trace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 687.245467] loop7: detected capacity change from 0 to 33559552 [ 687.269711] FAT-fs (loop4): bogus number of reserved sectors [ 687.271094] FAT-fs (loop4): Can't find a valid FAT filesystem 02:51:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, 0x0) [ 687.355394] FAT-fs (loop1): bogus number of reserved sectors [ 687.356359] FAT-fs (loop1): Can't find a valid FAT filesystem 02:51:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:51:24 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 687.422141] loop5: detected capacity change from 0 to 33559552 [ 687.433669] FAT-fs (loop5): bogus number of reserved sectors [ 687.434372] FAT-fs (loop5): Can't find a valid FAT filesystem 02:51:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, 0x0) 02:51:24 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:51:25 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 687.505658] loop7: detected capacity change from 0 to 33559552 02:51:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:51:43 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:51:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:51:43 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:51:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:51:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_L}, {@uname={'uname', 0x3d, 'hash'}}]}}) 02:51:43 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:51:43 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 705.860653] 9pnet: Insufficient options for proto=fd [ 705.860951] loop7: detected capacity change from 0 to 33559552 [ 705.875320] loop5: detected capacity change from 0 to 33559552 [ 705.886292] loop4: detected capacity change from 0 to 33559552 [ 705.891173] FAT-fs (loop1): bogus number of reserved sectors [ 705.892738] FAT-fs (loop1): Can't find a valid FAT filesystem 02:51:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_L}, {@uname={'uname', 0x3d, 'hash'}}]}}) [ 705.897658] FAT-fs (loop5): bogus number of reserved sectors [ 705.898954] FAT-fs (loop5): Can't find a valid FAT filesystem [ 705.986267] FAT-fs (loop4): bogus number of reserved sectors [ 705.987859] FAT-fs (loop4): Can't find a valid FAT filesystem 02:51:43 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(0x0, 0x1) [ 706.090944] 9pnet: Insufficient options for proto=fd 02:51:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:51:43 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:51:43 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 706.197889] loop5: detected capacity change from 0 to 33559552 02:51:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_L}, {@uname={'uname', 0x3d, 'hash'}}]}}) 02:51:43 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 706.276925] FAT-fs (loop5): bogus number of reserved sectors [ 706.279714] FAT-fs (loop5): Can't find a valid FAT filesystem [ 706.433383] 9pnet: Insufficient options for proto=fd 02:51:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:51:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(0x0, 0x1) 02:51:58 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:51:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:51:58 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:51:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:51:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@version_L}, {@uname={'uname', 0x3d, 'hash'}}]}}) 02:51:58 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 720.788362] loop7: detected capacity change from 0 to 33559552 [ 720.801957] loop4: detected capacity change from 0 to 33559552 [ 720.805177] loop5: detected capacity change from 0 to 33559552 [ 720.858080] 9pnet: Insufficient options for proto=fd [ 720.858540] FAT-fs (loop1): bogus number of reserved sectors [ 720.860643] FAT-fs (loop1): Can't find a valid FAT filesystem [ 720.863511] FAT-fs (loop5): bogus number of reserved sectors [ 720.865069] FAT-fs (loop5): Can't find a valid FAT filesystem [ 720.866503] FAT-fs (loop4): bogus number of reserved sectors [ 720.867888] FAT-fs (loop4): Can't find a valid FAT filesystem 02:51:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@version_L}, {@uname={'uname', 0x3d, 'hash'}}]}}) 02:51:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(0x0, 0x1) 02:51:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:51:58 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:51:58 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:51:58 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 721.057932] loop5: detected capacity change from 0 to 33559552 [ 721.080308] FAT-fs (loop5): bogus number of reserved sectors [ 721.081254] 9pnet: Insufficient options for proto=fd [ 721.082021] FAT-fs (loop5): Can't find a valid FAT filesystem 02:51:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x0) 02:51:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@version_L}, {@uname={'uname', 0x3d, 'hash'}}]}}) [ 721.275997] 9pnet: Insufficient options for proto=fd [ 721.299013] loop7: detected capacity change from 0 to 33559552 02:52:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:11 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:52:11 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:52:11 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L}]}}) 02:52:11 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:52:11 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x0) [ 733.717839] loop1: detected capacity change from 0 to 33559552 [ 733.733132] loop5: detected capacity change from 0 to 33559552 [ 733.745331] FAT-fs (loop1): bogus number of reserved sectors [ 733.746275] FAT-fs (loop1): Can't find a valid FAT filesystem [ 733.756499] loop4: detected capacity change from 0 to 33559552 [ 733.764757] loop7: detected capacity change from 0 to 33559552 [ 733.806652] FAT-fs (loop4): bogus number of reserved sectors [ 733.808367] FAT-fs (loop4): Can't find a valid FAT filesystem [ 733.811501] FAT-fs (loop5): invalid media value (0x00) [ 733.813176] FAT-fs (loop5): Can't find a valid FAT filesystem 02:52:11 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:52:11 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 02:52:11 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r1}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r1, 0x6, r0, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:52:11 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x0) 02:52:11 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 733.946733] loop7: detected capacity change from 0 to 33559552 02:52:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:11 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L}, {@uname={'uname', 0x3d, 'hash'}}]}}) [ 734.106365] loop5: detected capacity change from 0 to 33559552 [ 734.113076] FAT-fs (loop5): invalid media value (0x00) [ 734.114276] FAT-fs (loop5): Can't find a valid FAT filesystem 02:52:11 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:52:25 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:52:25 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r1}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r1, 0x6, r0, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:52:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:25 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L}, {@uname={'uname', 0x3d, 'hash'}}]}}) 02:52:25 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[0x0, &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:52:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:25 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 748.114822] loop1: detected capacity change from 0 to 33559552 [ 748.123052] loop5: detected capacity change from 0 to 33559552 [ 748.166486] loop4: detected capacity change from 0 to 33559552 [ 748.180742] FAT-fs (loop1): bogus number of reserved sectors [ 748.182030] FAT-fs (loop1): Can't find a valid FAT filesystem [ 748.183466] FAT-fs (loop5): invalid media value (0x00) [ 748.184647] FAT-fs (loop5): Can't find a valid FAT filesystem [ 748.196058] loop7: detected capacity change from 0 to 33559552 02:52:25 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 748.214655] FAT-fs (loop4): bogus number of reserved sectors [ 748.215935] FAT-fs (loop4): Can't find a valid FAT filesystem [ 748.219860] FAT-fs (loop7): bogus number of reserved sectors [ 748.221226] FAT-fs (loop7): Can't find a valid FAT filesystem [ 748.239820] loop6: detected capacity change from 0 to 33559552 02:52:25 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:52:25 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r1}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r1, 0x6, r0, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:52:25 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L}, {@uname={'uname', 0x3d, 'hash'}}]}}) 02:52:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 748.372211] loop5: detected capacity change from 0 to 33559552 [ 748.442021] FAT-fs (loop5): invalid media value (0x00) [ 748.443224] FAT-fs (loop5): Can't find a valid FAT filesystem 02:52:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:26 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 748.649958] loop5: detected capacity change from 0 to 33559552 [ 748.655937] FAT-fs (loop5): invalid media value (0x00) [ 748.656812] FAT-fs (loop5): Can't find a valid FAT filesystem 02:52:37 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r1}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r1, 0x6, r0, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:52:37 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:52:37 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:37 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:52:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:37 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:52:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 760.328922] loop1: detected capacity change from 0 to 33559552 [ 760.336953] loop5: detected capacity change from 0 to 33559552 [ 760.344564] loop4: detected capacity change from 0 to 33559552 [ 760.352735] loop7: detected capacity change from 0 to 33559552 [ 760.356024] FAT-fs (loop5): invalid media value (0x00) [ 760.356737] FAT-fs (loop5): Can't find a valid FAT filesystem [ 760.358272] FAT-fs (loop1): bogus number of reserved sectors [ 760.359551] FAT-fs (loop1): Can't find a valid FAT filesystem [ 760.420030] FAT-fs (loop4): bogus number of reserved sectors [ 760.420919] FAT-fs (loop4): Can't find a valid FAT filesystem 02:52:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:38 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r1}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r1, 0x6, r0, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:52:38 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 760.581048] loop5: detected capacity change from 0 to 33559552 [ 760.587582] FAT-fs (loop5): bogus number of FAT sectors [ 760.589022] FAT-fs (loop5): Can't find a valid FAT filesystem 02:52:38 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 760.629277] loop6: detected capacity change from 0 to 33559552 02:52:38 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r1}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r1, 0x6, r0, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:52:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:38 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:52:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 760.798824] loop5: detected capacity change from 0 to 33559552 02:52:38 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 760.842479] FAT-fs (loop5): bogus number of FAT sectors [ 760.843286] FAT-fs (loop5): Can't find a valid FAT filesystem [ 760.854083] loop1: detected capacity change from 0 to 33559552 [ 760.865098] loop4: detected capacity change from 0 to 33559552 [ 760.878993] FAT-fs (loop1): bogus number of reserved sectors [ 760.879742] FAT-fs (loop1): Can't find a valid FAT filesystem [ 760.881809] FAT-fs (loop4): bogus number of reserved sectors [ 760.882512] FAT-fs (loop4): Can't find a valid FAT filesystem [ 760.913132] loop7: detected capacity change from 0 to 33559552 [ 760.958278] FAT-fs (loop7): bogus number of reserved sectors [ 760.960109] FAT-fs (loop7): Can't find a valid FAT filesystem 02:52:51 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:52:51 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(0x0, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:52:51 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:51 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:52:51 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:52:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 774.124939] loop1: detected capacity change from 0 to 33559552 [ 774.143808] loop7: detected capacity change from 0 to 33559552 02:52:51 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 774.169791] loop4: detected capacity change from 0 to 33559552 [ 774.175139] loop5: detected capacity change from 0 to 33559552 [ 774.180766] FAT-fs (loop1): bogus number of reserved sectors [ 774.181796] FAT-fs (loop1): Can't find a valid FAT filesystem 02:52:51 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:52:51 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', 0x0, &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 774.212341] FAT-fs (loop4): bogus number of reserved sectors [ 774.213080] FAT-fs (loop4): Can't find a valid FAT filesystem [ 774.233829] FAT-fs (loop5): bogus number of FAT sectors [ 774.234500] FAT-fs (loop5): Can't find a valid FAT filesystem [ 774.264339] loop6: detected capacity change from 0 to 33559552 02:53:05 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:53:05 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd21}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/unix\x00') readv(r0, &(0x7f0000000280)=[{0x0}], 0x1) syz_open_procfs(0x0, 0x0) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffa000/0x6000)=nil, 0x6000) 02:53:05 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:53:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:53:05 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(0x0, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:53:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:53:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:53:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 788.406555] loop2: detected capacity change from 0 to 33559552 [ 788.417250] loop7: detected capacity change from 0 to 33559552 [ 788.422357] loop4: detected capacity change from 0 to 33559552 [ 788.426877] loop5: detected capacity change from 0 to 33559552 02:53:05 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd21}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/unix\x00') readv(r0, &(0x7f0000000280), 0x0) syz_open_procfs(0x0, 0x0) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffa000/0x6000)=nil, 0x6000) [ 788.435327] loop1: detected capacity change from 0 to 33559552 [ 788.475347] FAT-fs (loop1): bogus number of reserved sectors [ 788.476130] FAT-fs (loop1): Can't find a valid FAT filesystem [ 788.483337] FAT-fs (loop4): bogus number of reserved sectors [ 788.484213] FAT-fs (loop4): Can't find a valid FAT filesystem [ 788.491689] FAT-fs (loop7): bogus number of reserved sectors [ 788.493103] FAT-fs (loop7): Can't find a valid FAT filesystem 02:53:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:53:06 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:53:06 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:53:06 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(0x0, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:53:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 788.872963] loop1: detected capacity change from 0 to 33559552 02:53:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 788.884144] FAT-fs (loop1): bogus number of reserved sectors [ 788.885113] FAT-fs (loop1): Can't find a valid FAT filesystem 02:53:06 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:53:06 executing program 6: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:53:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 789.010837] loop5: detected capacity change from 0 to 33559552 02:53:06 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 789.054456] loop4: detected capacity change from 0 to 33559552 [ 789.070646] FAT-fs (loop4): bogus number of