? __pfx_do_sys_openat2+0x10/0x10 [ 3098.385036] __x64_sys_openat+0x143/0x200 [ 3098.385601] ? __pfx___x64_sys_openat+0x10/0x10 [ 3098.386020] do_syscall_64+0x3f/0x90 [ 3098.386406] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3098.386852] RIP: 0033:0x7f6840a0aa04 [ 3098.387167] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3098.388701] RSP: 002b:00007f683dfcced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3098.389306] RAX: ffffffffffffffda RBX: 00007f6840aa1970 RCX: 00007f6840a0aa04 [ 3098.390109] RDX: 0000000000000002 RSI: 00007f683dfcd000 RDI: 00000000ffffff9c [ 3098.390720] RBP: 00007f683dfcd000 R08: 0000000000000000 R09: ffffffffffffffff [ 3098.391293] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3098.391865] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 3098.392520] [ 3098.412938] EXT4-fs (loop4): Unsupported encryption level 189 21:43:28 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700004ec0}) 21:43:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 10) 21:43:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 26) 21:43:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 25) 21:43:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20f00000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3098.612329] FAULT_INJECTION: forcing a failure. [ 3098.612329] name failslab, interval 1, probability 0, space 0, times 0 [ 3098.613340] CPU: 0 PID: 33982 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3098.613986] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3098.614626] Call Trace: [ 3098.614840] [ 3098.615030] dump_stack_lvl+0xc1/0xf0 [ 3098.615365] should_fail_ex+0x4b4/0x5b0 [ 3098.615707] ? __alloc_file+0x21/0x240 [ 3098.616038] should_failslab+0x9/0x20 [ 3098.616405] kmem_cache_alloc+0x5a/0x320 [ 3098.616769] __alloc_file+0x21/0x240 [ 3098.617087] alloc_empty_file+0x71/0x190 [ 3098.617436] alloc_file+0x5e/0x810 [ 3098.617753] alloc_file_pseudo+0x16e/0x260 [ 3098.618123] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 3098.618523] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 3098.618582] loop4: detected capacity change from 0 to 4 [ 3098.618955] ? do_raw_spin_unlock+0x53/0x220 [ 3098.618991] __shmem_file_setup+0x202/0x300 [ 3098.620050] __do_sys_memfd_create+0x32b/0x910 [ 3098.620452] ? ksys_write+0x1a7/0x260 [ 3098.620779] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 3098.621212] do_syscall_64+0x3f/0x90 [ 3098.621536] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3098.621965] RIP: 0033:0x7f226f89db19 [ 3098.622280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3098.623653] RSP: 002b:00007f226ce12f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3098.624243] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f226f89db19 [ 3098.624880] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f226f8f70fb [ 3098.625532] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 3098.626165] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 3098.626776] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012900 [ 3098.627452] [ 3098.641083] FAULT_INJECTION: forcing a failure. [ 3098.641083] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3098.642157] CPU: 1 PID: 33985 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3098.642913] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3098.643660] Call Trace: [ 3098.643906] [ 3098.644124] dump_stack_lvl+0xc1/0xf0 [ 3098.644521] should_fail_ex+0x4b4/0x5b0 [ 3098.644911] strncpy_from_user+0x38/0x3e0 [ 3098.645325] getname_flags.part.0+0x95/0x4f0 [ 3098.645754] ? vfs_write+0x488/0xdc0 [ 3098.646128] getname+0x92/0xe0 [ 3098.646456] do_sys_openat2+0xf9/0x4c0 [ 3098.646835] ? __pfx_do_sys_openat2+0x10/0x10 [ 3098.647278] __x64_sys_openat+0x143/0x200 [ 3098.647678] ? __pfx___x64_sys_openat+0x10/0x10 [ 3098.648137] do_syscall_64+0x3f/0x90 [ 3098.648522] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3098.649007] RIP: 0033:0x7f6840a0aa04 [ 3098.649355] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3098.650931] RSP: 002b:00007f683dfcced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3098.651605] RAX: ffffffffffffffda RBX: 00007f6840aa1970 RCX: 00007f6840a0aa04 [ 3098.652237] RDX: 0000000000000002 RSI: 00007f683dfcd000 RDI: 00000000ffffff9c [ 3098.652881] RBP: 00007f683dfcd000 R08: 0000000000000000 R09: ffffffffffffffff [ 3098.653513] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3098.654141] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 3098.654789] [ 3098.659307] EXT4-fs (loop4): Unsupported encryption level 189 21:43:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 27) 21:43:45 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) open_by_handle_at(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="0c00000003000000ff070000010000000000000021ee6b7e89f2b721b4c85a262a2e003928d3e3a04b78d1f47aed206290de"], 0x40001) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:43:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 26) 21:43:45 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700004ecf}) 21:43:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x1, 0xff, 0x8, 0x4, 0x0, 0xce, 0x6c0, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x9}, 0x208, 0x7fffffff, 0x400, 0x0, 0xfff, 0x2, 0x8000, 0x0, 0x2, 0x0, 0x5}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xa) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000300)='oom_score\x00') perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x40, 0x5, 0x7, 0x40, 0x0, 0x1, 0x1000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x200, 0x2, @perf_config_ext={0x20, 0xc74}, 0x2000, 0x5, 0x1000, 0x1, 0x2, 0x4, 0xfff7, 0x0, 0x2ce, 0x0, 0xe381}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x81, 0x4, 0x0, 0x6, 0x16047, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x21, 0x0, @perf_config_ext={0x538, 0x3f}, 0x800, 0x8, 0x1000, 0x3, 0x8, 0x9e2c, 0x8, 0x0, 0x2, 0x0, 0x10001}, r1, 0xd, r3, 0x0) 21:43:45 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:43:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20fe0000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:43:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 11) [ 3115.349116] loop4: detected capacity change from 0 to 4 [ 3115.351683] loop2: detected capacity change from 0 to 4 [ 3115.359671] loop5: detected capacity change from 0 to 512 [ 3115.362296] EXT4-fs (loop2): Unsupported encryption level 189 [ 3115.364268] EXT4-fs (loop4): Unsupported encryption level 189 21:43:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20210100000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3115.385257] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3115.397881] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 21:43:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 27) 21:43:45 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700004fc6}) 21:43:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 12) 21:43:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 28) [ 3115.545233] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:43:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x5cb1c0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3115.568686] FAULT_INJECTION: forcing a failure. [ 3115.568686] name failslab, interval 1, probability 0, space 0, times 0 [ 3115.569665] CPU: 1 PID: 34080 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3115.570347] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3115.571022] Call Trace: [ 3115.571253] [ 3115.571446] dump_stack_lvl+0xc1/0xf0 [ 3115.571780] should_fail_ex+0x4b4/0x5b0 [ 3115.572116] ? security_file_alloc+0x38/0x170 [ 3115.572509] should_failslab+0x9/0x20 [ 3115.572890] kmem_cache_alloc+0x5a/0x320 [ 3115.573263] security_file_alloc+0x38/0x170 [ 3115.573655] __alloc_file+0xb6/0x240 [ 3115.573989] alloc_empty_file+0x71/0x190 [ 3115.574355] alloc_file+0x5e/0x810 [ 3115.574687] alloc_file_pseudo+0x16e/0x260 [ 3115.575065] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 3115.575492] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 3115.575988] ? do_raw_spin_unlock+0x53/0x220 [ 3115.576393] __shmem_file_setup+0x202/0x300 [ 3115.576816] __do_sys_memfd_create+0x32b/0x910 [ 3115.577228] ? ksys_write+0x1a7/0x260 [ 3115.577577] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 3115.578039] do_syscall_64+0x3f/0x90 [ 3115.578392] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3115.578853] RIP: 0033:0x7f226f89db19 [ 3115.579180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3115.580652] RSP: 002b:00007f226ce12f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3115.581285] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f226f89db19 [ 3115.581995] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f226f8f70fb [ 3115.582580] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 3115.583154] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 3115.583721] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012900 [ 3115.584347] 21:43:46 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x3, 0x7fff) pwritev(r0, &(0x7f0000001a40)=[{&(0x7f0000000440)="a978e9120e7f24862f1b09d8807b16f2e8f78002d775d671a8ea3a748319a3a40124d9ffa83d4248c25fcd598cb8f488e4c9e214966a261eb9b9783bf08b0e250b41d90838a1e54f9d9d8f5aca3d3b795e31cc155b62a983ed2963e97ed8ffe4e2afbf01895bdfcb8e39373adc8b690d2cfe", 0x72}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="b9c0db2dc54ee9110bfb648f9a949d089aa513416a77b48cad8657d6e67cbc1e4b1da118b487b11fb6796f9638fbb4b4d3e080e25701e6f1f73e216efb80c11ad9ea28089cbfe50ab17d3c8cf9cc49a5c60346c656df85dc9e5f876071aa9b7cca30a3190c7e619e5d107c462fc0a934ffe9883c18f04b36ad301161e13b099130562a1edacf7b044ae434098beef57dc8476fe98f0a9fa5420837a55e4d3046dcffd15aef5bafb19e3168ea87f9a5ba9b81efa286c526516e7b", 0xba}, {&(0x7f0000001580)="49d0841c45540019b430d84cd6219574329de444466ea58b5f769a321997d7063e6686fc9149c8fe2c43c8dba0b9fc2a882da80798bec8ca25d5ee8662683a9e7a6da920d00f5293535af34b2c4555de79183272ac1c9100f319e9ab7934c55fede6056dc0e601f6138ac8cfcad374bd021ca14cc2139622b1a83aa6d08b51ca521bd74433d68de2085a126bf28194e43a1c5927ccdce44cb5651e5871e60e2ad9000fbd5c213479ecdb8ff831c9f54ce1b474d4156c7de4073c2422812174886fb597f77a2d40c0152047cd637a5895", 0xd0}, {&(0x7f0000001680)="1ba726174645a7bfaf527bc12c5ee1362e4121d7f368823045726a2561dcf8a4cb2b41bd866055994a9cc03ba471be69382e09b27d022341cb0530079f779d6d800db8425177b628e54fd77467a4f8db9b98e16b400565ee4e3495ade214553d60c48eb9c19f57b923ccf882fffdbde6bd5a7fc635886a09e123b41b0960ae192eec8f1ae8120f901fc037ea46a7d80aa257aa", 0x93}, {&(0x7f0000001740)="2f25cd50fac7d2f0161ed570e30ff97135c2bb0eb04a1b5fb2524c57ec63d0b53def2591b6af349c43c9bb11cb6ab9364618d3ada3792683f4d61903faa13335c77019bc0080a3c8e29ab4d09e8cab2e7989154f07b0720900ff92762d21059526f39d91185a703d248878785d8541a7071786eed175d856cf217e43afc3d62c50593debde748d7604a839750777b67945208fccd2dcd0fd58c3d56e444d3ce7ffb3aac6e3f0fb4da5be53c06b22a2c938d071dd671142a809cdc4ab2b9212cc7b000d195963625d22c1220b817175e0aba7f686d9f3fa125b313c321e", 0xdd}, {&(0x7f0000001840)="50f5eb8cb77f7ca5b85868adfd068b5bd9d985ea938464dae5cb5e83eda8ce19ea5c674155ac1ce38c1c5111fc36f0e278613e65280105387612b01f38e23b3d3a1062750adad34907b9ea0a20b689a5a4c3528ecc542aa246639aca645ebd13299245190282f23eb566823595fa954d1e", 0x71}, {&(0x7f00000018c0)="82606e89ce4f5b9ad194a035f64854e9c4c4b28eaa4cc2a50c50d3add0cdc428e2e2ac8b1468bc4e06408d9cba720a0882b6aff4aff6ee5a28fb783b4ba9cb23fa094e8e85c1055ba9816492083d", 0x4e}, {&(0x7f0000001940)="1fbe85712dd842eb2955780b2134cb3b6b5fb1e59d3880002c38c2110533eb35fcc68a3c2474eac272d8b98c2b5388db86c24493510244e274d9f711f01a61ab3bd0f3b7265c7df0a4de6b0b9b92abc75bf03b0ff087725f7a08ae9ca5deb5f232fc014866d816c53e1f8542cfac3fb6bd5115be28b4327c3d3c55d1c695d4120a155a76d7d73ed9fa8192f75ddc5af80ad79030c5146ad0553ef4af85e706a9d6b5d8bb745029e54d70cda348527c03492aca4958bd2dc701d8c472ecc3e4155450", 0xc2}], 0x9, 0x6, 0x2) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x87, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000140)={0x2000}) [ 3115.669923] loop4: detected capacity change from 0 to 4 [ 3115.696459] EXT4-fs (loop4): Unsupported encryption level 189 [ 3115.805641] FAULT_INJECTION: forcing a failure. [ 3115.805641] name failslab, interval 1, probability 0, space 0, times 0 [ 3115.806651] CPU: 0 PID: 34128 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3115.807307] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3115.807929] Call Trace: [ 3115.808144] [ 3115.808339] dump_stack_lvl+0xc1/0xf0 [ 3115.808720] should_fail_ex+0x4b4/0x5b0 [ 3115.809073] ? security_file_alloc+0x38/0x170 [ 3115.809470] should_failslab+0x9/0x20 [ 3115.809803] kmem_cache_alloc+0x5a/0x320 [ 3115.810158] security_file_alloc+0x38/0x170 [ 3115.810541] __alloc_file+0xb6/0x240 [ 3115.810878] alloc_empty_file+0x71/0x190 [ 3115.811213] path_openat+0xd8/0x2750 [ 3115.811548] ? __pfx_path_openat+0x10/0x10 [ 3115.811901] ? __pfx___lock_acquire+0x10/0x10 [ 3115.812280] ? __create_object+0x3ee/0xc90 [ 3115.812659] do_filp_open+0x1ba/0x410 [ 3115.812997] ? __pfx_do_filp_open+0x10/0x10 [ 3115.813367] ? find_held_lock+0x2c/0x110 [ 3115.813720] ? alloc_fd+0x2eb/0x760 [ 3115.814045] ? lock_release+0x1e3/0x710 [ 3115.814402] ? do_raw_spin_lock+0x125/0x270 [ 3115.814777] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 3115.815173] ? lock_acquire+0x32/0xc0 [ 3115.815517] ? alloc_fd+0x6e/0x760 [ 3115.815853] ? _raw_spin_unlock+0x1e/0x40 [ 3115.816218] ? alloc_fd+0x2eb/0x760 [ 3115.816541] do_sys_openat2+0x171/0x4c0 [ 3115.816923] ? __pfx_do_sys_openat2+0x10/0x10 [ 3115.817330] __x64_sys_openat+0x143/0x200 [ 3115.817709] ? __pfx___x64_sys_openat+0x10/0x10 [ 3115.818138] do_syscall_64+0x3f/0x90 [ 3115.818482] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3115.818934] RIP: 0033:0x7f6840a0aa04 [ 3115.819260] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3115.820732] RSP: 002b:00007f683dfcced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3115.821359] RAX: ffffffffffffffda RBX: 00007f6840aa1970 RCX: 00007f6840a0aa04 [ 3115.821942] RDX: 0000000000000002 RSI: 00007f683dfcd000 RDI: 00000000ffffff9c [ 3115.822523] RBP: 00007f683dfcd000 R08: 0000000000000000 R09: ffffffffffffffff [ 3115.823118] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3115.823730] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 3115.824352] 21:44:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20a60200000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:44:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824, 0x0, 0x0, 0x4000000000}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) r3 = accept$inet(r2, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f0000000440)=0x10) ioctl$EXT4_IOC_GET_ES_CACHE(r3, 