reserved sectors [ 789.072193] FAT-fs (loop4): Can't find a valid FAT filesystem [ 789.124066] loop7: detected capacity change from 0 to 33559552 [ 789.130225] FAT-fs (loop7): bogus number of reserved sectors [ 789.131641] FAT-fs (loop7): Can't find a valid FAT filesystem 02:53:20 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:53:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 802.850789] loop2: detected capacity change from 0 to 33559552 [ 802.876002] loop4: detected capacity change from 0 to 33559552 [ 802.884401] FAT-fs (loop2): bogus number of reserved sectors [ 802.885705] FAT-fs (loop2): Can't find a valid FAT filesystem 02:53:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:53:20 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:53:20 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:53:20 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd21}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) syz_open_procfs(0x0, 0x0) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffa000/0x6000)=nil, 0x6000) 02:53:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:53:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 802.898017] loop1: detected capacity change from 0 to 33559552 02:53:20 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 1) [ 802.908441] loop5: detected capacity change from 0 to 33559552 [ 802.914283] FAT-fs (loop4): bogus number of reserved sectors [ 802.915612] FAT-fs (loop4): Can't find a valid FAT filesystem [ 802.978876] FAT-fs (loop1): bogus number of reserved sectors [ 802.980320] FAT-fs (loop1): Can't find a valid FAT filesystem 02:53:20 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) (fail_nth: 1) 02:53:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 803.098727] FAULT_INJECTION: forcing a failure. [ 803.098727] name failslab, interval 1, probability 0, space 0, times 1 [ 803.101687] CPU: 0 PID: 6597 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 803.103337] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 803.105231] Call Trace: [ 803.105832] dump_stack+0x107/0x167 [ 803.106657] should_fail.cold+0x5/0xa [ 803.107519] should_failslab+0x5/0x20 [ 803.108394] __kmalloc_track_caller+0x79/0x370 [ 803.109461] ? strndup_user+0x74/0xe0 [ 803.110318] memdup_user+0x22/0xd0 [ 803.111118] strndup_user+0x74/0xe0 [ 803.111948] __x64_sys_mount+0x133/0x300 [ 803.112876] ? copy_mnt_ns+0xa00/0xa00 [ 803.113780] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 803.114957] ? syscall_enter_from_user_mode+0x1d/0x50 [ 803.116146] do_syscall_64+0x33/0x40 [ 803.117012] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 803.118232] RIP: 0033:0x7f0ec334eb19 02:53:20 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 803.119073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 803.123523] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 803.125311] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 803.126933] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 803.128564] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 803.130203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 803.131886] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 803.139092] loop6: detected capacity change from 0 to 33559552 [ 803.174788] FAULT_INJECTION: forcing a failure. [ 803.174788] name failslab, interval 1, probability 0, space 0, times 0 [ 803.177656] CPU: 0 PID: 6598 Comm: syz-executor.6 Not tainted 5.10.237 #1 [ 803.179220] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 803.181139] Call Trace: [ 803.181742] dump_stack+0x107/0x167 [ 803.182573] should_fail.cold+0x5/0xa [ 803.183450] ? getname_flags.part.0+0x50/0x4f0 [ 803.184491] should_failslab+0x5/0x20 [ 803.185370] kmem_cache_alloc+0x5b/0x310 [ 803.186309] getname_flags.part.0+0x50/0x4f0 [ 803.187308] user_path_at_empty+0xa1/0x100 [ 803.188299] do_sys_truncate.part.0+0x86/0x140 [ 803.189350] ? vfs_truncate+0x5e0/0x5e0 [ 803.190281] ? ksys_write+0x1a9/0x260 [ 803.191183] ? __ia32_sys_read+0xb0/0xb0 [ 803.192117] __x64_sys_truncate+0x69/0xa0 [ 803.193065] do_syscall_64+0x33/0x40 02:53:20 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 803.193923] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 803.195261] RIP: 0033:0x7f70cec30b19 [ 803.196102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 803.200278] RSP: 002b:00007f70cc1a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 803.202017] RAX: ffffffffffffffda RBX: 00007f70ced43f60 RCX: 00007f70cec30b19 [ 803.203643] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000200000c0 [ 803.205268] RBP: 00007f70cc1a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 803.206888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 803.208503] R13: 00007ffd21e2bd3f R14: 00007f70cc1a6300 R15: 0000000000022000 [ 803.212317] loop5: detected capacity change from 0 to 33559552 02:53:20 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 2) 02:53:20 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) (fail_nth: 2) 02:53:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 803.483333] FAULT_INJECTION: forcing a failure. [ 803.483333] name failslab, interval 1, probability 0, space 0, times 0 [ 803.486525] CPU: 0 PID: 6611 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 803.488230] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 803.490134] Call Trace: [ 803.490761] dump_stack+0x107/0x167 [ 803.491619] should_fail.cold+0x5/0xa [ 803.492516] ? create_object.isra.0+0x3a/0xa20 [ 803.493585] should_failslab+0x5/0x20 [ 803.494471] kmem_cache_alloc+0x5b/0x310 [ 803.495412] create_object.isra.0+0x3a/0xa20 [ 803.496416] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 803.497604] __kmalloc_track_caller+0x177/0x370 [ 803.498661] ? strndup_user+0x74/0xe0 [ 803.499542] memdup_user+0x22/0xd0 [ 803.500353] strndup_user+0x74/0xe0 [ 803.501210] __x64_sys_mount+0x133/0x300 [ 803.502135] ? copy_mnt_ns+0xa00/0xa00 [ 803.503034] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 803.504241] ? syscall_enter_from_user_mode+0x1d/0x50 [ 803.505441] do_syscall_64+0x33/0x40 [ 803.506299] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 803.507477] RIP: 0033:0x7f0ec334eb19 [ 803.508329] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 803.512532] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 803.514275] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 803.515904] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 803.517542] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 803.519182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 803.520810] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 803.532205] loop6: detected capacity change from 0 to 33559552 [ 803.582439] FAULT_INJECTION: forcing a failure. [ 803.582439] name failslab, interval 1, probability 0, space 0, times 0 [ 803.585336] CPU: 1 PID: 6617 Comm: syz-executor.6 Not tainted 5.10.237 #1 [ 803.586892] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 803.588668] Call Trace: [ 803.589249] dump_stack+0x107/0x167 [ 803.590023] should_fail.cold+0x5/0xa [ 803.590836] ? create_object.isra.0+0x3a/0xa20 [ 803.591812] should_failslab+0x5/0x20 [ 803.592627] kmem_cache_alloc+0x5b/0x310 [ 803.593511] create_object.isra.0+0x3a/0xa20 [ 803.594441] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 803.595523] kmem_cache_alloc+0x159/0x310 [ 803.596412] getname_flags.part.0+0x50/0x4f0 [ 803.597358] user_path_at_empty+0xa1/0x100 [ 803.598267] do_sys_truncate.part.0+0x86/0x140 [ 803.599232] ? vfs_truncate+0x5e0/0x5e0 [ 803.600077] ? ksys_write+0x1a9/0x260 [ 803.600896] ? __ia32_sys_read+0xb0/0xb0 [ 803.601768] __x64_sys_truncate+0x69/0xa0 [ 803.602645] do_syscall_64+0x33/0x40 [ 803.603438] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 803.604699] RIP: 0033:0x7f70cec30b19 [ 803.605594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 803.610248] RSP: 002b:00007f70cc185188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 803.612306] RAX: ffffffffffffffda RBX: 00007f70ced44020 RCX: 00007f70cec30b19 [ 803.614009] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000200000c0 [ 803.615950] RBP: 00007f70cc1851d0 R08: 0000000000000000 R09: 0000000000000000 [ 803.617678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 803.619467] R13: 00007ffd21e2bd3f R14: 00007f70cc185300 R15: 0000000000022000 [ 803.622989] loop5: detected capacity change from 0 to 33559552 02:53:34 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) (fail_nth: 3) 02:53:34 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:53:34 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 3) 02:53:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:53:34 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 816.764728] loop6: detected capacity change from 0 to 33559552 [ 816.773473] FAULT_INJECTION: forcing a failure. [ 816.773473] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 816.775920] CPU: 1 PID: 6629 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 816.777322] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 816.779019] Call Trace: [ 816.779558] dump_stack+0x107/0x167 02:53:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:53:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:53:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 816.780305] should_fail.cold+0x5/0xa [ 816.781366] _copy_from_user+0x2e/0x1b0 [ 816.782188] memdup_user+0x65/0xd0 [ 816.782931] strndup_user+0x74/0xe0 [ 816.783668] __x64_sys_mount+0x133/0x300 [ 816.784491] ? copy_mnt_ns+0xa00/0xa00 [ 816.785297] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 816.786376] ? syscall_enter_from_user_mode+0x1d/0x50 [ 816.787435] do_syscall_64+0x33/0x40 [ 816.788193] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 816.789249] RIP: 0033:0x7f0ec334eb19 [ 816.790012] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 816.793796] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 816.795345] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 816.796802] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 816.798283] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 816.799738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 816.801225] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 816.825003] loop4: detected capacity change from 0 to 33559552 [ 816.833133] loop1: detected capacity change from 0 to 33559552 [ 816.843888] loop5: detected capacity change from 0 to 33559552 [ 816.865746] loop2: detected capacity change from 0 to 33559552 02:53:34 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 4) [ 816.935825] FAULT_INJECTION: forcing a failure. [ 816.935825] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 816.938513] CPU: 0 PID: 6627 Comm: syz-executor.6 Not tainted 5.10.237 #1 [ 816.940256] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 816.942174] Call Trace: [ 816.942730] FAT-fs (loop5): Unrecognized mount option "./file1" or missing value [ 816.942774] dump_stack+0x107/0x167 [ 816.945100] should_fail.cold+0x5/0xa [ 816.945972] strncpy_from_user+0x34/0x470 [ 816.946914] getname_flags.part.0+0x95/0x4f0 [ 816.947914] user_path_at_empty+0xa1/0x100 [ 816.948872] do_sys_truncate.part.0+0x86/0x140 [ 816.949915] ? vfs_truncate+0x5e0/0x5e0 [ 816.950815] ? ksys_write+0x1a9/0x260 [ 816.951677] ? __ia32_sys_read+0xb0/0xb0 [ 816.952602] __x64_sys_truncate+0x69/0xa0 [ 816.953545] do_syscall_64+0x33/0x40 [ 816.954384] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 816.955532] RIP: 0033:0x7f70cec30b19 [ 816.956378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 816.960537] RSP: 002b:00007f70cc1a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 816.962257] RAX: ffffffffffffffda RBX: 00007f70ced43f60 RCX: 00007f70cec30b19 [ 816.963863] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000200000c0 [ 816.965482] RBP: 00007f70cc1a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 816.967097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 816.968710] R13: 00007ffd21e2bd3f R14: 00007f70cc1a6300 R15: 0000000000022000 [ 816.971009] FAT-fs (loop1): bogus number of reserved sectors [ 816.973031] FAT-fs (loop1): Can't find a valid FAT filesystem [ 816.990985] FAT-fs (loop2): bogus number of reserved sectors [ 816.992260] FAT-fs (loop2): Can't find a valid FAT filesystem 02:53:34 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 817.043279] FAT-fs (loop4): bogus number of reserved sectors [ 817.044671] FAT-fs (loop4): Can't find a valid FAT filesystem 02:53:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 817.056451] FAULT_INJECTION: forcing a failure. [ 817.056451] name failslab, interval 1, probability 0, space 0, times 0 [ 817.059411] CPU: 0 PID: 6660 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 817.060960] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 817.062846] Call Trace: [ 817.063442] dump_stack+0x107/0x167 [ 817.064260] should_fail.cold+0x5/0xa [ 817.065138] ? copy_mount_options+0x55/0x180 [ 817.066139] should_failslab+0x5/0x20 [ 817.067004] kmem_cache_alloc_trace+0x55/0x320 [ 817.068039] ? _copy_from_user+0xfb/0x1b0 [ 817.068976] copy_mount_options+0x55/0x180 [ 817.069942] __x64_sys_mount+0x1a8/0x300 [ 817.071014] ? copy_mnt_ns+0xa00/0xa00 [ 817.071911] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 817.073120] ? syscall_enter_from_user_mode+0x1d/0x50 [ 817.074286] do_syscall_64+0x33/0x40 [ 817.075120] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 817.076279] RIP: 0033:0x7f0ec334eb19 [ 817.077146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 817.081343] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 817.083085] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 817.084718] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 817.086393] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 817.087983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 817.089591] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:53:34 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) (fail_nth: 4) 02:53:34 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:53:34 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 5) [ 817.185184] FAULT_INJECTION: forcing a failure. [ 817.185184] name failslab, interval 1, probability 0, space 0, times 0 [ 817.187931] CPU: 0 PID: 6663 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 817.189639] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 817.191512] Call Trace: [ 817.192116] dump_stack+0x107/0x167 [ 817.192934] should_fail.cold+0x5/0xa [ 817.193813] ? create_object.isra.0+0x3a/0xa20 [ 817.194837] should_failslab+0x5/0x20 [ 817.195682] kmem_cache_alloc+0x5b/0x310 [ 817.196597] create_object.isra.0+0x3a/0xa20 [ 817.197593] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 817.198750] kmem_cache_alloc_trace+0x151/0x320 [ 817.199801] ? _copy_from_user+0xfb/0x1b0 [ 817.200764] copy_mount_options+0x55/0x180 [ 817.201733] __x64_sys_mount+0x1a8/0x300 [ 817.202657] ? copy_mnt_ns+0xa00/0xa00 [ 817.203549] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 817.204736] ? syscall_enter_from_user_mode+0x1d/0x50 [ 817.205947] do_syscall_64+0x33/0x40 [ 817.206799] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 817.207991] RIP: 0033:0x7f0ec334eb19 [ 817.208825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 817.212978] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 817.214691] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 817.216302] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 817.217926] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 817.219535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 817.221175] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 817.240230] loop6: detected capacity change from 0 to 33559552 02:53:34 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:53:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 817.357419] FAULT_INJECTION: forcing a failure. [ 817.357419] name failslab, interval 1, probability 0, space 0, times 0 [ 817.360262] CPU: 1 PID: 6673 Comm: syz-executor.6 Not tainted 5.10.237 #1 [ 817.361748] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 817.363507] Call Trace: [ 817.364077] dump_stack+0x107/0x167 [ 817.364856] should_fail.cold+0x5/0xa [ 817.365674] ? jbd2__journal_start+0x190/0x7e0 [ 817.366654] should_failslab+0x5/0x20 [ 817.367468] kmem_cache_alloc+0x5b/0x310 [ 817.368341] jbd2__journal_start+0x190/0x7e0 [ 817.369290] __ext4_journal_start_sb+0x214/0x390 [ 817.370298] ext4_setattr+0xe9c/0x20f0 [ 