0xc020662a, &(0x7f0000000480)=ANY=[@ANYBLOB="010400000000000000000000000300000200000000000000080000000000000008000000000000000400000000000000ff0f000000000000000000000000000000000000000000000228000000000000000000000000000000000000000000005bdc000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000000000000000000001000000000000000000000000000000000000000000000001000000000000000000000000000000070000000000000002000000000000000900000000000000000000000000000000000000000000000004000000000000000000000000000000800000000000000200000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000400000000000000ff7f000000000000010000000100000000000000000000000000000000000000080900000000000800000000000000000500000000000000040000000000000008000000000000000000000000000000000000000000000080020000000000000000000000000000030000000000000006000000000000000200000000000000000000000000000000000000000000000600"/480]) perf_event_open(&(0x7f00000006c0)={0x2, 0x80, 0x20, 0x7, 0x1f, 0x8f, 0x0, 0x40, 0x54320, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7f, 0x2, @perf_config_ext={0xfffffffffffffbff, 0x7c}, 0x40200, 0x5, 0x1c93, 0x5, 0xfff, 0x5, 0x1, 0x0, 0x88f8bee, 0x0, 0x5}, 0x0, 0xa, r1, 0x2) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000680)={0x2, 'ipvlan0\x00'}, 0x18) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:44:03 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r0, &(0x7f0000000300)='oom_score\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x400, 0x140) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, 0x3, 0x6, 0x401, 0x0, 0x0, {0xc, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x40000) r2 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3, 0x8000) syncfs(r1) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x4) 21:44:03 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700004fc7}) 21:44:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 13) 21:44:03 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:44:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 28) 21:44:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 29) [ 3132.727664] loop4: detected capacity change from 0 to 4 [ 3132.731570] loop5: detected capacity change from 0 to 512 [ 3132.743690] loop2: detected capacity change from 0 to 4 [ 3132.746446] EXT4-fs (loop4): Unsupported encryption level 189 [ 3132.756772] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3132.763011] EXT4-fs (loop2): Unsupported encryption level 189 21:44:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000300000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:44:03 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {r0}}, './file1\x00'}) [ 3132.839304] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 21:44:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r1, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pwrite64(r3, &(0x7f0000000440)="e809ff09c32766f35cd8a1c82a47b5e4d378055d7a7e623f578c305997a340cc6889d39b3a57522e07c545a384a783317eec15333231de8a7539d207817ebd968820d190124dcd998e5f44e6f5586975b95331e547b9942e7e30e444d3ad942bccad35f3b1ac84385e5d4b3a50a36f", 0x6f, 0x7) 21:44:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 29) 21:44:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 14) [ 3132.917151] loop4: detected capacity change from 0 to 4 21:44:03 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700004fca}) [ 3132.971824] EXT4-fs (loop4): Unsupported encryption level 189 21:44:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 30) 21:44:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 30) [ 3133.022942] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:44:03 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700005200}) [ 3133.074582] FAULT_INJECTION: forcing a failure. [ 3133.074582] name failslab, interval 1, probability 0, space 0, times 0 [ 3133.075690] CPU: 0 PID: 34217 Comm: syz-executor.5 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3133.076357] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3133.077077] Call Trace: [ 3133.077306] [ 3133.077508] dump_stack_lvl+0xc1/0xf0 [ 3133.077862] should_fail_ex+0x4b4/0x5b0 [ 3133.078230] ? __kernfs_new_node+0xd4/0x870 [ 3133.078605] should_failslab+0x9/0x20 [ 3133.078935] kmem_cache_alloc+0x5a/0x320 [ 3133.079296] __kernfs_new_node+0xd4/0x870 [ 3133.079673] ? __pfx___kernfs_new_node+0x10/0x10 [ 3133.080083] ? selinux_sb_statfs+0x1c3/0x260 [ 3133.080569] ? __pfx___lock_acquire+0x10/0x10 [ 3133.080999] ? __pfx_selinux_sb_statfs+0x10/0x10 [ 3133.081366] ? loop_configure+0x2fb/0x1a00 [ 3133.081693] ? rcu_read_lock_sched_held+0x42/0x80 [ 3133.082054] ? trace_lock_acquire+0x170/0x1e0 [ 3133.082428] ? shmem_statfs+0x1b7/0x3e0 [ 3133.082764] kernfs_create_dir_ns+0xa0/0x230 [ 3133.083141] internal_create_group+0x786/0xb90 [ 3133.083546] ? __pfx_internal_create_group+0x10/0x10 [ 3133.083989] loop_configure+0xf37/0x1a00 [ 3133.084348] lo_ioctl+0x93a/0x19a0 [ 3133.084642] ? putname+0x102/0x140 [ 3133.084993] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3133.085405] ? __pfx_lo_ioctl+0x10/0x10 [ 3133.085703] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 3133.086122] ? __pfx___lock_acquire+0x10/0x10 [ 3133.086525] ? __lock_acquire+0xbd4/0x63b0 [ 3133.086945] ? __pfx_lock_release+0x10/0x10 [ 3133.087329] ? trace_lock_acquire+0x170/0x1e0 [ 3133.087729] ? __pfx___fget_files+0x10/0x10 [ 3133.088099] ? lock_acquire+0x32/0xc0 [ 3133.088451] ? __pfx_lo_ioctl+0x10/0x10 [ 3133.088820] blkdev_ioctl+0x361/0x7f0 [ 3133.089171] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3133.089540] ? selinux_file_ioctl+0xba/0x270 [ 3133.089932] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3133.090305] __x64_sys_ioctl+0x19e/0x210 [ 3133.090667] do_syscall_64+0x3f/0x90 [ 3133.091009] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3133.091451] RIP: 0033:0x7f6840a578d7 [ 3133.091771] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3133.093240] RSP: 002b:00007f683dfccf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3133.093860] RAX: ffffffffffffffda RBX: 00007f6840aa1970 RCX: 00007f6840a578d7 [ 3133.099890] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 3133.100881] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 3133.101527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 3133.102102] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 3133.102828] [ 3133.103150] loop5: detected capacity change from 0 to 512 [ 3133.135631] FAULT_INJECTION: forcing a failure. [ 3133.135631] name fail_page_alloc, interval 1, probability 0, space 0, times 0 21:44:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20800400000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3133.136865] CPU: 0 PID: 34231 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3133.137618] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3133.138286] Call Trace: [ 3133.145007] [ 3133.145219] dump_stack_lvl+0xc1/0xf0 [ 3133.145581] should_fail_ex+0x4b4/0x5b0 [ 3133.145948] prepare_alloc_pages+0x178/0x500 [ 3133.146319] ? lock_is_held_type+0x9f/0x120 [ 3133.146681] __alloc_pages+0x149/0x510 [ 3133.147028] ? lock_release+0x1e3/0x710 [ 3133.147413] ? __pfx___alloc_pages+0x10/0x10 [ 3133.147822] ? mark_lock.part.0+0xef/0x2f30 [ 3133.148205] ? __pfx_mark_lock.part.0+0x10/0x10 [ 3133.148631] vma_alloc_folio+0xe2/0x440 [ 3133.149039] shmem_alloc_folio+0x109/0x1d0 [ 3133.149416] ? __pfx_shmem_alloc_folio+0x10/0x10 [ 3133.149850] ? percpu_counter_add_batch+0xc8/0x180 [ 3133.150280] ? __vm_enough_memory+0x188/0x3f0 [ 3133.150672] shmem_get_folio_gfp.constprop.0+0x6ed/0x1670 [ 3133.151164] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 3133.151658] ? rcu_read_lock_sched_held+0x42/0x80 [ 3133.152069] shmem_write_begin+0x148/0x360 [ 3133.152444] ? __pfx_shmem_write_begin+0x10/0x10 [ 3133.152898] generic_perform_write+0x25a/0x580 [ 3133.153298] ? __pfx_generic_perform_write+0x10/0x10 [ 3133.153731] ? __pfx_file_update_time+0x10/0x10 [ 3133.154150] ? generic_write_checks+0x2c0/0x400 [ 3133.154614] __generic_file_write_iter+0x308/0x4b0 [ 3133.155042] ? trace_lock_acquire+0x170/0x1e0 [ 3133.155478] generic_file_write_iter+0xe7/0x350 [ 3133.155892] vfs_write+0x9b4/0xdc0 [ 3133.156227] ? __pfx_vfs_write+0x10/0x10 [ 3133.156624] __x64_sys_pwrite64+0x1ff/0x260 [ 3133.157026] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 3133.157441] do_syscall_64+0x3f/0x90 [ 3133.157768] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3133.158233] RIP: 0033:0x7f226f850ab7 [ 3133.158530] FAULT_INJECTION: forcing a failure. [ 3133.158530] name failslab, interval 1, probability 0, space 0, times 0 [ 3133.158558] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3133.160936] RSP: 002b:00007f226ce12f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3133.161554] RAX: ffffffffffffffda RBX: 00007f226f8e7970 RCX: 00007f226f850ab7 [ 3133.162144] RDX: 0000000000000063 RSI: 0000000020010000 RDI: 0000000000000004 [ 3133.162718] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 3133.163300] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 3133.163892] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 3133.164468] [ 3133.164673] CPU: 1 PID: 34242 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3133.165488] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3133.166128] Call Trace: [ 3133.166344] [ 3133.166537] dump_stack_lvl+0xc1/0xf0 [ 3133.166873] should_fail_ex+0x4b4/0x5b0 [ 3133.167218] ? __kernfs_new_node+0xd4/0x870 [ 3133.167584] should_failslab+0x9/0x20 [ 3133.167913] kmem_cache_alloc+0x5a/0x320 [ 3133.168267] __kernfs_new_node+0xd4/0x870 [ 3133.168627] ? lock_acquire.part.0+0xec/0x320 [ 3133.173135] ? __pfx___kernfs_new_node+0x10/0x10 [ 3133.173560] ? find_held_lock+0x2c/0x110 [ 3133.173901] ? kernfs_add_one+0x175/0x4f0 [ 3133.174237] ? lock_release+0x1e3/0x710 [ 3133.174576] ? __pfx_lock_release+0x10/0x10 [ 3133.174945] ? kernfs_add_one+0x376/0x4f0 [ 3133.175282] ? lock_acquire+0x32/0xc0 [ 3133.175635] ? kernfs_add_one+0x376/0x4f0 [ 3133.176003] kernfs_new_node+0x97/0x120 [ 3133.176359] __kernfs_create_file+0x55/0x350 [ 3133.176751] sysfs_add_file_mode_ns+0x21c/0x440 [ 3133.177218] ? __pfx_dev_attr_store+0x10/0x10 [ 3133.177597] internal_create_group+0x322/0xb90 [ 3133.178031] ? __pfx_internal_create_group+0x10/0x10 [ 3133.178480] loop_configure+0xf37/0x1a00 [ 3133.178842] lo_ioctl+0x93a/0x19a0 [ 3133.179142] ? putname+0x102/0x140 [ 3133.179467] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3133.179918] ? __pfx_lo_ioctl+0x10/0x10 [ 3133.180261] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 3133.180722] ? __pfx___lock_acquire+0x10/0x10 [ 3133.181157] ? __lock_acquire+0xbd4/0x63b0 [ 3133.181582] ? __pfx_lock_release+0x10/0x10 [ 3133.181953] ? trace_lock_acquire+0x170/0x1e0 [ 3133.182333] ? __pfx___fget_files+0x10/0x10 [ 3133.182692] ? lock_acquire+0x32/0xc0 [ 3133.183020] ? __pfx_lo_ioctl+0x10/0x10 [ 3133.183351] blkdev_ioctl+0x361/0x7f0 [ 3133.183685] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3133.184038] ? selinux_file_ioctl+0xba/0x270 [ 3133.184418] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3133.184780] __x64_sys_ioctl+0x19e/0x210 [ 3133.185186] do_syscall_64+0x3f/0x90 [ 3133.185520] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3133.185951] RIP: 0033:0x7fe02d21c8d7 [ 3133.186260] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3133.187662] RSP: 002b:00007fe02a791f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3133.188263] RAX: ffffffffffffffda RBX: 00007fe02d266970 RCX: 00007fe02d21c8d7 [ 3133.188844] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 3133.189414] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 3133.189975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 3133.190542] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3133.191128] [ 3133.196418] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3133.219528] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 3133.229174] loop4: detected capacity change from 0 to 4 [ 3133.235994] EXT4-fs (loop4): Unsupported encryption level 189 [ 3133.264924] loop2: detected capacity change from 0 to 4 [ 3133.317644] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 3133.324390] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 3150.062562] loop4: detected capacity change from 0 to 4 [ 3150.063358] loop5: detected capacity change from 0 to 512 [ 3150.075970] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3150.081934] EXT4-fs (loop4): Unsupported encryption level 189 [ 3150.082601] FAULT_INJECTION: forcing a failure. [ 3150.082601] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3150.084187] CPU: 0 PID: 34302 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3150.085829] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3150.087435] Call Trace: [ 3150.087950] [ 3150.088395] dump_stack_lvl+0xc1/0xf0 [ 3150.089151] should_fail_ex+0x4b4/0x5b0 [ 3150.089512] copyin+0x19/0x120 [ 3150.089816] copy_page_from_iter_atomic+0x40a/0x14a0 [ 3150.090261] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 3150.090732] ? shmem_write_begin+0x15f/0x360 [ 3150.091127] ? __pfx_shmem_write_begin+0x10/0x10 [ 3150.091557] generic_perform_write+0x2cf/0x580 [ 3150.091960] ? __pfx_generic_perform_write+0x10/0x10 [ 3150.092373] ? __pfx_file_update_time+0x10/0x10 [ 3150.092756] ? generic_write_checks+0x2c0/0x400 [ 3150.101276] __generic_file_write_iter+0x308/0x4b0 [ 3150.101851] ? trace_lock_acquire+0x170/0x1e0 [ 3150.102259] generic_file_write_iter+0xe7/0x350 [ 3150.102699] vfs_write+0x9b4/0xdc0 [ 3150.103031] ? __pfx_vfs_write+0x10/0x10 [ 3150.103470] __x64_sys_pwrite64+0x1ff/0x260 [ 3150.103851] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 3150.104276] do_syscall_64+0x3f/0x90 [ 3150.104620] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3150.105086] RIP: 0033:0x7f226f850ab7 [ 3150.105425] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3150.106860] RSP: 002b:00007f226ce12f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3150.107480] RAX: ffffffffffffffda RBX: 00007f226f8e7970 RCX: 00007f226f850ab7 [ 3150.108064] RDX: 0000000000000063 RSI: 0000000020010000 RDI: 0000000000000004 21:44:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 15) 21:44:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 31) 21:44:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000500000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:44:20 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700005500}) 21:44:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 31) 21:44:20 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r2, &(0x7f0000000300)='oom_score\x00') perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x1, 0x6, 0x6b, 0xfd, 0x0, 0x5, 0x8400, 0x6, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xa63e, 0x1, @perf_config_ext={0x2, 0x2}, 0x40201, 0xfffffffffffffffa, 0xa34, 0x2, 0x0, 0x583, 0x0, 0x0, 0x5e0, 0x0, 0x3}, r2, 0xe, r1, 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r3, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x80, 0x1f, 0xe2, 0xff, 0x35, 0x0, 0x7, 0x20, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140)}, 0x104, 0x7fff, 0x0, 0xa, 0x9, 0x3c0c, 0x2, 0x0, 0x0, 0x0, 0x4}, r3, 0x0, r1, 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:44:20 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) [ 3150.108646] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 3150.109273] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 3150.109861] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 3150.110479] 21:44:20 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SPACE_INFO(r0, 0xc0109414, &(0x7f0000000300)={0x8b5, 0x7, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3150.132181] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 21:44:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 32) 21:44:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000600000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:44:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 32) [ 3150.182954] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 3150.277065] FAULT_INJECTION: forcing a failure. [ 3150.277065] name failslab, interval 1, probability 0, space 0, times 0 [ 3150.278043] CPU: 1 PID: 34323 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3150.278701] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3150.279353] Call Trace: [ 3150.279571] [ 3150.279779] dump_stack_lvl+0xc1/0xf0 [ 3150.280122] should_fail_ex+0x4b4/0x5b0 [ 3150.280476] ? __kernfs_new_node+0xd4/0x870 [ 3150.280875] should_failslab+0x9/0x20 [ 3150.281233] kmem_cache_alloc+0x5a/0x320 [ 3150.281584] ? kernfs_add_one+0x376/0x4f0 [ 3150.281950] __kernfs_new_node+0xd4/0x870 [ 3150.282325] ? kernfs_add_one+0x175/0x4f0 [ 3150.282722] ? lock_release+0x1e3/0x710 [ 3150.283104] ? __pfx___kernfs_new_node+0x10/0x10 [ 3150.283529] ? __pfx_lock_release+0x10/0x10 [ 3150.283923] ? kernfs_add_one+0x376/0x4f0 [ 3150.284287] ? kernfs_add_one+0x376/0x4f0 [ 3150.284647] ? down_write+0x11a/0x1f0 [ 3150.285004] ? up_write+0x196/0x510 [ 3150.285387] kernfs_new_node+0x97/0x120 [ 3150.285724] __kernfs_create_file+0x55/0x350 [ 3150.286112] sysfs_add_file_mode_ns+0x21c/0x440 [ 3150.286528] ? __pfx_dev_attr_store+0x10/0x10 [ 3150.286918] internal_create_group+0x322/0xb90 [ 3150.287318] ? __pfx_internal_create_group+0x10/0x10 [ 3150.287767] loop_configure+0xf37/0x1a00 [ 3150.288154] lo_ioctl+0x93a/0x19a0 [ 3150.288471] ? putname+0x102/0x140 [ 3150.288791] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3150.289275] ? __pfx_lo_ioctl+0x10/0x10 [ 3150.289612] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 3150.290072] ? __lock_acquire+0xbd4/0x63b0 [ 3150.290498] ? __pfx_lock_release+0x10/0x10 [ 3150.290881] ? trace_lock_acquire+0x170/0x1e0 [ 3150.291271] ? __pfx___fget_files+0x10/0x10 [ 3150.291637] ? lock_acquire+0x32/0xc0 [ 3150.291975] ? __pfx_lo_ioctl+0x10/0x10 [ 3150.292310] blkdev_ioctl+0x361/0x7f0 [ 3150.292652] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3150.293012] ? selinux_file_ioctl+0xba/0x270 [ 3150.293437] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3150.293802] __x64_sys_ioctl+0x19e/0x210 [ 3150.294150] do_syscall_64+0x3f/0x90 [ 3150.294484] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3150.294934] RIP: 0033:0x7fe02d21c8d7 [ 3150.295254] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3150.296651] RSP: 002b:00007fe02a791f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3150.297317] RAX: ffffffffffffffda RBX: 00007fe02d266970 RCX: 00007fe02d21c8d7 [ 3150.297898] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 3150.298485] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 3150.299059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 3150.299618] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3150.300222] [ 3150.306854] loop4: detected capacity change from 0 to 4 21:44:20 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f0000000440)={{0xcc, 0x3, 0x9, 0xaa, 0x123, 0x3, 0x110, 0x6}, "96e837b23a5011b264da6c963afba9f5d5f724da6ed9bc4792f29b6fbd6ace9d77986d21974cf352f21c5f4e624b55c5af95fb1ff900844142c248bd814dfa9ec2db96f1a3e30104b6c23d8afa268513c3f34b9adb1c08f6edf9f945236c2d73736a1e548410175a9cbc", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x78a) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 3150.309514] EXT4-fs (loop4): Unsupported encryption level 189 [ 3150.317080] loop2: detected capacity change from 0 to 4 21:44:20 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700005504}) 21:44:20 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) [ 3150.459721] EXT4-fs (loop2): Unsupported encryption level 189 [ 3150.505145] loop5: detected capacity change from 0 to 512 [ 3150.629219] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3150.669677] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 3150.729689] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:44:37 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f0000000500)={{r3}, r4, 0xa, @inherit={0x60, &(0x7f0000000140)={0x1, 0x3, 0x2, 0x8, {0x0, 0x5, 0x400, 0xc54, 0x3}, [0x3, 0x7, 0x2]}}, @name="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"}) 21:44:37 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:44:37 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x811, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:44:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000700000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:44:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 33) 21:44:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 16) 21:44:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 33) 21:44:37 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700005904}) [ 3167.364632] loop4: detected capacity change from 0 to 4 [ 3167.368206] loop5: detected capacity change from 0 to 512 [ 3167.370630] FAULT_INJECTION: forcing a failure. [ 3167.370630] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3167.371546] CPU: 1 PID: 34550 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3167.372176] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3167.372807] Call Trace: [ 3167.373023] [ 3167.373209] dump_stack_lvl+0xc1/0xf0 [ 3167.373570] should_fail_ex+0x4b4/0x5b0 [ 3167.373974] copyin+0x19/0x120 [ 3167.374279] copy_page_from_iter_atomic+0x40a/0x14a0 [ 3167.374711] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 3167.375147] ? shmem_write_begin+0x15f/0x360 [ 3167.375520] ? __pfx_shmem_write_begin+0x10/0x10 [ 3167.375930] generic_perform_write+0x2cf/0x580 [ 3167.376318] ? __pfx_generic_perform_write+0x10/0x10 [ 3167.376722] ? __pfx_file_update_time+0x10/0x10 [ 3167.377121] ? generic_write_checks+0x2c0/0x400 [ 3167.377556] __generic_file_write_iter+0x308/0x4b0 [ 3167.377968] ? trace_lock_acquire+0x170/0x1e0 [ 3167.378360] generic_file_write_iter+0xe7/0x350 [ 3167.378765] vfs_write+0x9b4/0xdc0 [ 3167.379097] ? __pfx_vfs_write+0x10/0x10 [ 3167.379493] __x64_sys_pwrite64+0x1ff/0x260 [ 3167.379860] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 3167.380282] do_syscall_64+0x3f/0x90 [ 3167.380614] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3167.381170] RIP: 0033:0x7f226f850ab7 [ 3167.381516] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3167.382949] RSP: 002b:00007f226ce12f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3167.383575] RAX: ffffffffffffffda RBX: 00007f226f8e7970 RCX: 00007f226f850ab7 [ 3167.384149] RDX: 0000000000000097 RSI: 00000000200004c0 RDI: 0000000000000004 [ 3167.384748] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 3167.385470] R10: 00000000000004e0 R11: 0000000000000293 R12: 0000000000000004 [ 3167.386056] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 3167.386661] [ 3167.401224] loop2: detected capacity change from 0 to 4 [ 3167.438176] EXT4-fs (loop4): Unsupported encryption level 189 [ 3167.447585] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3167.465972] EXT4-fs (loop2): Unsupported encryption level 189 21:44:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20001800000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:44:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 34) [ 3167.544218] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 21:44:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 17) [ 3167.563541] FAULT_INJECTION: forcing a failure. [ 3167.563541] name failslab, interval 1, probability 0, space 0, times 0 [ 3167.564553] CPU: 1 PID: 34616 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3167.565223] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3167.565943] Call Trace: [ 3167.566169] [ 3167.566384] dump_stack_lvl+0xc1/0xf0 [ 3167.566733] should_fail_ex+0x4b4/0x5b0 [ 3167.567091] ? __kernfs_new_node+0xd4/0x870 [ 3167.567470] should_failslab+0x9/0x20 [ 3167.567806] kmem_cache_alloc+0x5a/0x320 [ 3167.568158] ? kernfs_add_one+0x376/0x4f0 [ 3167.568516] __kernfs_new_node+0xd4/0x870 [ 3167.568882] ? kernfs_add_one+0x175/0x4f0 21:44:38 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700005a04}) 21:44:38 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) openat(r2, &(0x7f0000000140)='./file1\x00', 0x200, 0x0) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 3167.569245] ? lock_release+0x1e3/0x710 [ 3167.569632] ? __pfx___kernfs_new_node+0x10/0x10 [ 3167.570039] ? __pfx_lock_release+0x10/0x10 [ 3167.570423] ? kernfs_add_one+0x376/0x4f0 [ 3167.570775] ? kernfs_add_one+0x376/0x4f0 [ 3167.571132] ? down_write+0x11a/0x1f0 [ 3167.573335] ? up_write+0x196/0x510 [ 3167.577793] kernfs_new_node+0x97/0x120 [ 3167.578808] __kernfs_create_file+0x55/0x350 [ 3167.579933] sysfs_add_file_mode_ns+0x21c/0x440 [ 3167.581094] ? __pfx_dev_attr_store+0x10/0x10 21:44:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x9, 0x2100) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000140)=0x7, &(0x7f0000000180)=0x2) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3167.582252] internal_create_group+0x322/0xb90 [ 3167.583787] ? __pfx_internal_create_group+0x10/0x10 [ 3167.585056] loop_configure+0xf37/0x1a00 [ 3167.590071] lo_ioctl+0x93a/0x19a0 [ 3167.591023] ? putname+0x102/0x140 [ 3167.591865] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3167.593293] ? __pfx_lo_ioctl+0x10/0x10 [ 3167.594319] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 3167.595646] ? __pfx___lock_acquire+0x10/0x10 [ 3167.596869] ? __lock_acquire+0xbd4/0x63b0 [ 3167.598096] ? __pfx_lock_release+0x10/0x10 [ 3167.599266] ? trace_lock_acquire+0x170/0x1e0 [ 3167.600478] ? __pfx___fget_files+0x10/0x10 [ 3167.601652] ? lock_acquire+0x32/0xc0 [ 3167.602657] ? __pfx_lo_ioctl+0x10/0x10 [ 3167.603691] blkdev_ioctl+0x361/0x7f0 [ 3167.604699] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3167.605838] ? selinux_file_ioctl+0xba/0x270 [ 3167.606979] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3167.608095] __x64_sys_ioctl+0x19e/0x210 [ 3167.609161] do_syscall_64+0x3f/0x90 [ 3167.610221] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3167.611618] RIP: 0033:0x7fe02d21c8d7 [ 3167.612616] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3167.617411] RSP: 002b:00007fe02a791f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3167.619359] RAX: ffffffffffffffda RBX: 00007fe02d266970 RCX: 00007fe02d21c8d7 [ 3167.621208] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 3167.623057] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 21:44:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 34) [ 3167.624641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 3167.626482] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3167.628126] [ 3167.651082] loop4: detected capacity change from 0 to 4 21:44:38 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) [ 3167.911091] EXT4-fs (loop4): Unsupported encryption level 189 [ 3168.270589] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 3168.274571] FAULT_INJECTION: forcing a failure. [ 3168.274571] name failslab, interval 1, probability 0, space 0, times 0 [ 3168.277154] CPU: 1 PID: 34666 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3168.278959] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3168.280770] Call Trace: [ 3168.281382] [ 3168.281886] dump_stack_lvl+0xc1/0xf0 [ 3168.282741] should_fail_ex+0x4b4/0x5b0 [ 3168.283617] ? getname_flags.part.0+0x50/0x4f0 [ 3168.284628] should_failslab+0x9/0x20 [ 3168.285519] kmem_cache_alloc+0x5a/0x320 [ 3168.286427] getname_flags.part.0+0x50/0x4f0 [ 3168.287408] ? vfs_write+0x488/0xdc0 [ 3168.288241] getname+0x92/0xe0 [ 3168.288969] do_sys_openat2+0xf9/0x4c0 [ 3168.289849] ? __pfx_do_sys_openat2+0x10/0x10 [ 3168.290853] __x64_sys_openat+0x143/0x200 [ 3168.291778] ? __pfx___x64_sys_openat+0x10/0x10 [ 3168.292833] do_syscall_64+0x3f/0x90 [ 3168.293689] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3168.294834] RIP: 0033:0x7f226f850a04 [ 3168.295656] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3168.299678] RSP: 002b:00007f226ce12ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3168.301362] RAX: ffffffffffffffda RBX: 00007f226f8e7970 RCX: 00007f226f850a04 [ 3168.302932] RDX: 0000000000000002 RSI: 00007f226ce13000 RDI: 00000000ffffff9c [ 3168.304497] RBP: 00007f226ce13000 R08: 0000000000000000 R09: ffffffffffffffff [ 3168.306119] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3168.306706] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3168.307293] [ 3168.456421] loop5: detected capacity change from 0 to 512 [ 3168.468365] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3168.488625] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 3168.637078] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:45:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 35) 21:45:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20001c00000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:45:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r1, 0x80489439, &(0x7f0000000140)) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:45:03 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:45:03 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700007800}) 21:45:03 executing program 0: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000140)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r2, &(0x7f0000000300)='oom_score\x00') r3 = openat$full(0xffffffffffffff9c, &(0x7f00000004c0), 0x400101, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x1, 0x6, 0x8, 0x6, 0x0, 0x1, 0x842, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xff, 0x4, @perf_config_ext={0x1f, 0x3}, 0x0, 0x200, 0x81, 0x8, 0x1000, 0x7ff, 0x1, 0x0, 0x9, 0x0, 0xc84}, r2, 0x0, r3, 0x9) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:45:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 35) 21:45:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 18) [ 3193.222624] loop2: detected capacity change from 0 to 4 [ 3193.236731] EXT4-fs (loop2): Unsupported encryption level 189 [ 3193.244946] loop5: detected capacity change from 0 to 512 [ 3193.249078] FAULT_INJECTION: forcing a failure. [ 3193.249078] name failslab, interval 1, probability 0, space 0, times 0 [ 3193.252003] CPU: 0 PID: 34800 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3193.254041] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3193.255925] Call Trace: [ 3193.257982] [ 3193.258530] dump_stack_lvl+0xc1/0xf0 [ 3193.259469] should_fail_ex+0x4b4/0x5b0 [ 3193.260436] ? __kernfs_new_node+0xd4/0x870 [ 3193.261496] should_failslab+0x9/0x20 [ 3193.262461] kmem_cache_alloc+0x5a/0x320 [ 3193.263459] ? kernfs_add_one+0x376/0x4f0 [ 3193.264492] __kernfs_new_node+0xd4/0x870 [ 3193.265522] ? kernfs_add_one+0x175/0x4f0 [ 3193.268506] ? lock_release+0x1e3/0x710 [ 3193.269470] ? __pfx___kernfs_new_node+0x10/0x10 [ 3193.270639] ? __pfx_lock_release+0x10/0x10 [ 