817.371132] ? igrab+0xc0/0xc0 [ 817.371831] ? ext4_journalled_write_end+0x1190/0x1190 [ 817.372947] notify_change+0xc28/0x1160 [ 817.373801] ? security_kernel_post_load_data+0x60/0xd0 [ 817.374945] do_truncate+0x134/0x1f0 [ 817.375738] ? file_open_root+0x440/0x440 [ 817.376621] ? security_capable+0x95/0xc0 [ 817.377517] ? security_inode_permission+0xcb/0x100 [ 817.378580] vfs_truncate+0x45b/0x5e0 [ 817.379392] do_sys_truncate.part.0+0x122/0x140 [ 817.380370] ? vfs_truncate+0x5e0/0x5e0 [ 817.381218] ? ksys_write+0x1a9/0x260 [ 817.382024] ? __ia32_sys_read+0xb0/0xb0 [ 817.382888] __x64_sys_truncate+0x69/0xa0 [ 817.383767] do_syscall_64+0x33/0x40 [ 817.384557] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 817.385646] RIP: 0033:0x7f70cec30b19 [ 817.386430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 817.390335] RSP: 002b:00007f70cc185188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 817.392104] RAX: ffffffffffffffda RBX: 00007f70ced44020 RCX: 00007f70cec30b19 [ 817.393881] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000200000c0 [ 817.395395] RBP: 00007f70cc1851d0 R08: 0000000000000000 R09: 0000000000000000 [ 817.396953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 817.398624] R13: 00007ffd21e2bd3f R14: 00007f70cc185300 R15: 0000000000022000 [ 817.400403] EXT4-fs error (device sda) in ext4_setattr:5675: Out of memory 02:53:34 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 817.461680] loop5: detected capacity change from 0 to 33559552 02:53:34 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 6) [ 817.515906] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:53:35 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 817.625065] FAULT_INJECTION: forcing a failure. [ 817.625065] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 817.627769] CPU: 1 PID: 6684 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 817.629550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 817.631509] Call Trace: [ 817.632177] dump_stack+0x107/0x167 [ 817.633050] should_fail.cold+0x5/0xa [ 817.634059] _copy_from_user+0x2e/0x1b0 [ 817.634921] copy_mount_options+0x76/0x180 [ 817.635819] __x64_sys_mount+0x1a8/0x300 [ 817.636943] ? copy_mnt_ns+0xa00/0xa00 [ 817.637868] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 817.639132] ? syscall_enter_from_user_mode+0x1d/0x50 [ 817.640385] do_syscall_64+0x33/0x40 [ 817.641311] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 817.642774] RIP: 0033:0x7f0ec334eb19 [ 817.643571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 817.647996] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 817.649832] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 817.651640] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 817.653319] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 817.654797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 817.656283] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:53:49 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) (fail_nth: 5) 02:53:49 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 7) 02:53:49 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 832.497410] FAULT_INJECTION: forcing a failure. [ 832.497410] name failslab, interval 1, probability 0, space 0, times 0 [ 832.500090] CPU: 0 PID: 6691 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 832.501645] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 832.503509] Call Trace: [ 832.504111] dump_stack+0x107/0x167 [ 832.504932] should_fail.cold+0x5/0xa [ 832.505802] ? getname_flags.part.0+0x50/0x4f0 [ 832.506835] should_failslab+0x5/0x20 [ 832.507694] kmem_cache_alloc+0x5b/0x310 [ 832.508615] getname_flags.part.0+0x50/0x4f0 [ 832.509661] ? _copy_from_user+0xfb/0x1b0 [ 832.510601] user_path_at_empty+0xa1/0x100 [ 832.511567] __x64_sys_mount+0x1e9/0x300 [ 832.512477] ? copy_mnt_ns+0xa00/0xa00 [ 832.513366] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 832.514560] ? syscall_enter_from_user_mode+0x1d/0x50 [ 832.515718] do_syscall_64+0x33/0x40 [ 832.516561] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 832.517727] RIP: 0033:0x7f0ec334eb19 [ 832.518566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 832.522756] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 832.524485] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 832.526306] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 832.527916] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 832.529537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 832.531121] loop6: detected capacity change from 0 to 33559552 [ 832.531139] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:53:50 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:53:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:53:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:53:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:53:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 832.555910] loop4: detected capacity change from 0 to 33559552 [ 832.566805] loop5: detected capacity change from 0 to 33559552 [ 832.575581] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 832.578927] FAT-fs (loop4): invalid media value (0x00) [ 832.580134] FAT-fs (loop4): Can't find a valid FAT filesystem [ 832.589744] loop2: detected capacity change from 0 to 33559552 [ 832.599914] loop1: detected capacity change from 0 to 33559552 [ 832.607656] FAT-fs (loop2): bogus number of reserved sectors [ 832.609058] FAT-fs (loop2): Can't find a valid FAT filesystem [ 832.613370] FAULT_INJECTION: forcing a failure. [ 832.613370] name failslab, interval 1, probability 0, space 0, times 0 [ 832.615960] CPU: 1 PID: 6700 Comm: syz-executor.6 Not tainted 5.10.237 #1 [ 832.617405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 832.619159] Call Trace: [ 832.619720] dump_stack+0x107/0x167 [ 832.620488] should_fail.cold+0x5/0xa [ 832.621300] ? create_object.isra.0+0x3a/0xa20 [ 832.622270] should_failslab+0x5/0x20 [ 832.623077] kmem_cache_alloc+0x5b/0x310 [ 832.623946] create_object.isra.0+0x3a/0xa20 [ 832.624868] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 832.625952] kmem_cache_alloc+0x159/0x310 [ 832.626833] alloc_buffer_head+0x20/0x110 [ 832.627709] alloc_page_buffers+0x14d/0x700 [ 832.628624] create_empty_buffers+0x2c/0x640 [ 832.629573] create_page_buffers+0x1bb/0x230 [ 832.630505] __block_write_begin_int+0x1d1/0x19c0 [ 832.631531] ? fat_add_cluster+0x100/0x100 [ 832.632428] ? add_to_page_cache_locked+0x40/0x40 [ 832.633458] ? __page_cache_alloc+0x10d/0x360 [ 832.634409] ? remove_inode_buffers+0x300/0x300 [ 832.635392] ? pagecache_get_page+0x243/0xc80 [ 832.636339] ? mark_lock+0xf5/0x2df0 [ 832.637127] ? wait_for_stable_page+0x92/0xe0 [ 832.638083] cont_write_begin+0x472/0x980 [ 832.638962] ? lock_acquire+0x197/0x470 [ 832.639803] ? fat_add_cluster+0x100/0x100 [ 832.640707] ? nobh_write_begin+0xed0/0xed0 [ 832.641627] ? lock_downgrade+0x6d0/0x6d0 [ 832.642520] fat_write_begin+0x89/0x180 [ 832.643360] ? fat_add_cluster+0x100/0x100 [ 832.644257] cont_write_begin+0x60d/0x980 [ 832.645134] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 832.646257] ? lock_chain_count+0x20/0x20 [ 832.647134] ? __lock_acquire+0x1657/0x5b00 [ 832.648043] ? fat_add_cluster+0x100/0x100 [ 832.648937] ? nobh_write_begin+0xed0/0xed0 [ 832.649859] ? avc_has_perm+0xc5/0x1b0 [ 832.650692] fat_write_begin+0x89/0x180 [ 832.651666] ? fat_add_cluster+0x100/0x100 [ 832.652681] generic_cont_expand_simple+0x113/0x180 [ 832.653738] ? invalidate_bh_lrus+0x20/0x20 [ 832.654647] ? __wait_on_freeing_inode+0x140/0x140 [ 832.655690] ? selinux_mount+0x350/0x350 [ 832.656547] ? inode_newsize_ok+0x18d/0x210 [ 832.657473] fat_cont_expand+0x66/0x240 [ 832.658315] fat_setattr+0xb16/0xf50 [ 832.659099] ? fat_free.isra.0+0x940/0x940 [ 832.659986] notify_change+0xc28/0x1160 [ 832.660832] ? security_secid_to_secctx+0x1d/0xc0 [ 832.661857] do_truncate+0x134/0x1f0 [ 832.662648] ? file_open_root+0x440/0x440 [ 832.663519] ? __check_object_size+0x319/0x440 [ 832.664491] ? security_inode_permission+0xcb/0x100 [ 832.665562] vfs_truncate+0x45b/0x5e0 [ 832.666383] do_sys_truncate.part.0+0x122/0x140 [ 832.667368] ? vfs_truncate+0x5e0/0x5e0 [ 832.668208] ? ksys_write+0x1a9/0x260 [ 832.669015] ? __ia32_sys_read+0xb0/0xb0 [ 832.669887] __x64_sys_truncate+0x69/0xa0 [ 832.670770] do_syscall_64+0x33/0x40 [ 832.671561] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 832.672889] RIP: 0033:0x7f70cec30b19 [ 832.673689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 832.677626] RSP: 002b:00007f70cc1a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 832.679234] RAX: ffffffffffffffda RBX: 00007f70ced43f60 RCX: 00007f70cec30b19 [ 832.680756] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000200000c0 [ 832.682270] RBP: 00007f70cc1a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 832.683782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 832.685302] R13: 00007ffd21e2bd3f R14: 00007f70cc1a6300 R15: 0000000000022000 02:53:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 8) 02:53:50 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:53:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 832.690747] FAT-fs (loop1): bogus number of reserved sectors [ 832.692727] FAT-fs (loop1): Can't find a valid FAT filesystem 02:53:50 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) (fail_nth: 6) 02:53:50 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 832.790076] FAULT_INJECTION: forcing a failure. [ 832.790076] name failslab, interval 1, probability 0, space 0, times 0 [ 832.792798] CPU: 0 PID: 6721 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 832.794474] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 832.796366] Call Trace: [ 832.796970] dump_stack+0x107/0x167 [ 832.797804] should_fail.cold+0x5/0xa [ 832.798668] ? create_object.isra.0+0x3a/0xa20 [ 832.799715] should_failslab+0x5/0x20 [ 832.800579] kmem_cache_alloc+0x5b/0x310 [ 832.801525] create_object.isra.0+0x3a/0xa20 [ 832.802520] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 832.803678] kmem_cache_alloc+0x159/0x310 [ 832.804619] getname_flags.part.0+0x50/0x4f0 [ 832.805624] ? _copy_from_user+0xfb/0x1b0 [ 832.806560] user_path_at_empty+0xa1/0x100 [ 832.807507] __x64_sys_mount+0x1e9/0x300 [ 832.808430] ? copy_mnt_ns+0xa00/0xa00 [ 832.809335] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 832.810522] ? syscall_enter_from_user_mode+0x1d/0x50 [ 832.811687] do_syscall_64+0x33/0x40 [ 832.812528] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 832.813701] RIP: 0033:0x7f0ec334eb19 [ 832.814541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 832.818724] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 832.820443] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 832.822073] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 832.823689] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 832.825314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 832.826939] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 832.831890] loop5: detected capacity change from 0 to 33559552 [ 832.842796] FAULT_INJECTION: forcing a failure. [ 832.842796] name failslab, interval 1, probability 0, space 0, times 0 [ 832.845209] CPU: 1 PID: 6725 Comm: syz-executor.6 Not tainted 5.10.237 #1 [ 832.846662] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 832.848727] Call Trace: [ 832.849303] dump_stack+0x107/0x167 [ 832.850248] should_fail.cold+0x5/0xa [ 832.851077] ? jbd2__journal_start+0x190/0x7e0 [ 832.852314] should_failslab+0x5/0x20 [ 832.853334] kmem_cache_alloc+0x5b/0x310 [ 832.854191] ? lock_downgrade+0x6d0/0x6d0 [ 832.855251] jbd2__journal_start+0x190/0x7e0 [ 832.856302] __ext4_journal_start_sb+0x214/0x390 [ 832.857378] ext4_dirty_inode+0xbc/0x130 [ 832.858238] ? ext4_setattr+0x20f0/0x20f0 [ 832.859259] __mark_inode_dirty+0x492/0xd40 [ 832.860403] ext4_setattr+0x123f/0x20f0 [ 832.861416] ? ext4_journalled_write_end+0x1190/0x1190 [ 832.862643] notify_change+0xc28/0x1160 [ 832.863680] ? security_kernel_post_load_data+0x60/0xd0 [ 832.865025] do_truncate+0x134/0x1f0 [ 832.865992] ? file_open_root+0x440/0x440 [ 832.866950] ? security_capable+0x95/0xc0 [ 832.867912] ? security_inode_permission+0xcb/0x100 [ 832.869119] vfs_truncate+0x45b/0x5e0 [ 832.869941] do_sys_truncate.part.0+0x122/0x140 [ 832.870928] ? vfs_truncate+0x5e0/0x5e0 [ 832.871771] ? ksys_write+0x1a9/0x260 [ 832.872576] ? __ia32_sys_read+0xb0/0xb0 [ 832.873460] __x64_sys_truncate+0x69/0xa0 [ 832.874500] do_syscall_64+0x33/0x40 [ 832.875555] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 832.876642] RIP: 0033:0x7f70cec30b19 [ 832.877440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 832.881745] RSP: 002b:00007f70cc1a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 832.883755] RAX: ffffffffffffffda RBX: 00007f70ced43f60 RCX: 00007f70cec30b19 [ 832.885292] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000200000c0 [ 832.886846] RBP: 00007f70cc1a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 832.888521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 832.890452] R13: 00007ffd21e2bd3f R14: 00007f70cc1a6300 R15: 0000000000022000 02:53:50 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) (fail_nth: 7) [ 832.954898] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 833.031498] FAULT_INJECTION: forcing a failure. [ 833.031498] name failslab, interval 1, probability 0, space 0, times 0 [ 833.034179] CPU: 1 PID: 6732 Comm: syz-executor.6 Not tainted 5.10.237 #1 [ 833.035631] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 833.037398] Call Trace: [ 833.037959] dump_stack+0x107/0x167 [ 833.038734] should_fail.cold+0x5/0xa [ 833.039545] ? create_object.isra.0+0x3a/0xa20 [ 833.040517] should_failslab+0x5/0x20 [ 833.041332] kmem_cache_alloc+0x5b/0x310 [ 833.042197] create_object.isra.0+0x3a/0xa20 [ 833.043127] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 833.044210] kmem_cache_alloc+0x159/0x310 [ 833.045096] ? lock_downgrade+0x6d0/0x6d0 [ 833.045990] jbd2__journal_start+0x190/0x7e0 [ 833.046932] __ext4_journal_start_sb+0x214/0x390 [ 833.047928] ext4_dirty_inode+0xbc/0x130 [ 833.048788] ? ext4_setattr+0x20f0/0x20f0 [ 833.049673] __mark_inode_dirty+0x492/0xd40 [ 833.050593] ext4_setattr+0x123f/0x20f0 [ 833.051446] ? ext4_journalled_write_end+0x1190/0x1190 [ 833.052556] notify_change+0xc28/0x1160 [ 833.053414] ? security_kernel_post_load_data+0x60/0xd0 [ 833.054551] do_truncate+0x134/0x1f0 [ 833.055340] ? file_open_root+0x440/0x440 [ 833.056218] ? security_capable+0x95/0xc0 [ 833.057111] ? security_inode_permission+0xcb/0x100 [ 833.058179] vfs_truncate+0x45b/0x5e0 [ 833.058992] do_sys_truncate.part.0+0x122/0x140 [ 833.059984] ? vfs_truncate+0x5e0/0x5e0 [ 833.060856] ? ksys_write+0x1a9/0x260 [ 833.061678] ? __ia32_sys_read+0xb0/0xb0 [ 833.062551] __x64_sys_truncate+0x69/0xa0 [ 833.063422] do_syscall_64+0x33/0x40 [ 833.064214] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 833.065314] RIP: 0033:0x7f70cec30b19 [ 833.066099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 833.070024] RSP: 002b:00007f70cc1a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 833.071646] RAX: ffffffffffffffda RBX: 00007f70ced43f60 RCX: 00007f70cec30b19 [ 833.073173] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000200000c0 [ 833.074697] RBP: 00007f70cc1a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 833.076207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 833.077740] R13: 00007ffd21e2bd3f R14: 00007f70cc1a6300 R15: 0000000000022000 02:54:04 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 9) 02:54:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:54:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:54:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:54:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:54:04 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:54:04 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:54:04 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) (fail_nth: 8) [ 846.760956] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 846.778786] loop6: detected capacity change from 0 to 33559552 [ 846.785900] loop5: detected capacity change from 0 to 33559552 [ 846.789251] FAULT_INJECTION: forcing a failure. [ 846.789251] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 846.790822] CPU: 0 PID: 6754 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 846.791796] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 846.792819] Call