3193.271653] ? kernfs_add_one+0x376/0x4f0 [ 3193.272647] ? kernfs_add_one+0x376/0x4f0 [ 3193.273638] ? down_write+0x11a/0x1f0 [ 3193.274578] ? up_write+0x196/0x510 [ 3193.275480] kernfs_new_node+0x97/0x120 [ 3193.276423] __kernfs_create_file+0x55/0x350 [ 3193.277529] sysfs_add_file_mode_ns+0x21c/0x440 [ 3193.282796] ? __pfx_dev_attr_store+0x10/0x10 [ 3193.283865] internal_create_group+0x322/0xb90 [ 3193.284960] ? __pfx_internal_create_group+0x10/0x10 [ 3193.286187] loop_configure+0xf37/0x1a00 [ 3193.287220] lo_ioctl+0x93a/0x19a0 [ 3193.288147] ? putname+0x102/0x140 [ 3193.289088] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3193.290391] ? __pfx_lo_ioctl+0x10/0x10 [ 3193.291344] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 3193.292589] ? __lock_acquire+0xbd4/0x63b0 [ 3193.293823] ? __pfx_lock_release+0x10/0x10 [ 3193.294944] ? trace_lock_acquire+0x170/0x1e0 [ 3193.296015] ? __pfx___fget_files+0x10/0x10 [ 3193.297014] ? lock_acquire+0x32/0xc0 [ 3193.297960] ? __pfx_lo_ioctl+0x10/0x10 [ 3193.298875] blkdev_ioctl+0x361/0x7f0 [ 3193.299789] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3193.300806] ? selinux_file_ioctl+0xba/0x270 [ 3193.301975] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3193.303059] __x64_sys_ioctl+0x19e/0x210 [ 3193.304125] do_syscall_64+0x3f/0x90 [ 3193.305084] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3193.306454] RIP: 0033:0x7fe02d21c8d7 [ 3193.307414] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3193.312038] RSP: 002b:00007fe02a791f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3193.314072] RAX: ffffffffffffffda RBX: 00007fe02d266970 RCX: 00007fe02d21c8d7 [ 3193.315995] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 3193.317904] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 3193.319630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 3193.321418] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3193.323293] 21:45:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20002000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3193.328516] loop4: detected capacity change from 0 to 4 [ 3193.337356] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3193.356348] EXT4-fs (loop4): Unsupported encryption level 189 [ 3193.397645] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 21:45:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x1192c, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0x7f, 0x3ff, 0x0, 0x4, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000140), &(0x7f0000000440)={0x0, 0xfb, 0xcf, 0x0, 0x7f, "b0ab58fde18c756ba6e289d8d5070ec8", "7935a007333ffc30be14112fe6d6b0d6674b9215c383c4b62bac23b0c8a8e371a77f089e96bebf03914b61f94c11f22b22a18542e3331d3163d77aba14d80770fd960f28a3d30a23d495e7f270ef6f60cfba0becf64d095e004845ffea9c39174d4c3b52b23338ee5d9eefc61d7796e773631ee6684af11ccbdb2daf35510dfbce7711ff9e7aec2cac081f9f8f1867854b9eed0609c0a34eeb6fcc74b54f45d960d69006dd801e40a5af76d310b7aeca61a458b3f630344fe32b"}, 0xcf, 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:45:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 19) 21:45:03 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700007f00}) 21:45:03 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:45:03 executing program 3: r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2200, 0x0, 0x0, 0x0, 0x0, 0x4}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r2, &(0x7f0000000300)='oom_score\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)=0x4010) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f00000001c0)={0x1, 0x6, 0x5636}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x4010) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) openat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x4002, 0x110) kcmp$KCMP_EPOLL_TFD(r2, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000140)={r5, r6, 0x8}) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:45:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20012100000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3193.604378] FAULT_INJECTION: forcing a failure. [ 3193.604378] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3193.605412] CPU: 1 PID: 34912 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3193.606109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3193.606760] Call Trace: [ 3193.606978] [ 3193.607174] dump_stack_lvl+0xc1/0xf0 [ 3193.607511] should_fail_ex+0x4b4/0x5b0 [ 3193.607854] strncpy_from_user+0x38/0x3e0 [ 3193.608214] getname_flags.part.0+0x95/0x4f0 [ 3193.608607] ? vfs_write+0x488/0xdc0 [ 3193.608941] getname+0x92/0xe0 [ 3193.609226] do_sys_openat2+0xf9/0x4c0 [ 3193.609576] ? __pfx_do_sys_openat2+0x10/0x10 [ 3193.610026] __x64_sys_openat+0x143/0x200 [ 3193.610383] ? __pfx___x64_sys_openat+0x10/0x10 [ 3193.610799] do_syscall_64+0x3f/0x90 [ 3193.611132] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3193.611577] RIP: 0033:0x7f226f850a04 [ 3193.611903] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 21:45:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 36) [ 3193.613338] RSP: 002b:00007f226ce12ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3193.614010] RAX: ffffffffffffffda RBX: 00007f226f8e7970 RCX: 00007f226f850a04 [ 3193.614592] RDX: 0000000000000002 RSI: 00007f226ce13000 RDI: 00000000ffffff9c [ 3193.615157] RBP: 00007f226ce13000 R08: 0000000000000000 R09: ffffffffffffffff [ 3193.617964] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3193.618551] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3193.619130] [ 3193.622102] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 21:45:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 36) 21:45:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20003700000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:45:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 20) 21:45:04 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700007fd0}) [ 3193.763153] FAULT_INJECTION: forcing a failure. [ 3193.763153] name failslab, interval 1, probability 0, space 0, times 0 [ 3193.764193] CPU: 0 PID: 34929 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3193.764867] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3193.765540] Call Trace: [ 3193.765793] [ 3193.766008] dump_stack_lvl+0xc1/0xf0 [ 3193.766555] should_fail_ex+0x4b4/0x5b0 [ 3193.767419] ? __kernfs_new_node+0xd4/0x870 [ 3193.768328] should_failslab+0x9/0x20 [ 3193.769134] kmem_cache_alloc+0x5a/0x320 [ 3193.769524] ? kernfs_add_one+0x376/0x4f0 [ 3193.769925] __kernfs_new_node+0xd4/0x870 [ 3193.770286] ? kernfs_add_one+0x175/0x4f0 [ 3193.770651] ? lock_release+0x1e3/0x710 [ 3193.771029] ? __pfx___kernfs_new_node+0x10/0x10 [ 3193.771462] ? __pfx_lock_release+0x10/0x10 [ 3193.771856] ? kernfs_add_one+0x376/0x4f0 [ 3193.772223] ? kernfs_add_one+0x376/0x4f0 [ 3193.772601] ? down_write+0x11a/0x1f0 [ 3193.772987] ? up_write+0x196/0x510 [ 3193.773343] kernfs_new_node+0x97/0x120 [ 3193.773824] __kernfs_create_file+0x55/0x350 [ 3193.774966] sysfs_add_file_mode_ns+0x21c/0x440 [ 3193.776294] ? __pfx_dev_attr_store+0x10/0x10 [ 3193.777595] internal_create_group+0x322/0xb90 [ 3193.778668] ? __pfx_internal_create_group+0x10/0x10 [ 3193.779731] loop_configure+0xf37/0x1a00 [ 3193.780701] lo_ioctl+0x93a/0x19a0 [ 3193.781540] ? putname+0x102/0x140 [ 3193.782547] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3193.783743] ? __pfx_lo_ioctl+0x10/0x10 [ 3193.784641] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 3193.786285] ? __lock_acquire+0xbd4/0x63b0 [ 3193.787508] ? __pfx_lock_release+0x10/0x10 [ 3193.788569] ? trace_lock_acquire+0x170/0x1e0 [ 3193.788931] FAULT_INJECTION: forcing a failure. [ 3193.788931] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3193.789883] ? __pfx___fget_files+0x10/0x10 [ 3193.793226] ? lock_acquire+0x32/0xc0 [ 3193.793605] ? __pfx_lo_ioctl+0x10/0x10 [ 3193.794902] blkdev_ioctl+0x361/0x7f0 [ 3193.795935] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3193.797092] ? selinux_file_ioctl+0xba/0x270 [ 3193.798432] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3193.799574] __x64_sys_ioctl+0x19e/0x210 [ 3193.800533] do_syscall_64+0x3f/0x90 [ 3193.801659] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3193.803055] RIP: 0033:0x7fe02d21c8d7 [ 3193.804012] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3193.808818] RSP: 002b:00007fe02a791f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3193.810949] RAX: ffffffffffffffda RBX: 00007fe02d266970 RCX: 00007fe02d21c8d7 [ 3193.812842] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 3193.814891] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 3193.816753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 3193.818768] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3193.820702] [ 3193.821469] CPU: 1 PID: 34932 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3193.826728] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3193.828782] Call Trace: [ 3193.829457] [ 3193.830071] dump_stack_lvl+0xc1/0xf0 [ 3193.831075] should_fail_ex+0x4b4/0x5b0 [ 3193.832141] strncpy_from_user+0x38/0x3e0 [ 3193.833263] getname_flags.part.0+0x95/0x4f0 [ 3193.834406] ? vfs_write+0x488/0xdc0 [ 3193.835355] getname+0x92/0xe0 [ 3193.836206] do_sys_openat2+0xf9/0x4c0 [ 3193.837184] ? __pfx_do_sys_openat2+0x10/0x10 [ 3193.838365] __x64_sys_openat+0x143/0x200 [ 3193.839411] ? __pfx___x64_sys_openat+0x10/0x10 [ 3193.840656] do_syscall_64+0x3f/0x90 [ 3193.841604] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3193.843025] RIP: 0033:0x7f226f850a04 [ 3193.844020] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3193.848708] RSP: 002b:00007f226ce12ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3193.850696] RAX: ffffffffffffffda RBX: 00007f226f8e7970 RCX: 00007f226f850a04 [ 3193.852506] RDX: 0000000000000002 RSI: 00007f226ce13000 RDI: 00000000ffffff9c [ 3193.854364] RBP: 00007f226ce13000 R08: 0000000000000000 R09: ffffffffffffffff [ 3193.856194] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3193.857832] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3193.859408] [ 3193.932077] loop4: detected capacity change from 0 to 4 [ 3193.989952] EXT4-fs (loop4): Unsupported encryption level 189 21:45:21 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400), 0x0, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:45:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 21) 21:45:21 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:45:21 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000c000}) 21:45:21 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0), 0x200, 0x0) fsetxattr$security_ima(r2, &(0x7f0000000400), &(0x7f0000000440)=@sha1={0x1, "904244066ee434329fdf3417ee0a46eaffc5e7c3"}, 0x15, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x7, 0x6, 0x7, 0x3f, 0x0, 0x7ff, 0xc0041, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xed, 0x1, @perf_bp={&(0x7f00000001c0), 0x9}, 0x4, 0x77, 0x6, 0x9, 0x7, 0x10000, 0x3ff, 0x0, 0x200, 0x0, 0x6}, r3, 0x1, r0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)=0x4010) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0xe1, 0x7d, 0x4, 0x2, 0x0, 0xfd, 0x42020, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000480), 0x4}, 0x0, 0x3, 0xd1c8, 0x0, 0x8, 0x56a8, 0x9f4c, 0x0, 0x1f, 0x0, 0x6}, 0xffffffffffffffff, 0x9, r4, 0x9) r5 = openat(r1, &(0x7f0000000000)='./file1\x00', 0x103002, 0x140) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r6, &(0x7f0000000300)='oom_score\x00') perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x6, 0x1, 0x20, 0x3f, 0x0, 0x5, 0x8, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x980, 0x3}, 0x800, 0x2, 0x5, 0x1, 0xfffffffffffeffff, 0x0, 0x2, 0x0, 0x39, 0x0, 0x7fffffff}, r6, 0x10, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x7, 0x1f, 0x8a, 0x0, 0xe, 0x20, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x5, 0x81}, 0x8880, 0x400, 0x2461261a, 0x0, 0x9, 0xb51, 0x8, 0x0, 0x40, 0x0, 0x6}, 0x0, 0xe, r5, 0x2) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) r7 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r7, 0x40089413, &(0x7f0000000380)=0x7) 21:45:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20003a00000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:45:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) 21:45:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 37) [ 3210.720376] loop5: detected capacity change from 0 to 512 [ 3210.721193] loop2: detected capacity change from 0 to 4 [ 3210.740355] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3210.746989] EXT4-fs (loop2): Unsupported encryption level 189 [ 3210.774411] FAULT_INJECTION: forcing a failure. [ 3210.774411] name failslab, interval 1, probability 0, space 0, times 0 [ 3210.775402] CPU: 1 PID: 35060 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3210.776071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3210.776735] Call Trace: [ 3210.776961] [ 3210.777169] dump_stack_lvl+0xc1/0xf0 [ 3210.777521] should_fail_ex+0x4b4/0x5b0 [ 3210.777898] ? __kernfs_new_node+0xd4/0x870 [ 3210.778278] should_failslab+0x9/0x20 [ 3210.778613] kmem_cache_alloc+0x5a/0x320 [ 3210.778959] ? kernfs_add_one+0x376/0x4f0 [ 3210.779322] __kernfs_new_node+0xd4/0x870 [ 3210.779696] ? kernfs_add_one+0x175/0x4f0 [ 3210.780052] ? lock_release+0x1e3/0x710 [ 3210.780417] ? __pfx___kernfs_new_node+0x10/0x10 [ 3210.780821] ? __pfx_lock_release+0x10/0x10 [ 3210.781181] ? kernfs_add_one+0x376/0x4f0 [ 3210.781520] ? kernfs_add_one+0x376/0x4f0 [ 3210.781912] ? down_write+0x11a/0x1f0 [ 3210.782270] ? up_write+0x196/0x510 [ 3210.782586] kernfs_new_node+0x97/0x120 [ 3210.782927] __kernfs_create_file+0x55/0x350 [ 3210.783300] sysfs_add_file_mode_ns+0x21c/0x440 [ 3210.783692] ? __pfx_dev_attr_store+0x10/0x10 [ 3210.784084] internal_create_group+0x322/0xb90 [ 3210.784495] ? __pfx_internal_create_group+0x10/0x10 [ 3210.785074] loop_configure+0xf37/0x1a00 [ 3210.785446] lo_ioctl+0x93a/0x19a0 [ 3210.785754] ? putname+0x102/0x140 [ 3210.786103] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3210.786542] ? __pfx_lo_ioctl+0x10/0x10 [ 3210.786903] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 3210.787345] ? __lock_acquire+0xbd4/0x63b0 [ 3210.787768] ? __pfx_lock_release+0x10/0x10 [ 3210.788129] ? trace_lock_acquire+0x170/0x1e0 [ 3210.788508] ? __pfx___fget_files+0x10/0x10 [ 3210.788866] ? lock_acquire+0x32/0xc0 [ 3210.789190] ? __pfx_lo_ioctl+0x10/0x10 [ 3210.789516] blkdev_ioctl+0x361/0x7f0 [ 3210.789835] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3210.790239] ? selinux_file_ioctl+0xba/0x270 [ 3210.790608] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3210.790969] __x64_sys_ioctl+0x19e/0x210 [ 3210.791313] do_syscall_64+0x3f/0x90 [ 3210.791641] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3210.792070] RIP: 0033:0x7fe02d21c8d7 [ 3210.792377] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3210.793952] RSP: 002b:00007fe02a791f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3210.794553] RAX: ffffffffffffffda RBX: 00007fe02d266970 RCX: 00007fe02d21c8d7 [ 3210.795168] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 3210.795732] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 3210.796296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 3210.796872] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3210.797460] 21:45:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 22) [ 3210.806240] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 21:45:21 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000c006}) [ 3210.891347] loop4: detected capacity change from 0 to 4 [ 3210.909746] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 3210.916496] EXT4-fs (loop4): Unsupported encryption level 189 [ 3210.994766] FAULT_INJECTION: forcing a failure. [ 3210.994766] name failslab, interval 1, probability 0, space 0, times 0 [ 3210.995742] CPU: 0 PID: 35163 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3210.996392] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3210.997034] Call Trace: [ 3210.997257] [ 3210.997455] dump_stack_lvl+0xc1/0xf0 [ 3210.997792] should_fail_ex+0x4b4/0x5b0 [ 3210.998171] ? security_file_alloc+0x38/0x170 [ 3210.998563] should_failslab+0x9/0x20 [ 3210.998902] kmem_cache_alloc+0x5a/0x320 [ 3210.999282] security_file_alloc+0x38/0x170 [ 3210.999651] __alloc_file+0xb6/0x240 [ 3210.999975] alloc_empty_file+0x71/0x190 [ 3211.000348] path_openat+0xd8/0x2750 [ 3211.000693] ? __pfx_path_openat+0x10/0x10 [ 3211.001060] ? __pfx___lock_acquire+0x10/0x10 [ 3211.001491] ? __create_object+0x3ee/0xc90 [ 3211.001878] do_filp_open+0x1ba/0x410 [ 3211.002250] ? __pfx_do_filp_open+0x10/0x10 [ 3211.002624] ? find_held_lock+0x2c/0x110 [ 3211.002972] ? alloc_fd+0x2eb/0x760 [ 3211.003285] ? lock_release+0x1e3/0x710 [ 3211.003636] ? do_raw_spin_lock+0x125/0x270 [ 3211.004018] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 3211.004551] ? lock_acquire+0x32/0xc0 [ 3211.004881] ? alloc_fd+0x6e/0x760 [ 3211.005218] ? _raw_spin_unlock+0x1e/0x40 [ 3211.005573] ? alloc_fd+0x2eb/0x760 [ 3211.005925] do_sys_openat2+0x171/0x4c0 [ 3211.006272] ? __pfx_do_sys_openat2+0x10/0x10 [ 3211.006660] __x64_sys_openat+0x143/0x200 [ 3211.007010] ? __pfx___x64_sys_openat+0x10/0x10 [ 3211.007410] do_syscall_64+0x3f/0x90 [ 3211.007735] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3211.008171] RIP: 0033:0x7f226f850a04 [ 3211.008481] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3211.009860] RSP: 002b:00007f226ce12ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3211.010465] RAX: ffffffffffffffda RBX: 00007f226f8e7970 RCX: 00007f226f850a04 [ 3211.011011] RDX: 0000000000000002 RSI: 00007f226ce13000 RDI: 00000000ffffff9c [ 3211.011565] RBP: 00007f226ce13000 R08: 0000000000000000 R09: ffffffffffffffff [ 3211.012116] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3211.012672] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3211.013243] 21:45:37 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x1) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x4010) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001500)=0x6, 0x43d2) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r1, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) r4 = mq_open(&(0x7f0000001680)='\x1e5q\xe6\x88\x01\x00)\xff\xe5q\xb0\x06w\xc6\xa7\xfe\xff\xdf\xf6\xc4?\x00\xac\x83P\x8d[\x00\x00\x00{\x04\xfcy\xa6\xa0\x9e \xfd\x1e%F\xd8\xcf\x06HL\xd21\x1d\xd1\xf6\x1ft\x8fFX\x18\xfd\xb0/\x9a\xe5\xcd\x90\xe0\xb6\xfe\x92U\xdc\x15=\xe0\xdaSNl\xe7)_\x01\x80\x8e\a#\xd1w|\x00\x00\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x4}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r4, 0x5000943f, &(0x7f0000000500)={{}, r5, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000200)={{}, r5, 0x18, @unused=[0x3ff, 0xcd0, 0x0, 0x4], @name="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"}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000001580)={"ccc9e14375baec6442a71bfca0c00062", r5, r3, {0x6, 0x1b4}, {0x3, 0x9}, 0x80, [0x7fffffff, 0x3, 0x1, 0x2, 0x1, 0x401, 0x5fa4, 0x4, 0x100000000, 0xffff, 0x401, 0x7, 0x4, 0x8, 0x5, 0x3]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000440)={"e893e9af695d98d6cb4ce28dcfd6e0ec", 0x0, 0x0, {0x8, 0x1}, {0x1, 0x7}, 0x8, [0x4, 0x10001, 0x6, 0x3, 0x3, 0x40e1f306, 0x4, 0x9, 0x2, 0x100000001, 0x9, 0x3128, 0x10001, 0x3, 0x8057, 0x4]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000540)={"be0300000000000000a9f963707dde99", r5, r6, {0x5758, 0x9}, {0x0, 0x9}, 0x1, [0x0, 0x82, 0x5ec6, 0x3fa8, 0x200, 0x81, 0x2, 0x2, 0x0, 0x5, 0x1, 0x98, 0x17ff, 0xffff, 0xc, 0x800000080000009]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:45:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x738, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) 21:45:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 23) 21:45:37 executing program 3: add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file1\x00', 0x4) 21:45:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 38) 21:45:37 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000c04e}) 21:45:37 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:45:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20006500000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3227.524520] loop4: detected capacity change from 0 to 4 [ 3227.527390] loop5: detected capacity change from 0 to 22 [ 3227.528477] FAULT_INJECTION: forcing a failure. [ 3227.528477] name failslab, interval 1, probability 0, space 0, times 0 [ 3227.529457] CPU: 0 PID: 35177 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3227.530163] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3227.530850] Call Trace: [ 3227.531082] [ 3227.531288] dump_stack_lvl+0xc1/0xf0 [ 3227.531646] should_fail_ex+0x4b4/0x5b0 [ 3227.531993] ? getname_flags.part.0+0x50/0x4f0 [ 3227.532352] should_failslab+0x9/0x20 [ 3227.532682] kmem_cache_alloc+0x5a/0x320 [ 3227.533057] getname_flags.part.0+0x50/0x4f0 [ 3227.533472] __x64_sys_mkdir+0xde/0x150 [ 3227.533841] do_syscall_64+0x3f/0x90 [ 3227.534247] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3227.534704] RIP: 0033:0x7fe02d21bc27 [ 3227.535032] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3227.536485] RSP: 002b:00007fe02a791fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3227.537114] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe02d21bc27 [ 3227.537702] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3227.538338] RBP: 00007fe02a792040 R08: 0000000000000000 R09: ffffffffffffffff [ 3227.538921] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3227.539510] R13: 0000000020000100 R14: 00007fe02a792000 R15: 0000000020012900 [ 3227.540120] [ 3227.549301] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3227.551670] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (11 blocks) [ 3227.572317] loop5: detected capacity change from 0 to 22 [ 3227.577088] loop2: detected capacity change from 0 to 4 [ 3227.582353] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3227.583064] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (11 blocks) [ 3227.590864] EXT4-fs (loop2): Unsupported encryption level 189 21:45:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20048000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:45:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) sendmsg$AUDIT_TTY_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x12c335701ce7c4e6}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x3f8, 0x200, 0x70bd25, 0x25dfdbfb, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20040000}, 0x24004895) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0xff, 0x3f, 0x5, 0x1, 0x0, 0xb5bc, 0x200e2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x7f, 0xffff}, 0x10320, 0x3, 0x3, 0x7, 0xff, 0x18, 0x3, 0x0, 0x3, 0x0, 0x10001}, 0x0, 0x7, r0, 0x8) 21:45:38 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000c64f}) 21:45:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 39) 21:45:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7c3, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) 21:45:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 24) 21:45:38 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:45:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2002a600000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3227.921250] loop2: detected capacity change from 0 to 4 [ 3227.926190] loop5: detected capacity change from 0 to 22 21:45:38 executing program 0: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf11, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xa}, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/locks\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4011) pwritev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) r2 = pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)=0x4010) bind(r3, &(0x7f0000000480)=@pppoe={0x18, 0x0, {0x2, @multicast, 'vlan1\x00'}}, 0x80) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000500), 0x222900, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r4, 0xc0189379, &(0x7f0000000540)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x4010) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x4010) dup2(r5, r6) [ 3227.995957] loop4: detected capacity change from 0 to 4 [ 3228.005076] FAULT_INJECTION: forcing a failure. [ 3228.005076] name failslab, interval 1, probability 0, space 0, times 0 [ 3228.008412] CPU: 0 PID: 35309 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3228.010704] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3228.012844] Call Trace: [ 3228.013566] [ 3228.014259] dump_stack_lvl+0xc1/0xf0 [ 3228.015319] should_fail_ex+0x4b4/0x5b0 [ 3228.016344] ? getname_flags.part.0+0x50/0x4f0 [ 3228.017571] should_failslab+0x9/0x20 [ 3228.018755] kmem_cache_alloc+0x5a/0x320 [ 3228.019864] getname_flags.part.0+0x50/0x4f0 [ 3228.021007] __x64_sys_mkdir+0xde/0x150 [ 3228.022092] do_syscall_64+0x3f/0x90 [ 3228.023176] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3228.024513] RIP: 0033:0x7fe02d21bc27 [ 3228.025444] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3228.030368] RSP: 002b:00007fe02a791fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3228.032377] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe02d21bc27 [ 3228.034291] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3228.036132] RBP: 00007fe02a792040 R08: 0000000000000000 R09: ffffffffffffffff [ 3228.038022] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3228.039909] R13: 0000000020000100 R14: 00007fe02a792000 R15: 0000000020012900 [ 3228.041801] [ 3228.045958] EXT4-fs (loop2): Unsupported encryption level 189 [ 3228.048607] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3228.050487] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (11 blocks) [ 3228.084273] loop5: detected capacity change from 0 to 22 [ 3228.097352] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3228.098844] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (11 blocks) 21:45:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 25) 21:45:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3228.131822] loop2: detected capacity change from 0 to 4 [ 3228.134441] EXT4-fs (loop2): Unsupported encryption level 189 21:45:38 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000c74f}) 21:45:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 40) 21:45:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffe00000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3242.873727] loop5: detected capacity change from 0 to 22 21:45:53 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000ca4f}) 21:45:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7c4, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) 21:45:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x0, 0x2, 0x1, 0x4, 0x0, 0x7fff, 0x8080, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xe5, 0x4, @perf_config_ext={0x3591, 0xeffe}, 0x44081, 0x4, 0x1, 0x4, 0x81, 0x80, 0x9, 0x0, 0x3, 0x0, 0x40}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xb) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:45:53 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000440)={0x0, 0x0, {0x0, @struct}}) [ 3242.888472] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3242.888986] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (11 blocks) 21:45:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 26) 21:45:53 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x40, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) [ 3242.903247] FAULT_INJECTION: forcing a failure. [ 3242.903247] name failslab, interval 1, probability 0, space 0, times 0 [ 3242.904095] CPU: 0 PID: 35437 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3242.904739] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3242.905464] Call Trace: [ 3242.905643] [ 3242.905811] dump_stack_lvl+0xc1/0xf0 [ 3242.906098] should_fail_ex+0x4b4/0x5b0 [ 3242.906408] ? __kernfs_new_node+0xd4/0x870 [ 3242.906714] should_failslab+0x9/0x20 [ 3242.906982] kmem_cache_alloc+0x5a/0x320 [ 3242.907277] __kernfs_new_node+0xd4/0x870 [ 3242.907567] ? lock_acquire.part.0+0xec/0x320 [ 3242.907856] loop4: detected capacity change from 0 to 4 [ 3242.907909] FAULT_INJECTION: forcing a failure. [ 3242.907909] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3242.908230] ? __pfx___kernfs_new_node+0x10/0x10 [ 3242.909874] ? find_held_lock+0x2c/0x110 [ 3242.910161] ? kernfs_add_one+0x175/0x4f0 [ 3242.910463] ? lock_release+0x1e3/0x710 [ 3242.910747] ? __pfx_lock_release+0x10/0x10 [ 3242.911043] ? kernfs_add_one+0x376/0x4f0 [ 3242.911320] ? lock_acquire+0x32/0xc0 [ 3242.911590] ? kernfs_add_one+0x376/0x4f0 [ 3242.911879] kernfs_new_node+0x97/0x120 [ 3242.912153] __kernfs_create_file+0x55/0x350 [ 3242.912468] sysfs_add_file_mode_ns+0x21c/0x440 [ 3242.912799] ? __pfx_dev_attr_store+0x10/0x10 [ 3242.913116] internal_create_group+0x322/0xb90 [ 3242.913438] ? __pfx_internal_create_group+0x10/0x10 [ 3242.913793] loop_configure+0xf37/0x1a00 [ 3242.914087] lo_ioctl+0x93a/0x19a0 [ 3242.914346] ? putname+0x102/0x140 [ 3242.914601] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3242.914973] ? __pfx_lo_ioctl+0x10/0x10 [ 3242.915250] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 3242.915619] ? __pfx___lock_acquire+0x10/0x10 [ 3242.915933] ? __lock_acquire+0xbd4/0x63b0 [ 3242.916270] ? __pfx_lock_release+0x10/0x10 [ 3242.916577] ? trace_lock_acquire+0x170/0x1e0 [ 3242.916896] ? __pfx___fget_files+0x10/0x10 [ 3242.917194] ? lock_acquire+0x32/0xc0 [ 3242.917468] ? __pfx_lo_ioctl+0x10/0x10 [ 3242.917742] blkdev_ioctl+0x361/0x7f0 [ 3242.918005] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3242.918314] ? selinux_file_ioctl+0xba/0x270 [ 3242.918637] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3242.918942] __x64_sys_ioctl+0x19e/0x210 [ 3242.919236] do_syscall_64+0x3f/0x90 [ 3242.919517] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3242.919885] RIP: 0033:0x7f226f89d8d7 [ 3242.920152] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3242.921387] RSP: 002b:00007f226ce12f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3242.921918] RAX: ffffffffffffffda RBX: 00007f226f8e7970 RCX: 00007f226f89d8d7 [ 3242.922421] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 3242.922907] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 