Trace: [ 846.793222] dump_stack+0x107/0x167 [ 846.793778] should_fail.cold+0x5/0xa [ 846.794352] strncpy_from_user+0x34/0x470 [ 846.794998] getname_flags.part.0+0x95/0x4f0 [ 846.795630] ? _copy_from_user+0xfb/0x1b0 [ 846.796231] user_path_at_empty+0xa1/0x100 [ 846.796842] __x64_sys_mount+0x1e9/0x300 [ 846.797432] ? copy_mnt_ns+0xa00/0xa00 [ 846.797999] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 846.798752] ? syscall_enter_from_user_mode+0x1d/0x50 [ 846.799500] do_syscall_64+0x33/0x40 [ 846.800035] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 846.800766] RIP: 0033:0x7f0ec334eb19 [ 846.801223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 846.803861] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 846.804970] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 846.805856] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 846.806889] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 846.807770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 846.808788] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 846.818053] loop4: detected capacity change from 0 to 33559552 02:54:04 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 846.825357] loop2: detected capacity change from 0 to 33559552 [ 846.837263] loop1: detected capacity change from 0 to 33559552 [ 846.847169] FAULT_INJECTION: forcing a failure. [ 846.847169] name failslab, interval 1, probability 0, space 0, times 0 [ 846.848239] FAT-fs (loop4): invalid media value (0x00) [ 846.849661] CPU: 1 PID: 6741 Comm: syz-executor.6 Not tainted 5.10.237 #1 [ 846.850386] FAT-fs (loop4): Can't find a valid FAT filesystem [ 846.851838] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 846.851846] Call Trace: [ 846.851873] dump_stack+0x107/0x167 [ 846.851900] should_fail.cold+0x5/0xa [ 846.852831] FAT-fs (loop2): bogus number of reserved sectors [ 846.854515] ? create_object.isra.0+0x3a/0xa20 [ 846.854540] should_failslab+0x5/0x20 [ 846.854913] FAT-fs (loop2): Can't find a valid FAT filesystem [ 846.855674] kmem_cache_alloc+0x5b/0x310 [ 846.855698] create_object.isra.0+0x3a/0xa20 [ 846.862173] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 846.863257] kmem_cache_alloc+0x159/0x310 [ 846.864143] alloc_buffer_head+0x20/0x110 [ 846.865024] alloc_page_buffers+0x14d/0x700 [ 846.865951] create_empty_buffers+0x2c/0x640 [ 846.866904] create_page_buffers+0x1bb/0x230 02:54:04 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 10) [ 846.867842] __block_write_begin_int+0x1d1/0x19c0 [ 846.868984] ? fat_add_cluster+0x100/0x100 [ 846.869897] ? add_to_page_cache_locked+0x40/0x40 [ 846.870959] ? __page_cache_alloc+0x10d/0x360 [ 846.872033] ? remove_inode_buffers+0x300/0x300 [ 846.873022] ? pagecache_get_page+0x243/0xc80 [ 846.873985] ? mark_lock+0xf5/0x2df0 [ 846.874776] ? wait_for_stable_page+0x92/0xe0 [ 846.875745] cont_write_begin+0x472/0x980 [ 846.876648] ? lock_acquire+0x197/0x470 [ 846.877595] ? fat_add_cluster+0x100/0x100 [ 846.878506] ? nobh_write_begin+0xed0/0xed0 [ 846.879433] ? lock_downgrade+0x6d0/0x6d0 [ 846.880335] fat_write_begin+0x89/0x180 [ 846.881138] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 846.881190] ? fat_add_cluster+0x100/0x100 [ 846.883833] cont_write_begin+0x60d/0x980 [ 846.884719] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 846.885863] ? lock_chain_count+0x20/0x20 [ 846.886753] ? __lock_acquire+0x1657/0x5b00 [ 846.887685] ? fat_add_cluster+0x100/0x100 [ 846.888590] ? nobh_write_begin+0xed0/0xed0 [ 846.889528] ? avc_has_perm+0xc5/0x1b0 [ 846.890366] fat_write_begin+0x89/0x180 [ 846.891216] ? fat_add_cluster+0x100/0x100 [ 846.892122] generic_cont_expand_simple+0x113/0x180 [ 846.893189] ? invalidate_bh_lrus+0x20/0x20 [ 846.894112] ? __wait_on_freeing_inode+0x140/0x140 [ 846.895164] ? selinux_mount+0x350/0x350 [ 846.896031] ? inode_newsize_ok+0x18d/0x210 [ 846.896950] fat_cont_expand+0x66/0x240 [ 846.897813] fat_setattr+0xb16/0xf50 [ 846.898607] ? fat_free.isra.0+0x940/0x940 [ 846.899504] notify_change+0xc28/0x1160 [ 846.900354] ? security_secid_to_secctx+0x1d/0xc0 [ 846.901391] do_truncate+0x134/0x1f0 [ 846.902187] ? file_open_root+0x440/0x440 [ 846.903064] ? __check_object_size+0x319/0x440 [ 846.904044] ? security_inode_permission+0xcb/0x100 [ 846.905114] vfs_truncate+0x45b/0x5e0 [ 846.905943] do_sys_truncate.part.0+0x122/0x140 [ 846.906933] ? vfs_truncate+0x5e0/0x5e0 [ 846.907781] ? ksys_write+0x1a9/0x260 [ 846.908593] ? __ia32_sys_read+0xb0/0xb0 [ 846.909477] __x64_sys_truncate+0x69/0xa0 [ 846.910360] do_syscall_64+0x33/0x40 [ 846.911153] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 846.912241] RIP: 0033:0x7f70cec30b19 02:54:04 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 846.913036] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 846.917077] RSP: 002b:00007f70cc1a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 846.918708] RAX: ffffffffffffffda RBX: 00007f70ced43f60 RCX: 00007f70cec30b19 [ 846.920220] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000200000c0 [ 846.921756] RBP: 00007f70cc1a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 846.923280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 02:54:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 846.924804] R13: 00007ffd21e2bd3f R14: 00007f70cc1a6300 R15: 0000000000022000 [ 846.927292] FAT-fs (loop1): bogus number of reserved sectors [ 846.928170] FAT-fs (loop1): Can't find a valid FAT filesystem 02:54:04 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) (fail_nth: 9) [ 846.985379] FAULT_INJECTION: forcing a failure. [ 846.985379] name failslab, interval 1, probability 0, space 0, times 0 [ 846.987100] CPU: 0 PID: 6771 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 846.988076] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 846.989097] Call Trace: [ 846.989510] dump_stack+0x107/0x167 [ 846.990049] should_fail.cold+0x5/0xa [ 846.990609] ? alloc_fs_context+0x57/0x840 [ 846.991233] should_failslab+0x5/0x20 [ 846.991786] kmem_cache_alloc_trace+0x55/0x320 [ 846.992458] alloc_fs_context+0x57/0x840 [ 846.993054] path_mount+0xaa3/0x2120 [ 846.993609] ? strncpy_from_user+0x9e/0x470 [ 846.994234] ? finish_automount+0xa90/0xa90 [ 846.994865] ? getname_flags.part.0+0x1dd/0x4f0 [ 846.995536] ? _copy_from_user+0xfb/0x1b0 [ 846.996135] __x64_sys_mount+0x282/0x300 [ 846.996720] ? copy_mnt_ns+0xa00/0xa00 [ 846.997287] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 846.998048] ? syscall_enter_from_user_mode+0x1d/0x50 [ 846.998805] do_syscall_64+0x33/0x40 [ 846.999336] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 847.000080] RIP: 0033:0x7f0ec334eb19 [ 847.000535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 847.003175] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 847.004273] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 847.005144] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 847.006183] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 847.007055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 847.008076] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:54:04 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 847.029230] loop5: detected capacity change from 0 to 33559552 [ 847.072886] FAULT_INJECTION: forcing a failure. [ 847.072886] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 847.076039] CPU: 1 PID: 6777 Comm: syz-executor.6 Not tainted 5.10.237 #1 [ 847.077714] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 847.079487] Call Trace: [ 847.080205] dump_stack+0x107/0x167 [ 847.080993] should_fail.cold+0x5/0xa [ 847.081829] _copy_to_user+0x2e/0x180 [ 847.082649] simple_read_from_buffer+0xcc/0x160 [ 847.083763] proc_fail_nth_read+0x198/0x230 [ 847.084815] ? proc_sessionid_read+0x230/0x230 [ 847.085906] ? security_file_permission+0xb1/0xe0 [ 847.087210] ? proc_sessionid_read+0x230/0x230 [ 847.088303] vfs_read+0x228/0x620 [ 847.089141] ksys_read+0x12d/0x260 [ 847.090126] ? vfs_write+0xb10/0xb10 [ 847.090931] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 847.092216] ? syscall_enter_from_user_mode+0x1d/0x50 [ 847.093456] do_syscall_64+0x33/0x40 [ 847.094482] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 847.095664] RIP: 0033:0x7f70cebe369c [ 847.096569] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 847.100999] RSP: 002b:00007f70cc1a6170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 847.102842] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f70cebe369c [ 847.104564] RDX: 000000000000000f RSI: 00007f70cc1a61e0 RDI: 0000000000000004 [ 847.106282] RBP: 00007f70cc1a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 847.107998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 847.109721] R13: 00007ffd21e2bd3f R14: 00007f70cc1a6300 R15: 0000000000022000 02:54:04 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 11) 02:54:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) truncate(0x0, 0x1) [ 847.189006] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 847.219901] FAULT_INJECTION: forcing a failure. [ 847.219901] name failslab, interval 1, probability 0, space 0, times 0 [ 847.221756] CPU: 0 PID: 6782 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 847.222732] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 847.223956] Call Trace: [ 847.224301] dump_stack+0x107/0x167 [ 847.224868] should_fail.cold+0x5/0xa [ 847.225488] ? create_object.isra.0+0x3a/0xa20 [ 847.226181] should_failslab+0x5/0x20 [ 847.226734] kmem_cache_alloc+0x5b/0x310 [ 847.227334] create_object.isra.0+0x3a/0xa20 [ 847.227971] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 847.228727] kmem_cache_alloc_trace+0x151/0x320 [ 847.229419] alloc_fs_context+0x57/0x840 [ 847.230005] path_mount+0xaa3/0x2120 [ 847.230542] ? strncpy_from_user+0x9e/0x470 [ 847.231164] ? finish_automount+0xa90/0xa90 [ 847.231785] ? getname_flags.part.0+0x1dd/0x4f0 [ 847.232460] ? _copy_from_user+0xfb/0x1b0 [ 847.233067] __x64_sys_mount+0x282/0x300 [ 847.233653] ? copy_mnt_ns+0xa00/0xa00 [ 847.234210] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 847.234957] ? syscall_enter_from_user_mode+0x1d/0x50 [ 847.235701] do_syscall_64+0x33/0x40 [ 847.236243] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 847.236981] RIP: 0033:0x7f0ec334eb19 [ 847.237448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 847.240095] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 847.241197] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 847.242230] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 847.243110] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 847.244126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 847.245010] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:54:17 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 12) 02:54:17 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e2", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:54:17 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:54:17 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:54:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:54:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:54:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:54:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) truncate(0x0, 0x1) [ 859.880015] loop4: detected capacity change from 0 to 33559552 [ 859.895478] FAT-fs (loop4): invalid media value (0x00) [ 859.896676] FAT-fs (loop4): Can't find a valid FAT filesystem [ 859.916524] FAULT_INJECTION: forcing a failure. [ 859.916524] name failslab, interval 1, probability 0, space 0, times 0 [ 859.919201] CPU: 0 PID: 6792 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 859.920787] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 859.922722] Call Trace: [ 859.923342] dump_stack+0x107/0x167 [ 859.924197] should_fail.cold+0x5/0xa [ 859.925089] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 859.926328] should_failslab+0x5/0x20 [ 859.927212] __kmalloc_node+0x76/0x420 [ 859.928114] ? lock_downgrade+0x6d0/0x6d0 [ 859.929075] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 859.930235] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 859.931373] ? trace_hardirqs_on+0x5b/0x180 [ 859.932359] kmem_cache_alloc_trace+0x169/0x320 [ 859.933427] alloc_fs_context+0x57/0x840 [ 859.934363] path_mount+0xaa3/0x2120 [ 859.935213] ? strncpy_from_user+0x9e/0x470 [ 859.936185] ? finish_automount+0xa90/0xa90 [ 859.937166] ? getname_flags.part.0+0x1dd/0x4f0 [ 859.938229] ? _copy_from_user+0xfb/0x1b0 [ 859.939173] __x64_sys_mount+0x282/0x300 [ 859.940101] ? copy_mnt_ns+0xa00/0xa00 [ 859.940995] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 859.942207] ? syscall_enter_from_user_mode+0x1d/0x50 [ 859.942938] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 859.943407] do_syscall_64+0x33/0x40 [ 859.943433] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 859.947973] RIP: 0033:0x7f0ec334eb19 [ 859.948834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 859.953105] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 859.954871] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 859.956511] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 859.958173] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 859.959822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 859.961465] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 859.963559] loop2: detected capacity change from 0 to 33559552 [ 859.969799] loop1: detected capacity change from 0 to 33559552 02:54:17 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e2", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 859.976760] loop6: detected capacity change from 0 to 33559552 [ 859.986189] loop5: detected capacity change from 0 to 33559552 [ 859.995376] FAT-fs (loop1): bogus number of reserved sectors [ 859.997059] FAT-fs (loop1): Can't find a valid FAT filesystem [ 859.998511] FAT-fs (loop2): bogus number of reserved sectors [ 859.999872] FAT-fs (loop2): Can't find a valid FAT filesystem 02:54:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) truncate(0x0, 0x1) 02:54:17 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:54:17 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x2) [ 860.196123] loop5: detected capacity change from 0 to 33559552 02:54:17 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 13) [ 860.270973] loop6: detected capacity change from 0 to 33559552 [ 860.293230] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 860.337329] FAULT_INJECTION: forcing a failure. [ 860.337329] name failslab, interval 1, probability 0, space 0, times 0 [ 860.339770] CPU: 1 PID: 6828 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 860.341218] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 860.342969] Call Trace: [ 860.343537] dump_stack+0x107/0x167 [ 860.344316] should_fail.cold+0x5/0xa [ 860.345130] ? create_object.isra.0+0x3a/0xa20 [ 860.346121] should_failslab+0x5/0x20 [ 860.347244] kmem_cache_alloc+0x5b/0x310 [ 860.348187] create_object.isra.0+0x3a/0xa20 [ 860.349123] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 860.350229] kmem_cache_alloc_trace+0x151/0x320 [ 860.351238] ? lockdep_init_map_type+0x2c7/0x780 [ 860.352374] legacy_init_fs_context+0x44/0xe0 [ 860.353490] ? generic_parse_monolithic+0x1f0/0x1f0 [ 860.354566] alloc_fs_context+0x4fd/0x840 [ 860.355456] path_mount+0xaa3/0x2120 [ 860.356260] ? strncpy_from_user+0x9e/0x470 [ 860.357184] ? finish_automount+0xa90/0xa90 [ 860.358324] ? getname_flags.part.0+0x1dd/0x4f0 [ 860.359431] ? _copy_from_user+0xfb/0x1b0 [ 860.360326] __x64_sys_mount+0x282/0x300 [ 860.361191] ? copy_mnt_ns+0xa00/0xa00 [ 860.362041] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 860.363363] ? syscall_enter_from_user_mode+0x1d/0x50 [ 860.364470] do_syscall_64+0x33/0x40 [ 860.365266] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 860.366366] RIP: 0033:0x7f0ec334eb19 [ 860.367157] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 860.371448] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 860.373286] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 860.374944] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 860.376708] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 860.378394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 860.380169] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:54:17 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e2", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:54:17 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x4) 