3242.923395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 3242.923886] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3242.924392] [ 3242.924563] CPU: 1 PID: 35435 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3242.925616] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3242.926648] Call Trace: [ 3242.926983] [ 3242.927288] dump_stack_lvl+0xc1/0xf0 [ 3242.927487] loop2: detected capacity change from 0 to 4 [ 3242.927802] should_fail_ex+0x4b4/0x5b0 [ 3242.928693] strncpy_from_user+0x38/0x3e0 [ 3242.929252] getname_flags.part.0+0x95/0x4f0 [ 3242.929847] __x64_sys_mkdir+0xde/0x150 [ 3242.930402] do_syscall_64+0x3f/0x90 [ 3242.930909] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3242.931595] RIP: 0033:0x7fe02d21bc27 [ 3242.932080] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3242.934318] RSP: 002b:00007fe02a791fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3242.935275] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe02d21bc27 [ 3242.936183] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3242.937062] RBP: 00007fe02a792040 R08: 0000000000000000 R09: ffffffffffffffff [ 3242.937959] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3242.938860] R13: 0000000020000100 R14: 00007fe02a792000 R15: 0000000020012900 [ 3242.939794] [ 3242.941483] loop5: detected capacity change from 0 to 22 [ 3242.948006] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3242.948672] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (11 blocks) [ 3242.959156] EXT4-fs (loop2): Unsupported encryption level 189 21:45:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 27) 21:45:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 41) 21:45:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7c5, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) 21:45:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20feff00000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:45:53 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendfile(r3, r0, &(0x7f0000000140)=0x7c00, 0x3) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r1, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:45:53 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000cf4e}) [ 3243.131571] loop2: detected capacity change from 0 to 4 [ 3243.155302] EXT4-fs (loop2): Unsupported encryption level 189 [ 3243.159268] loop4: detected capacity change from 0 to 4 21:45:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x12022}, 0x0, 0x3, 0xffffffffffffffff, 0x0) [ 3243.161254] FAULT_INJECTION: forcing a failure. [ 3243.161254] name failslab, interval 1, probability 0, space 0, times 0 [ 3243.163249] CPU: 1 PID: 35464 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3243.164271] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3243.165281] Call Trace: [ 3243.165609] [ 3243.165910] dump_stack_lvl+0xc1/0xf0 [ 3243.166439] should_fail_ex+0x4b4/0x5b0 [ 3243.166975] should_failslab+0x9/0x20 [ 3243.167475] kmem_cache_alloc_lru+0x6b/0x590 [ 3243.168039] ? __d_alloc+0x31/0x9c0 [ 3243.168518] ? lock_is_held_type+0x9f/0x120 [ 3243.169081] __d_alloc+0x31/0x9c0 [ 3243.169554] d_alloc+0x4a/0x1d0 [ 3243.170001] __lookup_hash+0xcc/0x190 [ 3243.170511] ? mnt_want_write+0x153/0x410 [ 3243.171038] filename_create+0x1d6/0x4a0 [ 3243.171569] ? __pfx_filename_create+0x10/0x10 [ 3243.172144] ? __pfx_lock_release+0x10/0x10 [ 3243.172714] ? trace_lock_acquire+0x170/0x1e0 [ 3243.173291] ? __virt_addr_valid+0x102/0x340 [ 3243.173861] do_mkdirat+0x98/0x2d0 [ 3243.174351] ? __pfx_do_mkdirat+0x10/0x10 [ 3243.174888] ? getname_flags.part.0+0x1dd/0x4f0 [ 3243.175493] __x64_sys_mkdir+0xf6/0x150 [ 3243.176016] do_syscall_64+0x3f/0x90 [ 3243.176512] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3243.177181] RIP: 0033:0x7fe02d21bc27 [ 3243.177648] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3243.179468] loop5: detected capacity change from 0 to 22 [ 3243.179799] RSP: 002b:00007fe02a791fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3243.181407] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe02d21bc27 [ 3243.182263] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3243.183131] RBP: 00007fe02a792040 R08: 0000000000000000 R09: ffffffffffffffff [ 3243.183985] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3243.184843] R13: 0000000020000100 R14: 00007fe02a792000 R15: 0000000020012900 [ 3243.185723] [ 3243.208516] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3243.209724] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (11 blocks) 21:45:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 28) 21:45:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000004000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:45:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 42) 21:45:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7c6, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) 21:45:53 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000d00d}) [ 3243.429138] FAULT_INJECTION: forcing a failure. [ 3243.429138] name failslab, interval 1, probability 0, space 0, times 0 [ 3243.430573] CPU: 1 PID: 35570 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3243.431577] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3243.432718] Call Trace: 21:45:53 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x7f, 0x6f, 0x7, 0x0, 0xfffffffffffffff7, 0x2400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x10000000000000, 0x3ff}, 0x0, 0x0, 0x20, 0x2, 0x9, 0xffff0001, 0x0, 0x0, 0x0, 0x0, 0x70cf1a97}, 0x0, 0x1, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@private1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) r3 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fstat(r3, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$nfs4(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="17225f736d73e5cc64", 0x9, 0x80000001}], 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="2c2fb127295c2ca95e952170653d115b252d2c657569643d", @ANYRESDEC=0x0, @ANYBLOB=',obj_user=@&[,euid<', @ANYRESDEC=r4, @ANYBLOB=',subj_role=,dont_appraise,\x00']) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f00000004c0), 0x20000c, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@access_any}, {@aname={'aname', 0x3d, '.'}}, {@cache_none}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@afid={'afid', 0x3d, 0x8}}, {@cache_fscache}, {@msize={'msize', 0x3d, 0x4}}, {@fscache}, {@afid={'afid', 0x3d, 0x2}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '&'}}, {@euid_eq={'euid', 0x3d, r4}}, {@appraise_type}]}}) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 3243.433068] [ 3243.433443] dump_stack_lvl+0xc1/0xf0 [ 3243.433929] should_fail_ex+0x4b4/0x5b0 [ 3243.434435] ? __kernfs_new_node+0xd4/0x870 [ 3243.434955] should_failslab+0x9/0x20 [ 3243.435412] kmem_cache_alloc+0x5a/0x320 [ 3243.435893] ? kernfs_add_one+0x376/0x4f0 [ 3243.436388] __kernfs_new_node+0xd4/0x870 [ 3243.436887] ? kernfs_add_one+0x175/0x4f0 [ 3243.437372] ? lock_release+0x1e3/0x710 [ 3243.437862] ? __pfx___kernfs_new_node+0x10/0x10 [ 3243.438474] ? __pfx_lock_release+0x10/0x10 [ 3243.438997] ? kernfs_add_one+0x376/0x4f0 [ 3243.439483] ? kernfs_add_one+0x376/0x4f0 [ 3243.439976] ? down_write+0x11a/0x1f0 [ 3243.440478] ? up_write+0x196/0x510 [ 3243.440925] kernfs_new_node+0x97/0x120 [ 3243.441402] __kernfs_create_file+0x55/0x350 [ 3243.441935] sysfs_add_file_mode_ns+0x21c/0x440 [ 3243.442505] ? __pfx_dev_attr_store+0x10/0x10 [ 3243.443056] internal_create_group+0x322/0xb90 [ 3243.443614] ? __pfx_internal_create_group+0x10/0x10 [ 3243.444242] loop_configure+0xf37/0x1a00 [ 3243.444762] lo_ioctl+0x93a/0x19a0 [ 3243.445188] ? putname+0x102/0x140 [ 3243.445628] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3243.446258] ? __pfx_lo_ioctl+0x10/0x10 [ 3243.446781] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 3243.447409] ? __pfx___lock_acquire+0x10/0x10 [ 3243.447963] ? __lock_acquire+0xbd4/0x63b0 [ 3243.448548] ? __pfx_lock_release+0x10/0x10 [ 3243.449066] ? trace_lock_acquire+0x170/0x1e0 [ 3243.449611] ? __pfx___fget_files+0x10/0x10 [ 3243.450118] ? lock_acquire+0x32/0xc0 [ 3243.450623] ? __pfx_lo_ioctl+0x10/0x10 [ 3243.451097] blkdev_ioctl+0x361/0x7f0 [ 3243.451556] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3243.452060] ? selinux_file_ioctl+0xba/0x270 [ 3243.452590] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3243.453220] __x64_sys_ioctl+0x19e/0x210 [ 3243.453875] do_syscall_64+0x3f/0x90 [ 3243.454496] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3243.455326] RIP: 0033:0x7f226f89d8d7 [ 3243.455909] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3243.458427] RSP: 002b:00007f226ce12f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3243.459332] RAX: ffffffffffffffda RBX: 00007f226f8e7970 RCX: 00007f226f89d8d7 [ 3243.460260] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 3243.461073] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 3243.461967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 3243.462788] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3243.463616] 21:45:53 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0xfff}}, './file1\x00'}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3, 0x2, 0x5, 0x1, 0x0, 0x3, 0x20040, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp, 0x1c828, 0x0, 0x3a, 0x3, 0x7, 0x7, 0x3, 0x0, 0x18, 0x0, 0xe4}, 0x0, 0x0, r1, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2810}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3243.529358] loop4: detected capacity change from 0 to 4 [ 3243.550910] loop2: detected capacity change from 0 to 4 21:45:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000008000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3243.556349] loop5: detected capacity change from 0 to 22 [ 3243.571242] EXT4-fs (loop4): Unsupported encryption level 189 [ 3243.572881] EXT4-fs (loop2): Unsupported encryption level 189 [ 3243.588871] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3243.589773] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (11 blocks) [ 3243.661051] loop5: detected capacity change from 0 to 22 [ 3243.671390] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3243.672364] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (11 blocks) 21:46:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000140)="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") 21:46:06 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000440)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r1, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 3256.431398] loop2: detected capacity change from 0 to 4 21:46:06 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000d07f}) 21:46:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 43) 21:46:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 29) 21:46:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000020000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:46:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7c7, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) 21:46:06 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) [ 3256.441461] EXT4-fs (loop2): Unsupported encryption level 189 [ 3256.446254] loop4: detected capacity change from 0 to 4 [ 3256.446820] FAULT_INJECTION: forcing a failure. [ 3256.446820] name failslab, interval 1, probability 0, space 0, times 0 [ 3256.447556] CPU: 1 PID: 35603 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3256.448124] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3256.448692] Call Trace: [ 3256.448883] [ 3256.449048] dump_stack_lvl+0xc1/0xf0 [ 3256.449343] should_fail_ex+0x4b4/0x5b0 [ 3256.449639] should_failslab+0x9/0x20 [ 3256.449921] kmem_cache_alloc_lru+0x6b/0x590 [ 3256.450244] ? ext4_alloc_inode+0x28/0x680 [ 3256.450557] ? __pfx_lock_release+0x10/0x10 [ 3256.450885] ? trace_lock_acquire+0x170/0x1e0 [ 3256.451226] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 3256.451558] ext4_alloc_inode+0x28/0x680 [ 3256.451850] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 3256.452180] alloc_inode+0x63/0x240 [ 3256.452443] new_inode+0x25/0x1f0 [ 3256.452708] __ext4_new_inode+0x323/0x55f0 [ 3256.453018] ? __pfx_avc_has_perm_noaudit+0x10/0x10 [ 3256.453378] ? avc_has_perm_noaudit+0xa6/0x3e0 [ 3256.453712] ? lock_acquire+0x32/0xc0 [ 3256.454018] ? __pfx___ext4_new_inode+0x10/0x10 [ 3256.454372] ? selinux_determine_inode_label+0x1b6/0x350 [ 3256.454769] ext4_mkdir+0x33e/0xb20 [ 3256.455053] ? __pfx_ext4_mkdir+0x10/0x10 [ 3256.455363] ? inode_permission.part.0+0xb5/0x520 [ 3256.455721] vfs_mkdir+0x24b/0x470 [ 3256.455986] do_mkdirat+0x163/0x2d0 [ 3256.456263] ? __pfx_do_mkdirat+0x10/0x10 [ 3256.456572] ? getname_flags.part.0+0x1dd/0x4f0 [ 3256.456926] __x64_sys_mkdir+0xf6/0x150 [ 3256.457206] do_syscall_64+0x3f/0x90 [ 3256.457490] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3256.457846] RIP: 0033:0x7fe02d21bc27 [ 3256.458116] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3256.459282] RSP: 002b:00007fe02a791fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3256.459772] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe02d21bc27 [ 3256.460249] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3256.460715] RBP: 00007fe02a792040 R08: 0000000000000000 R09: ffffffffffffffff [ 3256.461179] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3256.461645] R13: 0000000020000100 R14: 00007fe02a792000 R15: 0000000020012900 [ 3256.462134] [ 3256.485744] loop5: detected capacity change from 0 to 22 [ 3256.489734] EXT4-fs (loop5): failed to parse options in superblock: ÷ 21:46:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 30) [ 3256.490291] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (11 blocks) [ 3256.507629] loop5: detected capacity change from 0 to 22 [ 3256.521357] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3256.521940] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (11 blocks) [ 3256.578929] FAULT_INJECTION: forcing a failure. [ 3256.578929] name failslab, interval 1, probability 0, space 0, times 0 [ 3256.579697] CPU: 1 PID: 35614 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3256.580246] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3256.580796] Call Trace: [ 3256.580976] [ 3256.581138] dump_stack_lvl+0xc1/0xf0 [ 3256.581414] should_fail_ex+0x4b4/0x5b0 [ 3256.581696] ? __kernfs_new_node+0xd4/0x870 [ 3256.582002] should_failslab+0x9/0x20 [ 3256.582339] kmem_cache_alloc+0x5a/0x320 [ 3256.582715] __kernfs_new_node+0xd4/0x870 [ 3256.583026] ? lock_acquire.part.0+0xec/0x320 [ 3256.583339] ? __pfx___kernfs_new_node+0x10/0x10 [ 3256.583690] ? find_held_lock+0x2c/0x110 [ 3256.583986] ? kernfs_add_one+0x175/0x4f0 [ 3256.584284] ? lock_release+0x1e3/0x710 [ 3256.584590] ? __pfx_lock_release+0x10/0x10 [ 3256.584912] ? kernfs_add_one+0x376/0x4f0 [ 3256.585214] ? lock_acquire+0x32/0xc0 [ 3256.585504] ? kernfs_add_one+0x376/0x4f0 [ 3256.585808] kernfs_new_node+0x97/0x120 [ 3256.586096] __kernfs_create_file+0x55/0x350 [ 3256.586421] sysfs_add_file_mode_ns+0x21c/0x440 [ 3256.586782] ? __pfx_dev_attr_store+0x10/0x10 [ 3256.587123] internal_create_group+0x322/0xb90 [ 3256.587460] ? __pfx_internal_create_group+0x10/0x10 [ 3256.587845] loop_configure+0xf37/0x1a00 [ 3256.588164] lo_ioctl+0x93a/0x19a0 [ 3256.588425] ? putname+0x102/0x140 [ 3256.588695] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3256.589082] ? __pfx_lo_ioctl+0x10/0x10 [ 3256.589352] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 3256.589733] ? __pfx___lock_acquire+0x10/0x10 [ 3256.590162] ? __lock_acquire+0xbd4/0x63b0 [ 3256.590552] ? __pfx_lock_release+0x10/0x10 [ 3256.590866] ? trace_lock_acquire+0x170/0x1e0 [ 3256.591201] ? __pfx___fget_files+0x10/0x10 [ 3256.591511] ? lock_acquire+0x32/0xc0 [ 3256.591874] ? __pfx_lo_ioctl+0x10/0x10 [ 3256.592203] blkdev_ioctl+0x361/0x7f0 [ 3256.592667] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3256.593065] ? selinux_file_ioctl+0xba/0x270 [ 3256.593396] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3256.593714] __x64_sys_ioctl+0x19e/0x210 [ 3256.594017] do_syscall_64+0x3f/0x90 [ 3256.594302] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3256.594691] RIP: 0033:0x7f226f89d8d7 [ 3256.594959] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3256.596200] RSP: 002b:00007f226ce12f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3256.596737] RAX: ffffffffffffffda RBX: 00007f226f8e7970 RCX: 00007f226f89d8d7 [ 3256.597228] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 3256.597730] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 3256.598228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 3256.598735] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3256.599244] [ 3256.615246] loop2: detected capacity change from 0 to 4 [ 3256.631168] EXT4-fs (loop2): Unsupported encryption level 189 [ 3271.620119] loop4: detected capacity change from 0 to 4 [ 3271.620550] FAULT_INJECTION: forcing a failure. [ 3271.620550] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3271.621354] CPU: 1 PID: 35626 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3271.621924] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3271.622474] Call Trace: [ 3271.622683] [ 3271.622843] dump_stack_lvl+0xc1/0xf0 [ 3271.623116] should_fail_ex+0x4b4/0x5b0 [ 3271.623386] strncpy_from_user+0x38/0x3e0 [ 3271.623685] getname_flags.part.0+0x95/0x4f0 [ 3271.623986] __x64_sys_mkdir+0xde/0x150 [ 3271.624267] do_syscall_64+0x3f/0x90 [ 3271.624525] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3271.624888] RIP: 0033:0x7fe02d21bc27 [ 3271.625130] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3271.626309] RSP: 002b:00007fe02a791fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3271.626806] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe02d21bc27 [ 3271.627280] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3271.627751] RBP: 00007fe02a792040 R08: 0000000000000000 R09: ffffffffffffffff [ 3271.628217] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3271.628690] R13: 0000000020000100 R14: 00007fe02a792000 R15: 0000000020012900 [ 3271.629184] [ 3271.635662] loop5: detected capacity change from 0 to 22 [ 3271.668634] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3271.669216] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (11 blocks) 21:46:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:46:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 31) 21:46:22 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000de0d}) 21:46:22 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) 21:46:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7c8, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) 21:46:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffff0000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) 21:46:22 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) r3 = pidfd_open(0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000440)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)=0x4010) tee(r3, r4, 0x8, 0x4) 21:46:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 44) [ 3271.677450] loop5: detected capacity change from 0 to 22 [ 3271.685512] loop2: detected capacity change from 0 to 4 [ 3271.692105] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3271.693973] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (11 blocks) [ 3271.695612] EXT4-fs (loop2): Unsupported encryption level 189 21:46:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 32) 21:46:22 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20010, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:46:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) recvmmsg$unix(r0, &(0x7f0000000d80)=[{{&(0x7f0000000140), 0x6e, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/144, 0x90}], 0x1, &(0x7f0000000300)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}}, {{&(0x7f0000000380), 0x6e, &(0x7f0000000600)=[{&(0x7f0000000400)=""/98, 0x62}, {&(0x7f0000000480)=""/80, 0x50}, {&(0x7f0000000500)=""/197, 0xc5}], 0x3}}, {{&(0x7f0000000640)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f00000006c0)=""/169, 0xa9}, {&(0x7f0000000780)=""/130, 0x82}, {&(0x7f0000000840)=""/82, 0x52}, {&(0x7f00000008c0)=""/219, 0xdb}, {&(0x7f00000009c0)=""/190, 0xbe}], 0x5, &(0x7f0000000b00)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000000b40)=@abs, 0x6e, &(0x7f0000000c80)=[{&(0x7f0000000bc0)=""/69, 0x45}, {&(0x7f0000000c40)=""/24, 0x18}], 0x2, &(0x7f0000000cc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}}], 0x4, 0x2, &(0x7f0000000e80)={0x77359400}) openat(r1, &(0x7f0000000ec0)='./file1\x00', 0x300, 0x180) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) recvmsg(r2, &(0x7f0000004540)={&(0x7f0000000f00)=@l2tp6={0xa, 0x0, 0x0, @private0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000000f80)=""/176, 0xb0}, {&(0x7f0000001040)=""/4096, 0x1000}, {&(0x7f0000002040)=""/126, 0x7e}, {&(0x7f00000020c0)=""/189, 0xbd}, {&(0x7f0000002180)=""/45, 0x2d}, {&(0x7f00000021c0)=""/4096, 0x1000}, {&(0x7f00000031c0)=""/147, 0x93}, {&(0x7f0000003280)=""/87, 0x57}, {&(0x7f0000003300)=""/95, 0x5f}, {&(0x7f0000003380)=""/4096, 0x1000}], 0xa, &(0x7f0000004440)=""/205, 0xcd}, 0x2001) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:46:22 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000e000}) [ 3271.832214] FAULT_INJECTION: forcing a failure. [ 3271.832214] name failslab, interval 1, probability 0, space 0, times 0 [ 3271.834158] CPU: 0 PID: 35651 Comm: syz-executor.2 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3271.834824] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3271.835529] Call Trace: [ 3271.835747] [ 3271.835960] dump_stack_lvl+0xc1/0xf0 [ 3271.836327] should_fail_ex+0x4b4/0x5b0 [ 3271.836708] ? __kernfs_new_node+0xd4/0x870 [ 3271.837125] should_failslab+0x9/0x20 [ 3271.837451] kmem_cache_alloc+0x5a/0x320 [ 3271.837823] ? kernfs_add_one+0x376/0x4f0 [ 3271.838217] __kernfs_new_node+0xd4/0x870 [ 3271.838605] ? kernfs_add_one+0x175/0x4f0 [ 3271.839055] ? lock_release+0x1e3/0x710 [ 3271.839422] ? __pfx___kernfs_new_node+0x10/0x10 [ 3271.840342] ? __pfx_lock_release+0x10/0x10 [ 3271.840733] ? kernfs_add_one+0x376/0x4f0 [ 3271.841112] ? kernfs_add_one+0x376/0x4f0 [ 3271.841493] ? down_write+0x11a/0x1f0 [ 3271.841852] ? up_write+0x196/0x510 [ 3271.842200] kernfs_new_node+0x97/0x120 [ 3271.842569] __kernfs_create_file+0x55/0x350 [ 3271.842976] sysfs_add_file_mode_ns+0x21c/0x440 [ 3271.843389] ? __pfx_dev_attr_store+0x10/0x10 [ 3271.843803] internal_create_group+0x322/0xb90 [ 3271.844220] ? __pfx_internal_create_group+0x10/0x10 [ 3271.844663] loop_configure+0xf37/0x1a00 [ 3271.845042] lo_ioctl+0x93a/0x19a0 [ 3271.845345] ? finish_task_switch.isra.0+0xf9/0x830 [ 3271.845773] ? __pfx_lo_ioctl+0x10/0x10 [ 3271.846116] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 3271.846558] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 3271.847024] ? finish_task_switch.isra.0+0x203/0x830 [ 3271.847483] ? __switch_to+0x5c6/0xf50 [ 3271.848388] ? __schedule+0xbb5/0x2a90 [ 3271.848755] ? __pfx___schedule+0x10/0x10 [ 3271.849184] ? __pfx_lock_release+0x10/0x10 [ 3271.849581] ? __fget_files+0xc3/0x480 [ 3271.849908] ? __pfx_lo_ioctl+0x10/0x10 [ 3271.850252] blkdev_ioctl+0x361/0x7f0 [ 3271.850594] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3271.850979] ? selinux_file_ioctl+0xba/0x270 [ 3271.851380] ? __pfx_blkdev_ioctl+0x10/0x10 [ 3271.851760] __x64_sys_ioctl+0x19e/0x210 [ 3271.852141] do_syscall_64+0x3f/0x90 [ 3271.852501] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3271.852989] RIP: 0033:0x7f226f89d8d7 [ 3271.853326] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3271.854794] RSP: 002b:00007f226ce12f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3271.855448] RAX: ffffffffffffffda RBX: 00007f226f8e7970 RCX: 00007f226f89d8d7 [ 3271.856050] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 3271.856621] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 3271.857214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 3271.857803] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 3271.858446] [ 3271.899474] loop2: detected capacity change from 0 to 4 [ 3272.689566] EXT4-fs (loop2): Unsupported encryption level 189 21:46:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 45) 21:46:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7c9, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) 21:46:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000000)=0x1) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:46:39 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000e00c}) 21:46:39 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/191, 0xbf}, {&(0x7f0000000d80)=""/177, 0xb1}], 0x2, &(0x7f0000000540)}, 0x40) acct(&(0x7f0000000280)='./file0\x00') r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffd, 0x0, 0x101}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_io_uring_setup(0x4ee2, &(0x7f0000000b40)={0x0, 0x1324, 0x4, 0x3, 0x241, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) accept$unix(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7f, 0x1, 0x50, 0x63, 0x0, 0x7, 0x21, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x101}, 0x801, 0x1000, 0x8, 0x0, 0xfff, 0x1, 0x7, 0x0, 0x200, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15080, 0x912f, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = fork() process_vm_readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/105, 0x69}, {0x0}], 0x2, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/9, 0x9}, {&(0x7f0000000c40)=""/98, 0x62}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x3, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x40010, r3, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x6, 0x1c, 0x8, 0x0, 0x3f, 0x1020, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x27, 0xb7}, 0x40400, 0x10001, 0x2, 0x3, 0x6, 0x5, 0x4, 0x0, 0xa7, 0x0, 0x942}, r7, 0xb, r4, 0xa) fallocate(r6, 0x0, 0x0, 0x87ffffc) io_uring_enter(r6, 0x7242, 0xf3ad, 0x3, &(0x7f0000000980)={[0xfff]}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) process_vm_readv(r8, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/34, 0x22}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000001040)=[{&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/225, 0xe1}, {&(0x7f0000000840)=""/104, 0x68}, {&(0x7f00000008c0)=""/88, 0x58}, {&(0x7f0000000e40)=""/204, 0xcc}, {&(0x7f0000000a80)=""/132, 0x84}, {&(0x7f0000000f40)=""/202, 0xca}], 0x7, 0x0) [ 3289.156670] loop5: detected capacity change from 0 to 22 21:46:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3289.160845] loop4: detected capacity change from 0 to 4 [ 3289.161446] FAULT_INJECTION: forcing a failure. [ 3289.161446] name failslab, interval 1, probability 0, space 0, times 0 [ 3289.162413] CPU: 0 PID: 35766 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3289.163092] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3289.163768] Call Trace: [ 3289.163995] [ 3289.164198] dump_stack_lvl+0xc1/0xf0 [ 3289.164547] should_fail_ex+0x4b4/0x5b0 [ 3289.164906] ? security_inode_alloc+0x38/0x160 [ 3289.165304] should_failslab+0x9/0x20 [ 3289.165641] kmem_cache_alloc+0x5a/0x320 [ 3289.166003] security_inode_alloc+0x38/0x160 [ 3289.166393] inode_init_always+0xbb2/0xea0 [ 3289.166774] alloc_inode+0x84/0x240 [ 3289.167165] new_inode+0x25/0x1f0 [ 3289.167487] __ext4_new_inode+0x323/0x55f0 [ 3289.167864] ? __pfx_avc_has_perm_noaudit+0x10/0x10 [ 3289.168333] ? avc_has_perm_noaudit+0xa6/0x3e0 [ 3289.168724] ? lock_acquire+0x32/0xc0 [ 3289.169104] ? __pfx___ext4_new_inode+0x10/0x10 [ 3289.169528] ? selinux_determine_inode_label+0x1b6/0x350 [ 3289.169999] ext4_mkdir+0x33e/0xb20 [ 3289.170339] ? __pfx_ext4_mkdir+0x10/0x10 [ 3289.170705] ? inode_permission.part.0+0xb5/0x520 [ 3289.171164] vfs_mkdir+0x24b/0x470 [ 3289.171486] do_mkdirat+0x163/0x2d0 [ 3289.171849] ? __pfx_do_mkdirat+0x10/0x10 [ 3289.172205] ? getname_flags.part.0+0x1dd/0x4f0 [ 3289.172640] __x64_sys_mkdir+0xf6/0x150 [ 3289.173036] do_syscall_64+0x3f/0x90 [ 3289.173379] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3289.173833] RIP: 0033:0x7fe02d21bc27 [ 3289.174163] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3289.175650] RSP: 002b:00007fe02a791fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3289.176280] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe02d21bc27 [ 3289.176904] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3289.177482] RBP: 00007fe02a792040 R08: 0000000000000000 R09: ffffffffffffffff [ 3289.178072] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3289.178656] R13: 0000000020000100 R14: 00007fe02a792000 R15: 0000000020012900 [ 3289.179274] [ 3289.195659] loop2: detected capacity change from 0 to 4 21:46:39 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xa824}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r3, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000140)) fork() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000440)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000300)='oom_score\x00') pidfd_open(r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f0000000500)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="00000000000000002e2f66693d311dc8ca9d5f438213461e652b67d13ac3ebd86bcfd07978486ddb67a01cd8a9dc646af0097a8966e18b986641da364b17a061c16c281c7aac0f6696d7fdf601a89a129b5413e73860f2b7e2306c3c7a18bb"]) close_range(r0, r6, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r1, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:46:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000010100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd1fc909d9c1bf852966d695aff0b278e529bd440fa94da511c276155ce6a9be0e4e7dbe396412f6bd75edd787d280b52bea3f1eab642837f12ae592f0d5151174016423fc28542de2d815b2cfbe49edcee131bac81a043542b479bcd669a13b41b160ba11f6e4eddb175f7c79faf8672b7762d779f44a4affc2e19104a8108460f2965928408d98759af7", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3289.196362] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3289.197972] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (11 blocks) [ 3289.286243] [ 3289.286441] ====================================================== [ 3289.287812] WARNING: possible circular locking dependency detected [ 3289.288323] 6.2.0-rc8-next-20230217 #1 Not tainted [ 3289.288737] ------------------------------------------------------ [ 3289.289251] syz-executor.3/35764 is trying to acquire lock: [ 3289.289721] ffff88800b578400 (&sb->s_type->i_mutex_key#6){++++}-{3:3}, at: ext4_bmap+0x52/0x470 [ 3289.290502] [ 3289.290502] but task is already holding lock: [ 3289.291004] ffff88801000c3f8 (&journal->j_checkpoint_mutex){+.