02:54:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x0) 02:54:18 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 14) [ 860.522335] loop5: detected capacity change from 0 to 33559552 02:54:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:54:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x0) 02:54:18 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558f", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 860.572157] loop6: detected capacity change from 0 to 33559552 02:54:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 860.605310] loop5: detected capacity change from 0 to 33559552 [ 860.608859] FAULT_INJECTION: forcing a failure. [ 860.608859] name failslab, interval 1, probability 0, space 0, times 0 [ 860.611295] CPU: 1 PID: 6839 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 860.612755] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 860.614536] Call Trace: [ 860.615099] dump_stack+0x107/0x167 [ 860.615878] should_fail.cold+0x5/0xa [ 860.616692] ? v9fs_mount+0x5a/0x8f0 [ 860.617491] should_failslab+0x5/0x20 [ 860.618326] kmem_cache_alloc_trace+0x55/0x320 [ 860.619308] ? v9fs_write_inode+0x60/0x60 [ 860.620191] v9fs_mount+0x5a/0x8f0 [ 860.620953] ? v9fs_write_inode+0x60/0x60 [ 860.621846] legacy_get_tree+0x105/0x220 [ 860.622709] vfs_get_tree+0x8e/0x300 [ 860.623494] path_mount+0x1429/0x2120 [ 860.624315] ? strncpy_from_user+0x9e/0x470 [ 860.625237] ? finish_automount+0xa90/0xa90 [ 860.626169] ? getname_flags.part.0+0x1dd/0x4f0 [ 860.627170] ? _copy_from_user+0xfb/0x1b0 [ 860.628068] __x64_sys_mount+0x282/0x300 [ 860.628937] ? copy_mnt_ns+0xa00/0xa00 [ 860.629787] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 860.630911] ? syscall_enter_from_user_mode+0x1d/0x50 [ 860.632017] do_syscall_64+0x33/0x40 [ 860.632815] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 860.633902] RIP: 0033:0x7f0ec334eb19 [ 860.634704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 860.638656] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 860.640314] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 860.641850] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 860.643369] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 860.644889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 860.646420] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 860.655932] loop1: detected capacity change from 0 to 33559552 [ 860.670559] FAT-fs (loop1): invalid media value (0x00) [ 860.671835] FAT-fs (loop1): Can't find a valid FAT filesystem [ 860.675861] loop4: detected capacity change from 0 to 33559552 [ 860.682249] FAT-fs (loop4): invalid media value (0x00) [ 860.683470] FAT-fs (loop4): Can't find a valid FAT filesystem 02:54:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x5) 02:54:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:54:31 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:54:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:54:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x0) 02:54:31 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 15) 02:54:31 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558f", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:54:31 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e2", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 873.756347] loop6: detected capacity change from 0 to 33559552 [ 873.783748] loop1: detected capacity change from 0 to 33559552 [ 873.786884] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 873.786938] FAULT_INJECTION: forcing a failure. [ 873.786938] name failslab, interval 1, probability 0, space 0, times 0 [ 873.791178] CPU: 1 PID: 6870 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 873.792052] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.793143] Call Trace: [ 873.793485] dump_stack+0x107/0x167 [ 873.793963] should_fail.cold+0x5/0xa [ 873.794471] ? create_object.isra.0+0x3a/0xa20 [ 873.795075] should_failslab+0x5/0x20 [ 873.795567] kmem_cache_alloc+0x5b/0x310 [ 873.796092] ? cred_has_capability.isra.0+0x152/0x2b0 [ 873.796748] create_object.isra.0+0x3a/0xa20 [ 873.797312] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 873.797990] kmem_cache_alloc_trace+0x151/0x320 [ 873.798586] ? v9fs_write_inode+0x60/0x60 [ 873.799123] v9fs_mount+0x5a/0x8f0 [ 873.799575] ? v9fs_write_inode+0x60/0x60 [ 873.800106] legacy_get_tree+0x105/0x220 [ 873.800625] vfs_get_tree+0x8e/0x300 [ 873.801111] path_mount+0x1429/0x2120 [ 873.801601] ? strncpy_from_user+0x9e/0x470 [ 873.802163] ? finish_automount+0xa90/0xa90 [ 873.802716] ? getname_flags.part.0+0x1dd/0x4f0 [ 873.803324] ? _copy_from_user+0xfb/0x1b0 [ 873.803858] __x64_sys_mount+0x282/0x300 [ 873.804375] ? copy_mnt_ns+0xa00/0xa00 [ 873.804877] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 873.805550] ? syscall_enter_from_user_mode+0x1d/0x50 [ 873.806222] do_syscall_64+0x33/0x40 [ 873.806702] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 873.807366] RIP: 0033:0x7f0ec334eb19 [ 873.807847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.810246] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 873.811216] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 873.812153] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 873.813061] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 873.813988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 873.814908] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 873.827670] FAT-fs (loop1): invalid media value (0x00) [ 873.828353] FAT-fs (loop1): Can't find a valid FAT filesystem 02:54:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 873.836779] loop4: detected capacity change from 0 to 33559552 [ 873.841744] loop5: detected capacity change from 0 to 33559552 [ 873.851458] FAT-fs (loop4): invalid media value (0x00) [ 873.852408] FAT-fs (loop4): Can't find a valid FAT filesystem 02:54:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0xf) [ 873.862760] loop2: detected capacity change from 0 to 33559552 02:54:31 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:54:31 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558f", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 873.917609] FAT-fs (loop2): invalid media value (0x00) [ 873.918282] FAT-fs (loop2): Can't find a valid FAT filesystem [ 873.966351] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:54:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x10) 02:54:31 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:54:31 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558f", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:54:31 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:54:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x28) 02:54:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x8800000) [ 874.166230] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 888.289417] loop6: detected capacity change from 0 to 33559552 [ 888.305096] FAULT_INJECTION: forcing a failure. [ 888.305096] name failslab, interval 1, probability 0, space 0, times 0 [ 888.307782] CPU: 0 PID: 6918 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 888.309576] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 888.311510] Call Trace: [ 888.312130] dump_stack+0x107/0x167 [ 888.312983] should_fail.cold+0x5/0xa [ 888.313878] should_failslab+0x5/0x20 [ 888.314759] __kmalloc_track_caller+0x79/0x370 [ 888.315815] ? v9fs_session_init+0xa7/0x1680 [ 888.316828] ? kernel_text_address+0xf2/0x120 [ 888.317877] kstrdup+0x36/0x70 [ 888.318638] v9fs_session_init+0xa7/0x1680 [ 888.319614] ? lock_release+0x680/0x680 [ 888.320529] ? find_held_lock+0x2c/0x110 [ 888.321472] ? kmem_cache_alloc_trace+0x151/0x320 [ 888.322605] ? v9fs_show_options+0x690/0x690 [ 888.323623] ? trace_hardirqs_on+0x5b/0x180 [ 888.324622] ? kasan_unpoison_shadow+0x33/0x50 [ 888.325674] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 888.326853] v9fs_mount+0x79/0x8f0 [ 888.327669] ? v9fs_write_inode+0x60/0x60 [ 888.328625] legacy_get_tree+0x105/0x220 [ 888.329534] vfs_get_tree+0x8e/0x300 [ 888.330394] path_mount+0x1429/0x2120 [ 888.331270] ? strncpy_from_user+0x9e/0x470 [ 888.332266] ? finish_automount+0xa90/0xa90 [ 888.333261] ? getname_flags.part.0+0x1dd/0x4f0 [ 888.334343] ? _copy_from_user+0xfb/0x1b0 [ 888.335308] __x64_sys_mount+0x282/0x300 [ 888.336241] ? copy_mnt_ns+0xa00/0xa00 [ 888.337141] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 888.338362] ? syscall_enter_from_user_mode+0x1d/0x50 [ 888.339554] do_syscall_64+0x33/0x40 [ 888.340417] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 888.341569] RIP: 0033:0x7f0ec334eb19 [ 888.342431] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 888.346685] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 888.348427] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 888.350094] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 888.351752] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 888.353395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 888.354409] loop2: detected capacity change from 0 to 33559552 [ 888.355043] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:54:45 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 16) 02:54:45 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:54:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:54:45 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:54:45 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:54:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:54:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:54:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0xffffffff000) [ 888.363763] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 888.368720] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:54:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) openat(r0, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) openat(r0, &(0x7f0000000040)='./file1\x00', 0x4a02e2, 0xae) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 888.379212] FAT-fs (loop2): bogus number of reserved sectors [ 888.380641] FAT-fs (loop2): Can't find a valid FAT filesystem [ 888.387676] loop4: detected capacity change from 0 to 33559552 [ 888.405396] loop1: detected capacity change from 0 to 33559552 [ 888.415869] FAT-fs (loop1): invalid media value (0x00) [ 888.417223] FAT-fs (loop1): Can't find a valid FAT filesystem [ 888.418873] FAT-fs (loop4): invalid media value (0x00) [ 888.420137] FAT-fs (loop4): Can't find a valid FAT filesystem 02:54:45 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:54:45 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 888.464966] loop6: detected capacity change from 0 to 33559552 [ 888.520075] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:55:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:55:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) openat(r0, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) openat(r0, &(0x7f0000000040)='./file1\x00', 0x4a02e2, 0xae) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 902.511854] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:55:00 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:55:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) openat(r0, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x8) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100), 0x202000, 0x0) pidfd_getfd(r1, r2, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x121000, 0xa0) 02:55:00 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 17) 02:55:00 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 902.521529] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:55:00 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:55:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 902.530733] FAULT_INJECTION: forcing a failure. [ 902.530733] name failslab, interval 1, probability 0, space 0, times 0 [ 902.533608] CPU: 0 PID: 6964 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 902.535302] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 902.537338] Call Trace: [ 902.537995] dump_stack+0x107/0x167 [ 902.538890] should_fail.cold+0x5/0xa [ 902.539827] ? create_object.isra.0+0x3a/0xa20 [ 902.540951] should_failslab+0x5/0x20 [ 902.541884] kmem_cache_alloc+0x5b/0x310 [ 902.542895] create_object.isra.0+0x3a/0xa20 [ 902.543973] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 902.545224] __kmalloc_track_caller+0x177/0x370 [ 902.546381] ? v9fs_session_init+0xa7/0x1680 [ 902.547465] ? kernel_text_address+0xf2/0x120 [ 902.548571] kstrdup+0x36/0x70 [ 902.549362] v9fs_session_init+0xa7/0x1680 [ 902.550413] ? lock_release+0x680/0x680 [ 902.551389] ? find_held_lock+0x2c/0x110 [ 902.552392] ? kmem_cache_alloc_trace+0x151/0x320 [ 902.553576] ? v9fs_show_options+0x690/0x690 [ 902.554669] ? trace_hardirqs_on+0x5b/0x180 [ 902.555724] ? kasan_unpoison_shadow+0x33/0x50 [ 902.556848] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 902.558111] v9fs_mount+0x79/0x8f0 [ 902.558986] ? v9fs_write_inode+0x60/0x60 [ 902.560014] legacy_get_tree+0x105/0x220 [ 902.561021] vfs_get_tree+0x8e/0x300 [ 902.561938] path_mount+0x1429/0x2120 [ 902.562905] ? strncpy_from_user+0x9e/0x470 [ 902.563969] ? finish_automount+0xa90/0xa90 [ 902.565034] ? getname_flags.part.0+0x1dd/0x4f0 [ 902.566194] ? _copy_from_user+0xfb/0x1b0 [ 902.567224] __x64_sys_mount+0x282/0x300 [ 902.568222] ? copy_mnt_ns+0xa00/0xa00 [ 902.569186] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 902.570492] ? syscall_enter_from_user_mode+0x1d/0x50 [ 902.571766] do_syscall_64+0x33/0x40 [ 902.572687] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 902.573951] RIP: 0033:0x7f0ec334eb19 [ 902.574888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 902.579457] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 902.581355] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 902.583138] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 902.584912] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 902.586695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 902.588468] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 902.594557] loop1: detected capacity change from 0 to 33559552 02:55:00 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() 02:55:00 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 902.617703] loop6: detected capacity change from 0 to 33559552 [ 902.619419] loop2: detected capacity change from 0 to 33559552 02:55:00 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 902.640566] loop4: detected capacity change from 0 to 33559552 [ 902.644621] FAT-fs (loop6): Unrecognized mount option "./file1" or missing value [ 902.652446] FAT-fs (loop4): bogus number of FAT sectors [ 902.653131] FAT-fs (loop4): Can't find a valid FAT filesystem 02:55:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) openat(r0, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) openat(r0, &(0x7f0000000040)='./file1\x00', 0x4a02e2, 0xae) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 902.678708] loop6: detected capacity change from 0 to 33559552 [ 902.680739] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 902.685263] FAT-fs (loop6): Unrecognized mount option "./file1" or missing value [ 902.689752] FAT-fs (loop1): invalid media value (0x00) [ 902.691238] FAT-fs (loop1): Can't find a valid FAT filesystem [ 902.721013] loop2: detected capacity change from 0 to 33559552 02:55:00 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 18) [ 902.756669] FAULT_INJECTION: forcing a failure. [ 902.756669] name failslab, interval 1, probability 0, space 0, times 0 [ 902.758017] CPU: 1 PID: 6994 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 902.758822] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 902.759798] Call Trace: [ 902.760109] dump_stack+0x107/0x167 [ 902.760544] should_fail.cold+0x5/0xa [ 902.760990] should_failslab+0x5/0x20 [ 902.761435] __kmalloc_track_caller+0x79/0x370 [ 902.761966] ? v9fs_session_init+0xe9/0x1680 [ 902.762473] ? kernel_text_address+0xf2/0x120 [ 902.762998] kstrdup+0x36/0x70 [ 902.763376] v9fs_session_init+0xe9/0x1680 [ 902.763888] ? lock_release+0x680/0x680 [ 902.764473] ? find_held_lock+0x2c/0x110 [ 902.764995] ? kmem_cache_alloc_trace+0x151/0x320 [ 902.765625] ? v9fs_show_options+0x690/0x690 [ 902.766158] ? trace_hardirqs_on+0x5b/0x180 [ 902.766660] ? kasan_unpoison_shadow+0x33/0x50 [ 902.767175] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 902.767828] v9fs_mount+0x79/0x8f0 [ 902.768296] ? v9fs_write_inode+0x60/0x60 [ 902.768766] legacy_get_tree+0x105/0x220 [ 902.769243] vfs_get_tree+0x8e/0x300 [ 902.769777] path_mount+0x1429/0x2120 [ 902.770364] ? strncpy_from_user+0x9e/0x470 [ 902.770866] ? finish_automount+0xa90/0xa90 [ 902.771398] ? getname_flags.part.0+0x1dd/0x4f0 [ 902.772038] ? _copy_from_user+0xfb/0x1b0 [ 902.772533] __x64_sys_mount+0x282/0x300 [ 902.773079] ? copy_mnt_ns+0xa00/0xa00 [ 902.773521] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 902.774146] ? syscall_enter_from_user_mode+0x1d/0x50 [ 902.774737] do_syscall_64+0x33/0x40 [ 902.775171] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 902.775747] RIP: 0033:0x7f0ec334eb19 [ 902.776179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 902.778386] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 902.779387] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 902.780216] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 902.781169] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 902.782091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 902.782922] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:55:00 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 19) 02:55:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file0\x00', 0x56) [ 902.858744] loop6: detected capacity change from 0 to 33559552 [ 902.881707] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 902.960933] FAULT_INJECTION: forcing a failure. [ 902.960933] name failslab, interval 1, probability 0, space 0, times 0 [ 902.962268] CPU: 1 PID: 7000 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 902.963070] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 902.964028] Call Trace: [ 902.964350] dump_stack+0x107/0x167 [ 902.964793] should_fail.cold+0x5/0xa [ 902.965255] ? create_object.isra.0+0x3a/0xa20 [ 902.965798] should_failslab+0x5/0x20 [ 902.966247] kmem_cache_alloc+0x5b/0x310 [ 902.966723] create_object.isra.0+0x3a/0xa20 [ 902.967237] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 902.967814] __kmalloc_track_caller+0x177/0x370 [ 902.968363] ? v9fs_session_init+0xe9/0x1680 [ 902.968862] ? kernel_text_address+0xf2/0x120 [ 902.969392] kstrdup+0x36/0x70 [ 902.969755] v9fs_session_init+0xe9/0x1680 [ 902.970262] ? lock_release+0x680/0x680 [ 902.970724] ? find_held_lock+0x2c/0x110 [ 902.971189] ? kmem_cache_alloc_trace+0x151/0x320 [ 902.971755] ? v9fs_show_options+0x690/0x690 [ 902.972275] ? trace_hardirqs_on+0x5b/0x180 [ 902.972777] ? kasan_unpoison_shadow+0x33/0x50 [ 902.973312] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 902.973888] v9fs_mount+0x79/0x8f0 [ 902.974311] ? v9fs_write_inode+0x60/0x60 [ 902.974782] legacy_get_tree+0x105/0x220 [ 902.975258] vfs_get_tree+0x8e/0x300 [ 902.975680] path_mount+0x1429/0x2120 [ 902.976128] ? strncpy_from_user+0x9e/0x470 [ 902.976635] ? finish_automount+0xa90/0xa90 [ 902.977135] ? getname_flags.part.0+0x1dd/0x4f0 [ 902.977679] ? _copy_from_user+0xfb/0x1b0 [ 902.978179] __x64_sys_mount+0x282/0x300 [ 902.978640] ? copy_mnt_ns+0xa00/0xa00 [ 902.979097] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 902.979715] ? syscall_enter_from_user_mode+0x1d/0x50 [ 902.980316] do_syscall_64+0x33/0x40 [ 902.980740] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 902.981337] RIP: 0033:0x7f0ec334eb19 [ 902.981758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 902.983921] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 902.984784] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 902.985620] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 902.986466] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 902.987297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 902.988134] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:55:14 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 20) 02:55:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:55:14 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) 02:55:14 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:55:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000240)=@v2={0x3, 0x0, 0x4, 0x80, 0x4e, "f20d2c8312fe608c601d83be2a72bcafd5aaa3a13d367385d9540b685e9fcaeb9ce1fffa3444a76ff8606e561dd1b232c7c3e456d8a1ce52bca818d4354ee6dab8960159afbda5cd97ded87816ee"}, 0x57, 0x1) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:55:14 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 916.900571] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:55:14 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:55:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 916.916417] loop6: detected capacity change from 0 to 33559552 [ 916.930621] loop4: detected capacity change from 0 to 33559552 [ 916.932838] FAULT_INJECTION: forcing a failure. [ 916.932838] name failslab, interval 1, probability 0, space 0, times 0 [ 916.933840] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 916.934380] CPU: 0 PID: 7025 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 916.937764] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 916.938903] Call Trace: [ 916.939262] dump_stack+0x107/0x167 [ 916.939759] should_fail.cold+0x5/0xa [ 916.940258] ? p9_client_create+0xaf/0x1230 [ 916.940831] should_failslab+0x5/0x20 [ 916.941339] kmem_cache_alloc_trace+0x55/0x320 [ 916.941937] ? find_held_lock+0x2c/0x110 [ 916.942494] p9_client_create+0xaf/0x1230 [ 916.943035] ? lock_downgrade+0x6d0/0x6d0 [ 916.943583] ? p9_client_flush+0x430/0x430 [ 916.944138] ? trace_hardirqs_on+0x5b/0x180 [ 916.944730] ? lockdep_init_map_type+0x2c7/0x780 [ 916.945353] ? __raw_spin_lock_init+0x36/0x110 [ 916.945952] v9fs_session_init+0x1dd/0x1680 [ 916.946540] ? lock_release+0x680/0x680 [ 916.947063] ? kmem_cache_alloc_trace+0x151/0x320 [ 916.947690] ? v9fs_show_options+0x690/0x690 [ 916.948280] ? trace_hardirqs_on+0x5b/0x180 [ 916.948845] ? kasan_unpoison_shadow+0x33/0x50 [ 916.949439] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 916.950099] v9fs_mount+0x79/0x8f0 [ 916.950582] ? v9fs_write_inode+0x60/0x60 [ 916.951148] legacy_get_tree+0x105/0x220 [ 916.951671] vfs_get_tree+0x8e/0x300 [ 916.952162] path_mount+0x1429/0x2120 [ 916.952659] ? strncpy_from_user+0x9e/0x470 [ 916.953222] ? finish_automount+0xa90/0xa90 [ 916.953777] ? getname_flags.part.0+0x1dd/0x4f0 [ 916.954397] ? _copy_from_user+0xfb/0x1b0 [ 916.954953] __x64_sys_mount+0x282/0x300 [ 916.955482] ? copy_mnt_ns+0xa00/0xa00 [ 916.956001] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 916.956700] ? syscall_enter_from_user_mode+0x1d/0x50 [ 916.957375] do_syscall_64+0x33/0x40 [ 916.957870] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 916.958562] RIP: 0033:0x7f0ec334eb19 [ 916.959048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 916.961458] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 916.962494] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 916.963435] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 916.964383] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 916.965310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 916.966336] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 916.967520] loop1: detected capacity change from 0 to 33559552 02:55:14 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) [ 916.980748] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 916.983771] FAT-fs (loop4): bogus number of FAT sectors [ 916.984943] FAT-fs (loop4): Can't find a valid FAT filesystem [ 916.990771] FAT-fs (loop1): invalid media value (0x00) [ 916.991463] FAT-fs (loop1): Can't find a valid FAT filesystem 02:55:14 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, 0x0, &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:55:14 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:55:14 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 21) [ 917.067009] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 917.078377] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:55:14 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:55:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020801000470000000f80165dfe34a635c19964b6e1b69d445813a2801951f1b2cff53b78677e8f55286632c8cc22ca44506789dce7bd938ba4ec7f10f7486f7d6", 0x4d}, {0x0, 0x0, 0x1000a00}], 0xc00528, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 917.127833] FAULT_INJECTION: forcing a failure. [ 917.127833] name failslab, interval 1, probability 0, space 0, times 0 [ 917.129290] CPU: 0 PID: 7040 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 917.130267] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 917.131278] Call Trace: [ 917.131605] dump_stack+0x107/0x167 [ 917.132047] should_fail.cold+0x5/0xa [ 917.132513] ? create_object.isra.0+0x3a/0xa20 [ 917.133080] should_failslab+0x5/0x20 [ 917.133550] kmem_cache_alloc+0x5b/0x310 [ 917.134056] ? kernel_text_address+0xf2/0x120 [ 917.134645] create_object.isra.0+0x3a/0xa20 [ 917.135187] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 917.135814] kmem_cache_alloc_trace+0x151/0x320 [ 917.136384] p9_client_create+0xaf/0x1230 [ 917.136892] ? lock_downgrade+0x6d0/0x6d0 [ 917.137403] ? p9_client_flush+0x430/0x430 [ 917.137919] ? trace_hardirqs_on+0x5b/0x180 [ 917.138466] ? lockdep_init_map_type+0x2c7/0x780 [ 917.139052] ? __raw_spin_lock_init+0x36/0x110 [ 917.139618] v9fs_session_init+0x1dd/0x1680 [ 917.140146] ? lock_release+0x680/0x680 [ 917.140636] ? kmem_cache_alloc_trace+0x151/0x320 [ 917.141223] ? v9fs_show_options+0x690/0x690 [ 917.141765] ? trace_hardirqs_on+0x5b/0x180 [ 917.142306] ? kasan_unpoison_shadow+0x33/0x50 [ 917.142864] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 917.143485] v9fs_mount+0x79/0x8f0 [ 917.143925] ? v9fs_write_inode+0x60/0x60 [ 917.144436] legacy_get_tree+0x105/0x220 [ 917.144934] vfs_get_tree+0x8e/0x300 [ 917.145387] path_mount+0x1429/0x2120 [ 917.145864] ? strncpy_from_user+0x9e/0x470 [ 917.146404] ? finish_automount+0xa90/0xa90 [ 917.146937] ? getname_flags.part.0+0x1dd/0x4f0 [ 917.147507] ? _copy_from_user+0xfb/0x1b0 [ 917.148017] __x64_sys_mount+0x282/0x300 [ 917.148518] ? copy_mnt_ns+0xa00/0xa00 [ 917.148998] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 917.149653] ? syscall_enter_from_user_mode+0x1d/0x50 [ 917.150305] do_syscall_64+0x33/0x40 [ 917.150760] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 917.151388] RIP: 0033:0x7f0ec334eb19 [ 917.151850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 917.154097] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 917.155052] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 917.155926] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 917.156800] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 917.157677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 917.158582] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 917.209448] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:55:27 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 22) 02:55:27 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, 0x0, &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:55:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:55:27 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:55:27 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 02:55:27 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:55:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:55:27 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 929.521863] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 929.523931] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 929.534229] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 929.535878] FAULT_INJECTION: forcing a failure. [ 929.535878] name failslab, interval 1, probability 0, space 0, times 0 [ 929.537434] loop1: detected capacity change from 0 to 33559552 [ 929.538306] CPU: 0 PID: 7066 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 929.540410] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 929.541479] Call Trace: [ 929.541822] dump_stack+0x107/0x167 [ 929.542295] should_fail.cold+0x5/0xa [ 929.542784] should_failslab+0x5/0x20 [ 929.543271] __kmalloc_track_caller+0x79/0x370 [ 929.543854] ? p9_client_create+0x41d/0x1230 [ 929.544423] kstrdup+0x36/0x70 [ 929.544834] p9_client_create+0x41d/0x1230 [ 929.545398] ? lock_downgrade+0x6d0/0x6d0 [ 929.545927] ? p9_client_flush+0x430/0x430 [ 929.546345] FAT-fs (loop1): invalid media value (0x00) [ 929.546485] ? trace_hardirqs_on+0x5b/0x180 [ 929.546497] ? lockdep_init_map_type+0x2c7/0x780 [ 929.546515] ? __raw_spin_lock_init+0x36/0x110 [ 929.547669] FAT-fs (loop1): Can't find a valid FAT filesystem [ 929.548165] v9fs_session_init+0x1dd/0x1680 [ 929.551001] ? lock_release+0x680/0x680 [ 929.551514] ? kmem_cache_alloc_trace+0x151/0x320 [ 929.552133] ? v9fs_show_options+0x690/0x690 [ 929.552698] ? trace_hardirqs_on+0x5b/0x180 [ 929.553246] ? kasan_unpoison_shadow+0x33/0x50 [ 929.553829] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 929.554489] v9fs_mount+0x79/0x8f0 [ 929.554940] ? v9fs_write_inode+0x60/0x60 [ 929.555469] legacy_get_tree+0x105/0x220 [ 929.555994] vfs_get_tree+0x8e/0x300 [ 929.556466] path_mount+0x1429/0x2120 [ 929.556943] ? strncpy_from_user+0x9e/0x470 [ 929.557491] ? finish_automount+0xa90/0xa90 [ 929.558044] ? getname_flags.part.0+0x1dd/0x4f0 [ 929.558637] ? _copy_from_user+0xfb/0x1b0 [ 929.559168] __x64_sys_mount+0x282/0x300 [ 929.559683] ? copy_mnt_ns+0xa00/0xa00 [ 929.560174] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 929.560847] ? syscall_enter_from_user_mode+0x1d/0x50 [ 929.561498] do_syscall_64+0x33/0x40 [ 929.561969] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 929.562621] RIP: 0033:0x7f0ec334eb19 [ 929.563082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 929.565403] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 929.566368] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 929.567252] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 929.568139] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 929.569042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 929.569949] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 929.577886] loop6: detected capacity change from 0 to 33559552 [ 929.586838] loop4: detected capacity change from 0 to 33559552 [ 929.599650] FAT-fs (loop4): bogus number of FAT sectors [ 929.600444] FAT-fs (loop4): Can't find a valid FAT filesystem 02:55:27 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) [ 929.635347] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:55:27 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, 0x0, &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:55:27 executing program 6: connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x10) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17, 0x4}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000040)='./file1\x00', 0x4c) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:55:27 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:55:27 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() 02:55:27 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 929.752917] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 929.787085] loop6: detected capacity change from 0 to 33559552 [ 929.792719] FAT-fs (loop6): Unrecognized mount option "" or missing value 02:55:27 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 23) 02:55:27 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 929.827091] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 929.840052] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:55:27 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) 02:55:27 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x7, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)=ANY=[@ANYRESOCT, @ANYBLOB="b527afb1ff53782a8f8e3b5e64cdfcbd32dee5f9b1c0e819506eb24c9e9675"]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 929.857606] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 929.894042] FAULT_INJECTION: forcing a failure. [ 929.894042] name failslab, interval 1, probability 0, space 0, times 0 [ 929.896453] CPU: 1 PID: 7096 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 929.897877] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 929.899670] Call Trace: [ 929.900230] dump_stack+0x107/0x167 [ 929.901000] should_fail.cold+0x5/0xa [ 929.901835] should_failslab+0x5/0x20 [ 929.902639] __kmalloc_track_caller+0x79/0x370 [ 929.903600] ? p9_client_create+0x41d/0x1230 [ 929.904527] kstrdup+0x36/0x70 [ 