+.}-{3:3}, at: jbd2_journal_flush+0x483/0xc90 [ 3289.291835] [ 3289.291835] which lock already depends on the new lock. [ 3289.291835] [ 3289.292489] [ 3289.292489] the existing dependency chain (in reverse order) is: [ 3289.293094] [ 3289.293094] -> #3 (&journal->j_checkpoint_mutex){+.+.}-{3:3}: [ 3289.293711] mutex_lock_io_nested+0x149/0x1300 [ 3289.294145] jbd2_journal_flush+0x19e/0xc90 [ 3289.294557] ext4_change_inode_journal_flag+0x39d/0x550 [ 3289.295090] ext4_fileattr_set+0x14fa/0x19f0 [ 3289.295513] vfs_fileattr_set+0x7a2/0xbd0 [ 3289.295906] do_vfs_ioctl+0xfc1/0x1690 [ 3289.296285] __x64_sys_ioctl+0x110/0x210 [ 3289.296679] do_syscall_64+0x3f/0x90 [ 3289.297063] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3289.297548] [ 3289.297548] -> #2 (&journal->j_barrier){+.+.}-{3:3}: [ 3289.298345] __mutex_lock+0x133/0x14a0 [ 3289.298712] jbd2_journal_lock_updates+0x162/0x310 [ 3289.299175] ext4_change_inode_journal_flag+0x187/0x550 [ 3289.299674] ext4_fileattr_set+0x14fa/0x19f0 [ 3289.300099] vfs_fileattr_set+0x7a2/0xbd0 [ 3289.300500] do_vfs_ioctl+0xfc1/0x1690 [ 3289.300891] __x64_sys_ioctl+0x110/0x210 [ 3289.301409] do_syscall_64+0x3f/0x90 [ 3289.301788] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3289.302283] [ 3289.302283] -> #1 (&sbi->s_writepages_rwsem){++++}-{0:0}: [ 3289.302879] percpu_down_write+0x51/0x350 [ 3289.305501] ext4_ind_migrate+0x23b/0x840 [ 3289.305892] ext4_fileattr_set+0x1521/0x19f0 [ 3289.306294] vfs_fileattr_set+0x7a2/0xbd0 [ 3289.306676] do_vfs_ioctl+0xfc1/0x1690 [ 3289.307081] __x64_sys_ioctl+0x110/0x210 [ 3289.307456] do_syscall_64+0x3f/0x90 [ 3289.307811] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3289.308267] [ 3289.308267] -> #0 (&sb->s_type->i_mutex_key#6){++++}-{3:3}: [ 3289.308820] __lock_acquire+0x2da7/0x63b0 [ 3289.309196] lock_acquire.part.0+0xec/0x320 [ 3289.309600] down_read+0x3d/0x50 [ 3289.309933] ext4_bmap+0x52/0x470 [ 3289.310269] bmap+0xb0/0x130 [ 3289.310567] jbd2_journal_bmap+0xac/0x1d0 [ 3289.310962] jbd2_journal_flush+0x87f/0xc90 [ 3289.311360] __ext4_ioctl+0x9fd/0x4330 [ 3289.311724] __x64_sys_ioctl+0x19e/0x210 [ 3289.312101] do_syscall_64+0x3f/0x90 [ 3289.312460] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3289.312918] [ 3289.312918] other info that might help us debug this: [ 3289.312918] [ 3289.313519] Chain exists of: [ 3289.313519] &sb->s_type->i_mutex_key#6 --> &journal->j_barrier --> &journal->j_checkpoint_mutex [ 3289.313519] [ 3289.314542] Possible unsafe locking scenario: [ 3289.314542] [ 3289.315060] CPU0 CPU1 [ 3289.315418] ---- ---- [ 3289.315771] lock(&journal->j_checkpoint_mutex); [ 3289.316143] lock(&journal->j_barrier); [ 3289.316643] lock(&journal->j_checkpoint_mutex); [ 3289.317198] rlock(&sb->s_type->i_mutex_key#6); [ 3289.317587] [ 3289.317587] *** DEADLOCK *** [ 3289.317587] [ 3289.318042] 2 locks held by syz-executor.3/35764: [ 3289.318417] #0: ffff88801000c170 (&journal->j_barrier){+.+.}-{3:3}, at: jbd2_journal_lock_updates+0x162/0x310 [ 3289.319265] #1: ffff88801000c3f8 (&journal->j_checkpoint_mutex){+.+.}-{3:3}, at: jbd2_journal_flush+0x483/0xc90 [ 3289.320085] [ 3289.320085] stack backtrace: [ 3289.320433] CPU: 1 PID: 35764 Comm: syz-executor.3 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3289.321069] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3289.321701] Call Trace: [ 3289.321919] [ 3289.322110] dump_stack_lvl+0x91/0xf0 [ 3289.322441] check_noncircular+0x263/0x2e0 [ 3289.322800] ? __pfx_check_noncircular+0x10/0x10 [ 3289.323225] ? mark_lock.part.0+0xef/0x2f30 [ 3289.323586] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 3289.324023] ? finish_task_switch.isra.0+0x203/0x830 [ 3289.324441] ? __switch_to+0x5c6/0xf50 [ 3289.324767] ? __pfx_mark_lock.part.0+0x10/0x10 [ 3289.325163] __lock_acquire+0x2da7/0x63b0 [ 3289.325526] ? __pfx___lock_acquire+0x10/0x10 [ 3289.325903] ? perf_trace_lock_acquire+0xcf/0x500 [ 3289.326283] lock_acquire.part.0+0xec/0x320 [ 3289.326643] ? ext4_bmap+0x52/0x470 [ 3289.326996] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 3289.327408] ? rcu_read_lock_sched_held+0x42/0x80 [ 3289.327808] ? trace_lock_acquire+0x170/0x1e0 [ 3289.328292] ? ext4_bmap+0x52/0x470 [ 3289.328606] ? lock_acquire+0x32/0xc0 [ 3289.328938] ? ext4_bmap+0x52/0x470 [ 3289.329257] down_read+0x3d/0x50 [ 3289.329562] ? ext4_bmap+0x52/0x470 [ 3289.329898] ext4_bmap+0x52/0x470 [ 3289.330217] ? __pfx_ext4_bmap+0x10/0x10 [ 3289.330577] bmap+0xb0/0x130 [ 3289.330869] ? __pfx_do_raw_write_lock+0x10/0x10 [ 3289.331308] jbd2_journal_bmap+0xac/0x1d0 [ 3289.331663] ? __pfx_jbd2_journal_bmap+0x10/0x10 [ 3289.332092] ? _raw_write_unlock+0x1e/0x40 [ 3289.332520] ? jbd2_mark_journal_empty+0x309/0x3f0 [ 3289.333089] jbd2_journal_flush+0x87f/0xc90 [ 3289.333519] ? cap_capable+0x1da/0x240 [ 3289.333929] ? __pfx_jbd2_journal_flush+0x10/0x10 [ 3289.334340] ? security_capable+0x99/0xc0 [ 3289.334698] __ext4_ioctl+0x9fd/0x4330 [ 3289.335066] ? __pfx___ext4_ioctl+0x10/0x10 [ 3289.335435] ? __pfx___lock_acquire+0x10/0x10 [ 3289.335843] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 3289.336318] ? do_vfs_ioctl+0x132/0x1690 [ 3289.336676] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 3289.337054] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 3289.337551] ? ioctl_has_perm.constprop.0.isra.0+0x2a4/0x410 [ 3289.338051] ? iput+0x446/0x820 [ 3289.338361] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 3289.338884] ? __pfx_lock_release+0x10/0x10 [ 3289.339296] ? trace_lock_acquire+0x170/0x1e0 [ 3289.339691] ? __pfx___fget_files+0x10/0x10 [ 3289.340068] ? lock_acquire+0x32/0xc0 [ 3289.340409] ? __pfx___fget_files+0x10/0x10 [ 3289.340786] ? selinux_file_ioctl+0xba/0x270 [ 3289.341165] ? __pfx_ext4_ioctl+0x10/0x10 [ 3289.341529] __x64_sys_ioctl+0x19e/0x210 [ 3289.341901] do_syscall_64+0x3f/0x90 [ 3289.342252] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3289.342698] RIP: 0033:0x7fb944428b19 [ 3289.343032] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3289.344429] RSP: 002b:00007fb94199e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3289.345096] RAX: ffffffffffffffda RBX: 00007fb94453bf60 RCX: 00007fb944428b19 [ 3289.345679] RDX: 0000000020000000 RSI: 000000004004662b RDI: 0000000000000004 [ 3289.346283] RBP: 00007fb944482f6d R08: 0000000000000000 R09: 0000000000000000 [ 3289.346865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3289.347465] R13: 00007ffeb7ab498f R14: 00007fb94199e300 R15: 0000000000022000 [ 3289.348101] [ 3289.524070] loop5: detected capacity change from 0 to 22 [ 3289.537267] EXT4-fs (loop2): Unsupported encryption level 189 [ 3289.538366] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3289.538979] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (11 blocks) 21:46:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 46) 21:46:40 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b0008010100044000404af801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0x70000e90d}) 21:46:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7ca, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) 21:46:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000020100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f00000004c0)="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", 0x121, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100"/55, 0x37, 0x540}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) [ 3289.614691] loop4: detected capacity change from 0 to 4 [ 3289.631411] EXT4-fs (loop4): Unsupported encryption level 189 21:46:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) 21:46:40 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4010) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)=0x4010) dup(r3) [ 3289.666225] loop5: detected capacity change from 0 to 22 [ 3289.678116] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3289.678720] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (11 blocks) 21:46:40 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2020, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x80000000000000}, 0x2002, 0xa824, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4010) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000180)="8a910a67c607e8055fea14278673c1ec9b0d78c663ecd5aa485e2feea2a98951f2609c123a899ef71b0218e8c4d45237d38f15eda14eb028919d7b443c854b538afc8a896e73afdc413d5dc246021595c7993aaca3ac3b86bcb40b5d18c34391c131b45e20b4a5de72970c443330428235f036c4222dfdf3cb97b42cf384af79597455381f2860499cc89edd2ec95ee2c41d7095392f9c61afab5e9ca3ee6c2ddddb959e06f2e1ae821f48097e4fae36275a612293424bd1ca79de3b3b01e69f93f71e74a6", 0xc5}, {&(0x7f0000000300)="2fae8da4c435ac53898b39d26d7a5c931d9accec0592a8fb8cf21e74e38cc422899df5ab8303e66e5bd55ffc3e0d56e3f6c7d06b136b4208910cc621737a", 0x3e}, {&(0x7f0000000340)="03590c98f61263f88ff1dd53a3c8ee799b7e861fadd4dfad0ed6614a3d405b2909bd8fd44189edd6c855bd045899abb08a3809cdca879d6ab7fc31b10a19cd5d863bb362cfbc2fc225ef1da2d9f85d5df098184ed32d90e5c3fa0eec86e92e660cd2bb2c8fcf915e8529cab76859a2bef44d7c7279c672dbfd72af894fad2a12b708bff974de79e8409dedc78b3c", 0x8e}], 0x3, 0x7, 0x7fff) pidfd_open(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x4010) fcntl$setstatus(r2, 0x4, 0x400) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7, 0x4e, 0x3, 0x7, 0x0, 0x20000000000000, 0x4, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75c5, 0x1, @perf_config_ext={0x3, 0xfffffffffffff7af}, 0x20, 0x3ff, 0x5, 0x5, 0x81, 0xff, 0x3ff, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r0, 0x2) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 21:46:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002000028020000028401", 0x63, 0x400}, {&(0x7f00000004c0)="0000000000000000000000003bf48e55190e4cca80d5ddff88e7b6a1010000000c00000000000000d700655f000000000000000000000000000000c536c29f00010064f68d897ea4a84451a3f308d41e62cb690147ec23b9324fb7cb84eb0e154b71b302d0b39b7379e31964eb7f233bf8a1dc911044518a9d1c9c213e4865b64c1ef0faf1d7a4b8037d1cb92c559e10419c12e4fbedbd", 0x97, 0x4e0}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 47) [ 3289.693305] loop2: detected capacity change from 0 to 4 [ 3289.709184] EXT4-fs (loop2): Unsupported encryption level 189 [ 3289.725887] loop5: detected capacity change from 0 to 22 [ 3289.729139] loop2: detected capacity change from 0 to 4 [ 3289.738958] EXT4-fs (loop5): failed to parse options in superblock: ÷ [ 3289.739647] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (11 blocks) [ 3289.741283] EXT4-fs (loop2): Unsupported encryption level 189 [ 3289.773358] loop4: detected capacity change from 0 to 4 [ 3289.778724] FAULT_INJECTION: forcing a failure. [ 3289.778724] name failslab, interval 1, probability 0, space 0, times 0 [ 3289.779752] CPU: 0 PID: 35904 Comm: syz-executor.4 Not tainted 6.2.0-rc8-next-20230217 #1 [ 3289.780403] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3289.781070] Call Trace: [ 3289.781287] [ 3289.781475] dump_stack_lvl+0xc1/0xf0 [ 3289.781811] should_fail_ex+0x4b4/0x5b0 [ 3289.782147] should_failslab+0x9/0x20 [ 3289.782469] kmem_cache_alloc_lru+0x6b/0x590 [ 3289.782851] ? ext4_alloc_inode+0x28/0x680 [ 3289.783758] ? __pfx_lock_release+0x10/0x10 [ 3289.784627] ? trace_lock_acquire+0x150/0x1e0 [ 3289.785521] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 3289.786500] ext4_alloc_inode+0x28/0x680 [ 3289.787506] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 3289.788714] alloc_inode+0x63/0x240 [ 3289.789681] new_inode+0x25/0x1f0 [ 3289.790623] __ext4_new_inode+0x323/0x55f0 [ 3289.791724] ? __pfx_avc_has_perm_noaudit+0x10/0x10 [ 3289.793005] ? avc_has_perm_noaudit+0xa6/0x3e0 [ 3289.794183] ? lock_acquire+0x32/0xc0 [ 3289.799342] ? __pfx___ext4_new_inode+0x10/0x10 [ 3289.800362] ? selinux_determine_inode_label+0x1b6/0x350 [ 3289.801813] ext4_mkdir+0x33e/0xb20 [ 3289.802562] ? __pfx_ext4_mkdir+0x10/0x10 [ 3289.803452] ? inode_permission.part.0+0xb5/0x520 [ 3289.804408] vfs_mkdir+0x24b/0x470 [ 3289.805114] do_mkdirat+0x163/0x2d0 [ 3289.805815] ? __pfx_do_mkdirat+0x10/0x10 [ 3289.806538] ? getname_flags.part.0+0x1dd/0x4f0 [ 3289.807490] __x64_sys_mkdir+0xf6/0x150 [ 3289.808251] do_syscall_64+0x3f/0x90 [ 3289.808958] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3289.809916] RIP: 0033:0x7fe02d21bc27 [ 3289.810601] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3289.812313] RSP: 002b:00007fe02a791fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3289.813038] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe02d21bc27 [ 3289.813666] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3289.814370] RBP: 00007fe02a792040 R08: 0000000000000000 R09: ffffffffffffffff [ 3289.815082] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3289.815699] R13: 0000000020000100 R14: 00007fe02a792000 R15: 0000000020012900 [ 3289.816317] VM DIAGNOSIS: 21:46:39 Registers: info registers vcpu 0 RAX=dffffc0000000000 RBX=ffffea00001b2fc0 RCX=ffffffff817b3e5a RDX=1ffffd40000365f8 RSI=0000000000000000 RDI=0000000000000000 RBP=0000000000000000 RSP=ffff88804605fbb0 R8 =0000000000000000 R9 =ffffea00001b2fc7 R10=fffff940000365f8 R11=0000000000000001 R12=0000000000000000 R13=0000000000000001 R14=00007fa4fa065000 R15=ffff88804605fd80 RIP=ffffffff814b7738 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fa4f9a668c0 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe7633666000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe7633664000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fa4fa06fec0 CR3=0000000045b34000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=25252525252525252525252525252525 XMM01=00ff00ff0000ff000000000000000000 XMM02=00ff0000000000000000000000000000 XMM03=696e656420737365636341002f737973 XMM04=000055da8fc27da0000055da8fc1e0f0 XMM05=0000000000000004000055da8fc340c0 XMM06=000055da8fc340e00000000300000006 XMM07=00000000000000000000000000000000 XMM08=610064253a64252f6b636f6c622f7665 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000035 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff825005d5 RDI=ffffffff87f0ada0 RBP=ffffffff87f0ad60 RSP=ffff88804535f188 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000035 R11=0000000000000001 R12=0000000000000035 R13=ffffffff87f0ad60 R14=0000000000000010 R15=ffffffff825005c0 RIP=ffffffff8250062d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fb94199e700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe6a9e4cf000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe6a9e4cd000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2bf22000 CR3=000000001ed56000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ff000000000000000000000000000000 XMM01=0100ff00000000000000000000000000 XMM02=7463656a6e695f31313230385f7a7973 XMM03=00007fb94450f7c800007fb94450f7c0 XMM04=ffffffffffffffffffffffff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000