929.905206] p9_client_create+0x41d/0x1230 [ 929.906089] ? lock_downgrade+0x6d0/0x6d0 [ 929.906998] ? p9_client_flush+0x430/0x430 [ 929.907901] ? trace_hardirqs_on+0x5b/0x180 [ 929.908817] ? lockdep_init_map_type+0x2c7/0x780 [ 929.909812] ? __raw_spin_lock_init+0x36/0x110 [ 929.910791] v9fs_session_init+0x1dd/0x1680 [ 929.911703] ? lock_release+0x680/0x680 [ 929.912546] ? kmem_cache_alloc_trace+0x151/0x320 [ 929.912800] FAT-fs (loop6): Unrecognized mount option "01777777777777777777777µ'¯±ÿSx*Ž;^dÍü½2Þåù±ÀèPn²Lž–u" or missing value [ 929.913555] ? v9fs_show_options+0x690/0x690 [ 929.915902] ? trace_hardirqs_on+0x5b/0x180 [ 929.916823] ? kasan_unpoison_shadow+0x33/0x50 [ 929.917794] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 929.918876] v9fs_mount+0x79/0x8f0 [ 929.919614] ? v9fs_write_inode+0x60/0x60 [ 929.920485] legacy_get_tree+0x105/0x220 [ 929.921344] vfs_get_tree+0x8e/0x300 [ 929.922123] path_mount+0x1429/0x2120 [ 929.922935] ? strncpy_from_user+0x9e/0x470 [ 929.923847] ? finish_automount+0xa90/0xa90 [ 929.924745] ? getname_flags.part.0+0x1dd/0x4f0 [ 929.925737] ? _copy_from_user+0xfb/0x1b0 [ 929.926618] __x64_sys_mount+0x282/0x300 [ 929.927480] ? copy_mnt_ns+0xa00/0xa00 [ 929.928306] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 929.929406] ? syscall_enter_from_user_mode+0x1d/0x50 [ 929.930502] do_syscall_64+0x33/0x40 [ 929.931291] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 929.932374] RIP: 0033:0x7f0ec334eb19 [ 929.933155] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 929.936998] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 929.938594] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 929.940087] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 929.941576] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 929.943081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 929.944578] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 929.973969] FAT-fs (loop6): Unrecognized mount option "01777777777777777777777µ'¯±ÿSx*Ž;^dÍü½2Þåù±ÀèPn²Lž–u" or missing value 02:55:40 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(r0, &(0x7f00000001c0)='./file0\x00', 0x80, 0x8) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa884, 0x0) 02:55:40 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:55:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:55:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:55:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 24) 02:55:40 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) 02:55:40 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:55:40 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) [ 942.570785] loop1: detected capacity change from 0 to 33559552 [ 942.576042] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 942.576410] FAULT_INJECTION: forcing a failure. [ 942.576410] name failslab, interval 1, probability 0, space 0, times 0 [ 942.578330] FAT-fs (loop1): bogus number of FAT sectors [ 942.580356] CPU: 1 PID: 7116 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 942.580994] FAT-fs (loop1): Can't find a valid FAT filesystem [ 942.582425] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 942.582431] Call Trace: [ 942.582458] dump_stack+0x107/0x167 [ 942.585662] loop4: detected capacity change from 0 to 33559552 [ 942.586261] should_fail.cold+0x5/0xa [ 942.586283] ? create_object.isra.0+0x3a/0xa20 [ 942.586305] should_failslab+0x5/0x20 [ 942.589761] kmem_cache_alloc+0x5b/0x310 [ 942.590657] ? lock_downgrade+0x6d0/0x6d0 [ 942.591826] create_object.isra.0+0x3a/0xa20 [ 942.592735] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 942.593810] __kmalloc_track_caller+0x177/0x370 [ 942.594806] ? p9_client_create+0x41d/0x1230 [ 942.595728] kstrdup+0x36/0x70 [ 942.596397] p9_client_create+0x41d/0x1230 [ 942.597299] ? lock_downgrade+0x6d0/0x6d0 [ 942.598174] ? p9_client_flush+0x430/0x430 [ 942.599081] ? trace_hardirqs_on+0x5b/0x180 [ 942.599955] ? lockdep_init_map_type+0x2c7/0x780 [ 942.600959] ? __raw_spin_lock_init+0x36/0x110 [ 942.601935] v9fs_session_init+0x1dd/0x1680 [ 942.602864] ? lock_release+0x680/0x680 [ 942.603171] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 942.603702] ? kmem_cache_alloc_trace+0x151/0x320 [ 942.603723] ? v9fs_show_options+0x690/0x690 [ 942.607132] ? trace_hardirqs_on+0x5b/0x180 [ 942.608053] ? kasan_unpoison_shadow+0x33/0x50 [ 942.608998] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 942.610071] v9fs_mount+0x79/0x8f0 [ 942.610826] ? v9fs_write_inode+0x60/0x60 [ 942.611699] legacy_get_tree+0x105/0x220 [ 942.612559] vfs_get_tree+0x8e/0x300 [ 942.613360] path_mount+0x1429/0x2120 [ 942.614174] ? strncpy_from_user+0x9e/0x470 [ 942.615093] ? finish_automount+0xa90/0xa90 [ 942.616001] ? getname_flags.part.0+0x1dd/0x4f0 [ 942.617001] ? _copy_from_user+0xfb/0x1b0 [ 942.617889] __x64_sys_mount+0x282/0x300 [ 942.618752] ? copy_mnt_ns+0xa00/0xa00 [ 942.619593] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 942.620713] ? syscall_enter_from_user_mode+0x1d/0x50 [ 942.621805] do_syscall_64+0x33/0x40 [ 942.622598] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 942.623698] RIP: 0033:0x7f0ec334eb19 [ 942.624459] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 942.628368] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 942.629971] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 942.631441] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 942.632901] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 942.634360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 942.635830] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 942.641499] loop6: detected capacity change from 0 to 33559552 02:55:40 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 942.650120] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:55:40 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) 02:55:40 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 942.753115] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:55:40 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x4, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 942.788426] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:55:40 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:55:40 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 942.883473] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:55:40 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) [ 942.895882] FAT-fs (loop6): bogus number of reserved sectors [ 942.896640] FAT-fs (loop6): Can't find a valid FAT filesystem [ 942.946034] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 955.950484] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:55:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 02:55:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) 02:55:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:55:53 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 25) 02:55:53 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:55:53 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) r1 = syz_io_uring_setup(0x3a75, &(0x7f0000000340)={0x0, 0x0, 0x10}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x18}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) openat(r0, &(0x7f00000001c0)='./file2\x00', 0x400800, 0x8) syz_io_uring_submit(r4, 0x0, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL, 0x1b81) chdir(&(0x7f0000000180)='./file0\x00') openat(r0, &(0x7f00000002c0)='./file1\x00', 0x523503, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:55:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:55:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 955.965084] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 955.965421] FAULT_INJECTION: forcing a failure. [ 955.965421] name failslab, interval 1, probability 0, space 0, times 0 [ 955.969250] CPU: 0 PID: 7155 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 955.970803] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 955.972678] Call Trace: [ 955.973276] dump_stack+0x107/0x167 [ 955.974100] should_fail.cold+0x5/0xa [ 955.974979] ? create_object.isra.0+0x3a/0xa20 [ 955.976024] should_failslab+0x5/0x20 [ 955.976888] kmem_cache_alloc+0x5b/0x310 02:55:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) [ 955.977804] create_object.isra.0+0x3a/0xa20 [ 955.978894] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 955.980049] __kmalloc_track_caller+0x177/0x370 [ 955.981109] ? p9_client_create+0x51e/0x1230 [ 955.982113] kmemdup_nul+0x2d/0xa0 [ 955.982933] p9_client_create+0x51e/0x1230 [ 955.983899] ? p9_client_flush+0x430/0x430 [ 955.984857] ? trace_hardirqs_on+0x5b/0x180 [ 955.985836] ? lockdep_init_map_type+0x2c7/0x780 [ 955.986910] ? __raw_spin_lock_init+0x36/0x110 [ 955.987951] v9fs_session_init+0x1dd/0x1680 [ 955.988914] ? lock_release+0x680/0x680 [ 955.989817] ? kmem_cache_alloc_trace+0x151/0x320 [ 955.990922] ? v9fs_show_options+0x690/0x690 [ 955.991922] ? trace_hardirqs_on+0x5b/0x180 [ 955.992896] ? kasan_unpoison_shadow+0x33/0x50 [ 955.993921] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 955.995075] v9fs_mount+0x79/0x8f0 [ 955.995877] ? v9fs_write_inode+0x60/0x60 [ 955.996310] loop6: detected capacity change from 0 to 33559552 [ 955.996815] legacy_get_tree+0x105/0x220 [ 955.996836] vfs_get_tree+0x8e/0x300 [ 955.999312] path_mount+0x1429/0x2120 [ 956.000178] ? strncpy_from_user+0x9e/0x470 [ 956.001155] ? finish_automount+0xa90/0xa90 [ 956.002133] ? getname_flags.part.0+0x1dd/0x4f0 [ 956.003201] ? _copy_from_user+0xfb/0x1b0 [ 956.004144] __x64_sys_mount+0x282/0x300 [ 956.005067] ? copy_mnt_ns+0xa00/0xa00 [ 956.005962] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 956.007158] ? syscall_enter_from_user_mode+0x1d/0x50 [ 956.008321] do_syscall_64+0x33/0x40 [ 956.009160] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 956.010315] RIP: 0033:0x7f0ec334eb19 [ 956.011164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 956.015341] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 956.017059] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 02:55:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 956.018687] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 956.020400] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 956.022028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 956.023650] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 956.041052] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 956.048277] loop1: detected capacity change from 0 to 33559552 [ 956.055348] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 956.058708] loop4: detected capacity change from 0 to 33559552 02:55:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 956.070495] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 956.076084] FAT-fs (loop1): bogus number of FAT sectors [ 956.077375] FAT-fs (loop1): Can't find a valid FAT filesystem 02:55:53 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:55:53 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x8000, 0x63) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) openat(r1, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) move_mount(r1, &(0x7f0000000000)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x42) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:55:53 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 26) 02:55:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) [ 956.185119] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 956.197760] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:55:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) 02:55:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) getpgrp(0x0) [ 956.240432] loop6: detected capacity change from 0 to 33559552 [ 956.249715] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:55:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) [ 956.289531] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 956.351542] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 956.405200] FAULT_INJECTION: forcing a failure. [ 956.405200] name failslab, interval 1, probability 0, space 0, times 0 [ 956.406604] CPU: 1 PID: 7200 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 956.407393] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 956.408351] Call Trace: [ 956.408655] dump_stack+0x107/0x167 [ 956.409072] should_fail.cold+0x5/0xa [ 956.409512] ? create_object.isra.0+0x3a/0xa20 [ 956.410047] should_failslab+0x5/0x20 [ 956.410459] kmem_cache_alloc+0x5b/0x310 [ 956.410942] create_object.isra.0+0x3a/0xa20 [ 956.411451] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 956.412019] __kmalloc_track_caller+0x177/0x370 [ 956.412557] ? p9_client_create+0x51e/0x1230 [ 956.413063] kmemdup_nul+0x2d/0xa0 [ 956.413470] p9_client_create+0x51e/0x1230 [ 956.413935] ? p9_client_flush+0x430/0x430 [ 956.414425] ? trace_hardirqs_on+0x5b/0x180 [ 956.414900] ? lockdep_init_map_type+0x2c7/0x780 [ 956.415425] ? __raw_spin_lock_init+0x36/0x110 [ 956.415920] v9fs_session_init+0x1dd/0x1680 [ 956.416382] ? lock_release+0x680/0x680 [ 956.416838] ? kmem_cache_alloc_trace+0x151/0x320 [ 956.417359] ? v9fs_show_options+0x690/0x690 [ 956.417856] ? trace_hardirqs_on+0x5b/0x180 [ 956.418358] ? kasan_unpoison_shadow+0x33/0x50 [ 956.418862] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 956.419445] v9fs_mount+0x79/0x8f0 [ 956.419860] ? v9fs_write_inode+0x60/0x60 [ 956.420342] legacy_get_tree+0x105/0x220 [ 956.420812] vfs_get_tree+0x8e/0x300 [ 956.421243] path_mount+0x1429/0x2120 [ 956.421683] ? strncpy_from_user+0x9e/0x470 [ 956.422178] ? finish_automount+0xa90/0xa90 [ 956.422686] ? getname_flags.part.0+0x1dd/0x4f0 [ 956.423355] ? _copy_from_user+0xfb/0x1b0 [ 956.423980] __x64_sys_mount+0x282/0x300 [ 956.424512] ? copy_mnt_ns+0xa00/0xa00 [ 956.424965] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 956.425546] ? syscall_enter_from_user_mode+0x1d/0x50 [ 956.426245] do_syscall_64+0x33/0x40 [ 956.426699] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 956.427455] RIP: 0033:0x7f0ec334eb19 [ 956.427953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 956.430286] RSP: 002b:00007f0ec08a3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 956.431335] RAX: ffffffffffffffda RBX: 00007f0ec3462020 RCX: 00007f0ec334eb19 [ 956.432298] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 956.433189] RBP: 00007f0ec08a31d0 R08: 00000000200005c0 R09: 0000000000000000 [ 956.433995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 956.434996] R13: 00007ffc79d1b64f R14: 00007f0ec08a3300 R15: 0000000000022000 02:56:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 27) 02:56:08 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:56:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:56:08 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) openat(r1, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) r2 = openat(r1, &(0x7f0000000100)='./file1\x00', 0x2040, 0x82) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000001000010000000000000000960000090005000000000000000500008048000000"], 0x24}}, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) openat(r4, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f00000001c0)=r1, 0x1) r5 = openat(r1, &(0x7f0000000280)='./file1\x00', 0xdd53fcd89e273c1f, 0x22) openat(r5, &(0x7f0000000480)='./file0\x00', 0x80000, 0x0) faccessat(r3, &(0x7f0000000000)='./file1\x00', 0xb0) fsetxattr$security_ima(r3, &(0x7f00000002c0), &(0x7f0000000300)=ANY=[@ANYBLOB="0409663902ea3390a90a557a6b35104800"], 0x11, 0x2) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x8008, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_u}, {@privport}, {@nodevmap}, {@cache_fscache}, {@version_9p2000}, {@version_L}, {@privport}, {@nodevmap}]}}) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) ioctl$F2FS_IOC_GARBAGE_COLLECT(r2, 0x4004f506, &(0x7f0000000240)=0x1) 02:56:08 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:56:08 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) 02:56:08 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) 02:56:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 970.744811] loop1: detected capacity change from 0 to 33559552 [ 970.757300] loop4: detected capacity change from 0 to 33559552 [ 970.764022] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 970.769259] FAULT_INJECTION: forcing a failure. [ 970.769259] name failslab, interval 1, probability 0, space 0, times 0 [ 970.772421] CPU: 0 PID: 7219 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 970.774319] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 970.776621] Call Trace: [ 970.777370] dump_stack+0x107/0x167 [ 970.778388] should_fail.cold+0x5/0xa [ 970.779465] ? create_object.isra.0+0x3a/0xa20 [ 970.780534] should_failslab+0x5/0x20 [ 970.781405] kmem_cache_alloc+0x5b/0x310 [ 970.782336] ? legacy_get_tree+0x105/0x220 [ 970.783307] ? vfs_get_tree+0x8e/0x300 [ 970.784210] create_object.isra.0+0x3a/0xa20 [ 970.785219] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 970.786384] __kmalloc_track_caller+0x177/0x370 [ 970.787450] ? parse_opts.part.0+0x8e/0x340 [ 970.788450] kstrdup+0x36/0x70 [ 970.789183] parse_opts.part.0+0x8e/0x340 [ 970.790137] ? p9_fd_show_options+0x1c0/0x1c0 [ 970.791170] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 970.792352] ? quarantine_put+0x8b/0x1a0 [ 970.793279] ? trace_hardirqs_on+0x5b/0x180 [ 970.794278] ? kfree+0xd7/0x340 [ 970.795055] p9_fd_create+0x98/0x4a0 [ 970.795904] ? p9_conn_create+0x510/0x510 [ 970.796903] ? p9_client_create+0x798/0x1230 [ 970.797984] ? kfree+0xd7/0x340 [ 970.798743] ? do_raw_spin_unlock+0x4f/0x220 [ 970.799987] p9_client_create+0x7ff/0x1230 [ 970.800952] ? p9_client_flush+0x430/0x430 [ 970.802072] ? trace_hardirqs_on+0x5b/0x180 [ 970.803063] ? lockdep_init_map_type+0x2c7/0x780 [ 970.804318] ? __raw_spin_lock_init+0x36/0x110 [ 970.805368] v9fs_session_init+0x1dd/0x1680 [ 970.806356] ? lock_release+0x680/0x680 [ 970.807438] ? kmem_cache_alloc_trace+0x151/0x320 [ 970.808527] ? v9fs_show_options+0x690/0x690 [ 970.809706] ? trace_hardirqs_on+0x5b/0x180 [ 970.810686] ? kasan_unpoison_shadow+0x33/0x50 [ 970.811742] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 970.813089] v9fs_mount+0x79/0x8f0 [ 970.813901] ? v9fs_write_inode+0x60/0x60 [ 970.815012] legacy_get_tree+0x105/0x220 [ 970.815951] vfs_get_tree+0x8e/0x300 [ 970.816799] path_mount+0x1429/0x2120 [ 970.817821] ? strncpy_from_user+0x9e/0x470 [ 970.818904] ? finish_automount+0xa90/0xa90 [ 970.819885] ? getname_flags.part.0+0x1dd/0x4f0 [ 970.820943] ? _copy_from_user+0xfb/0x1b0 [ 970.821896] __x64_sys_mount+0x282/0x300 [ 970.822826] ? copy_mnt_ns+0xa00/0xa00 [ 970.823720] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 970.824907] ? syscall_enter_from_user_mode+0x1d/0x50 [ 970.826088] do_syscall_64+0x33/0x40 [ 970.826947] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 970.828121] RIP: 0033:0x7f0ec334eb19 [ 970.828974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 970.833139] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 970.834877] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 970.836500] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 970.838125] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 970.839741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 970.841350] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 970.844891] loop6: detected capacity change from 0 to 33559552 [ 970.860851] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 970.867325] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 970.877740] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 970.920969] FAT-fs (loop1): bogus number of FAT sectors [ 970.922347] FAT-fs (loop1): Can't find a valid FAT filesystem 02:56:08 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 970.930805] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=6397 comm=kworker/1:1 02:56:08 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000000c0)) [ 970.947127] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 970.965198] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=6397 comm=kworker/1:1 02:56:08 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) getpgrp(0x0) [ 971.063085] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 971.079034] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:56:08 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000000c0)) 02:56:08 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) openat(r0, &(0x7f0000000000)='./file0\x00', 0x18342, 0x0) 02:56:08 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:56:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 28) [ 971.282937] loop6: detected capacity change from 0 to 33559552 [ 971.304882] FAULT_INJECTION: forcing a failure. [ 971.304882] name failslab, interval 1, probability 0, space 0, times 0 [ 971.307283] CPU: 1 PID: 7250 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 971.308705] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 971.310431] Call Trace: [ 971.310989] dump_stack+0x107/0x167 [ 971.311742] should_fail.cold+0x5/0xa [ 971.312534] should_failslab+0x5/0x20 [ 971.313333] __kmalloc_track_caller+0x79/0x370 [ 971.314277] ? parse_opts.part.0+0x8e/0x340 [ 971.315197] kstrdup+0x36/0x70 [ 971.315863] parse_opts.part.0+0x8e/0x340 [ 971.316721] ? p9_fd_show_options+0x1c0/0x1c0 [ 971.317662] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 971.318758] ? quarantine_put+0x8b/0x1a0 [ 971.319586] ? trace_hardirqs_on+0x5b/0x180 [ 971.320478] ? kfree+0xd7/0x340 [ 971.321163] p9_fd_create+0x98/0x4a0 [ 971.321931] ? p9_conn_create+0x510/0x510 [ 971.322796] ? p9_client_create+0x798/0x1230 [ 971.323716] ? kfree+0xd7/0x340 [ 971.324395] ? do_raw_spin_unlock+0x4f/0x220 [ 971.325312] p9_client_create+0x7ff/0x1230 [ 971.326190] ? p9_client_flush+0x430/0x430 [ 971.327065] ? trace_hardirqs_on+0x5b/0x180 [ 971.327944] ? lockdep_init_map_type+0x2c7/0x780 [ 971.328914] ? __raw_spin_lock_init+0x36/0x110 [ 971.329869] v9fs_session_init+0x1dd/0x1680 [ 971.330763] ? lock_release+0x680/0x680 [ 971.331584] ? kmem_cache_alloc_trace+0x151/0x320 [ 971.332582] ? v9fs_show_options+0x690/0x690 [ 971.333489] ? trace_hardirqs_on+0x5b/0x180 [ 971.334370] ? kasan_unpoison_shadow+0x33/0x50 [ 971.335315] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 971.336363] v9fs_mount+0x79/0x8f0 [ 971.337092] ? v9fs_write_inode+0x60/0x60 [ 971.337945] legacy_get_tree+0x105/0x220 [ 971.338793] vfs_get_tree+0x8e/0x300 [ 971.339556] path_mount+0x1429/0x2120 [ 971.340342] ? strncpy_from_user+0x9e/0x470 [ 971.341223] ? finish_automount+0xa90/0xa90 [ 971.342109] ? getname_flags.part.0+0x1dd/0x4f0 [ 971.343071] ? _copy_from_user+0xfb/0x1b0 [ 971.343929] __x64_sys_mount+0x282/0x300 [ 971.344764] ? copy_mnt_ns+0xa00/0xa00 [ 971.345567] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 971.346637] ? syscall_enter_from_user_mode+0x1d/0x50 [ 971.347700] do_syscall_64+0x33/0x40 [ 971.348492] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 971.349545] RIP: 0033:0x7f0ec334eb19 [ 971.350310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 971.354097] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 971.355659] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 971.357110] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 971.358590] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 971.360050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 971.361492] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 971.363063] 9pnet: Insufficient options for proto=fd 02:56:08 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) [ 971.424081] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:56:21 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000000c0)) 02:56:21 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:56:21 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:56:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:56:21 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000000c0)) 02:56:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 29) 02:56:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:56:21 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) chdir(&(0x7f0000000000)='./file2\x00') [ 983.924714] loop6: detected capacity change from 0 to 33559552 02:56:21 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) [ 983.936503] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 983.940460] FAULT_INJECTION: forcing a failure. [ 983.940460] name failslab, interval 1, probability 0, space 0, times 0 [ 983.942883] CPU: 1 PID: 7272 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 983.944338] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 983.946090] Call Trace: [ 983.946659] dump_stack+0x107/0x167 [ 983.947451] should_fail.cold+0x5/0xa [ 983.948264] ? create_object.isra.0+0x3a/0xa20 02:56:21 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000000c0)) [ 983.949226] should_failslab+0x5/0x20 [ 983.950176] kmem_cache_alloc+0x5b/0x310 [ 983.951045] create_object.isra.0+0x3a/0xa20 [ 983.951970] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 983.952070] loop1: detected capacity change from 0 to 33559552 [ 983.953045] __kmalloc_track_caller+0x177/0x370 [ 983.953069] ? match_number+0xaf/0x1d0 [ 983.955635] kmemdup_nul+0x2d/0xa0 [ 983.956389] match_number+0xaf/0x1d0 [ 983.957181] ? match_u64+0x190/0x190 [ 983.957962] ? __kmalloc_track_caller+0x2c6/0x370 [ 983.958986] ? memcpy+0x39/0x60 [ 983.959766] parse_opts.part.0+0x1f3/0x340 [ 983.960708] ? p9_fd_show_options+0x1c0/0x1c0 [ 983.961761] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 983.963038] ? trace_hardirqs_on+0x5b/0x180 [ 983.964033] ? kfree+0xd7/0x340 [ 983.964783] p9_fd_create+0x98/0x4a0 [ 983.965650] ? p9_conn_create+0x510/0x510 [ 983.966699] ? p9_client_create+0x798/0x1230 [ 983.967742] ? kfree+0xd7/0x340 [ 983.968596] ? do_raw_spin_unlock+0x4f/0x220 [ 983.969664] p9_client_create+0x7ff/0x1230 [ 983.970678] ? p9_client_flush+0x430/0x430 [ 983.971829] ? trace_hardirqs_on+0x5b/0x180 [ 983.972842] ? lockdep_init_map_type+0x2c7/0x780 [ 983.974039] ? __raw_spin_lock_init+0x36/0x110 [ 983.975156] v9fs_session_init+0x1dd/0x1680 [ 983.976225] ? lock_release+0x680/0x680 [ 983.977197] ? kmem_cache_alloc_trace+0x151/0x320 [ 983.978373] ? v9fs_show_options+0x690/0x690 [ 983.979517] ? trace_hardirqs_on+0x5b/0x180 [ 983.980516] ? kasan_unpoison_shadow+0x33/0x50 [ 983.981738] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 983.982942] v9fs_mount+0x79/0x8f0 [ 983.983850] ? v9fs_write_inode+0x60/0x60 [ 983.984856] legacy_get_tree+0x105/0x220 [ 983.985854] vfs_get_tree+0x8e/0x300 [ 983.986796] path_mount+0x1429/0x2120 [ 983.987667] ? strncpy_from_user+0x9e/0x470 [ 983.988571] ? finish_automount+0xa90/0xa90 [ 983.989643] ? getname_flags.part.0+0x1dd/0x4f0 [ 983.990888] ? _copy_from_user+0xfb/0x1b0 [ 983.991853] __x64_sys_mount+0x282/0x300 [ 983.992814] ? copy_mnt_ns+0xa00/0xa00 [ 983.993773] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 983.995032] ? syscall_enter_from_user_mode+0x1d/0x50 [ 983.996321] do_syscall_64+0x33/0x40 [ 983.997198] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 983.998588] RIP: 0033:0x7f0ec334eb19 [ 983.999480] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 984.004015] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 984.005855] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 984.007571] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 984.009331] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 984.010977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 984.012772] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 984.026255] loop4: detected capacity change from 0 to 33559552 [ 984.108334] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:56:21 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) openat(r0, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ip6tnl0\x00', &(0x7f0000000000)=@ethtool_ts_info}) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x2, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 02:56:21 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 984.183959] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:56:21 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000000c0)) 02:56:33 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 30) 02:56:33 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) 02:56:33 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000000)="eb3c0800d1a2c64e3666824a02080100042d000000f801", 0x17}, {0x0, 0x0, 0x8}], 0x100800, &(0x7f00000000c0)=ANY=[]) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@ceph_nfs_confh={0x10, 0x2, {0x4, 0x6}}, &(0x7f0000000140), 0x1400) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 996.259559] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:56:33 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:56:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:56:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:56:33 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:56:33 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) [ 996.267174] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 996.282346] FAULT_INJECTION: forcing a failure. [ 996.282346] name failslab, interval 1, probability 0, space 0, times 0 [ 996.283762] CPU: 1 PID: 7313 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 996.284602] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 996.285714] Call Trace: [ 996.286069] dump_stack+0x107/0x167 [ 996.286564] should_fail.cold+0x5/0xa [ 996.287104] should_failslab+0x5/0x20 [ 996.287587] __kmalloc_track_caller+0x79/0x370 [ 996.288181] ? match_number+0xaf/0x1d0 [ 996.288673] ? kfree+0xd7/0x340 [ 996.289107] kmemdup_nul+0x2d/0xa0 [ 996.289577] match_number+0xaf/0x1d0 [ 996.290064] ? match_u64+0x190/0x190 [ 996.290518] ? __kmalloc_track_caller+0x2c6/0x370 [ 996.291161] ? memcpy+0x39/0x60 [ 996.291598] parse_opts.part.0+0x1f3/0x340 [ 996.292148] ? p9_fd_show_options+0x1c0/0x1c0 [ 996.292732] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 996.293389] ? trace_hardirqs_on+0x5b/0x180 [ 996.293951] ? kfree+0xd7/0x340 [ 996.294368] p9_fd_create+0x98/0x4a0 [ 996.294716] loop4: detected capacity change from 0 to 33559552 [ 996.294834] ? p9_conn_create+0x510/0x510 [ 996.294855] ? p9_client_create+0x798/0x1230 [ 996.297298] ? kfree+0xd7/0x340 [ 996.297713] ? do_raw_spin_unlock+0x4f/0x220 [ 996.298271] p9_client_create+0x7ff/0x1230 [ 996.298817] ? p9_client_flush+0x430/0x430 [ 996.299355] ? trace_hardirqs_on+0x5b/0x180 [ 996.299882] ? lockdep_init_map_type+0x2c7/0x780 [ 996.300486] ? __raw_spin_lock_init+0x36/0x110 [ 996.301041] v9fs_session_init+0x1dd/0x1680 [ 996.301583] ? lock_release+0x680/0x680 [ 996.302063] ? kmem_cache_alloc_trace+0x151/0x320 [ 996.302663] ? v9fs_show_options+0x690/0x690 [ 996.303244] ? trace_hardirqs_on+0x5b/0x180 [ 996.303802] ? kasan_unpoison_shadow+0x33/0x50 02:56:33 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 996.304360] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 996.305221] v9fs_mount+0x79/0x8f0 [ 996.305672] ? v9fs_write_inode+0x60/0x60 [ 996.306206] legacy_get_tree+0x105/0x220 [ 996.306723] vfs_get_tree+0x8e/0x300 [ 996.307212] path_mount+0x1429/0x2120 [ 996.307703] ? strncpy_from_user+0x9e/0x470 [ 996.308254] ? finish_automount+0xa90/0xa90 [ 996.308796] ? getname_flags.part.0+0x1dd/0x4f0 [ 996.309381] ? _copy_from_user+0xfb/0x1b0 [ 996.309901] __x64_sys_mount+0x282/0x300 [ 996.310409] ? copy_mnt_ns+0xa00/0xa00 [ 996.310905] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 996.311582] ? syscall_enter_from_user_mode+0x1d/0x50 [ 996.312236] do_syscall_64+0x33/0x40 [ 996.312712] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 996.313128] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 996.313361] RIP: 0033:0x7f0ec334eb19 [ 996.313380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 996.318874] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 996.319850] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 996.320745] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 996.321638] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 996.322533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 996.323432] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 996.324432] 9pnet: Insufficient options for proto=fd [ 996.342300] loop1: detected capacity change from 0 to 33559552 02:56:33 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) [ 996.410863] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:56:33 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 31) 02:56:33 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) [ 996.452497] FAULT_INJECTION: forcing a failure. [ 996.452497] name failslab, interval 1, probability 0, space 0, times 0 [ 996.453889] CPU: 1 PID: 7330 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 996.454708] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 996.455934] Call Trace: [ 996.456311] dump_stack+0x107/0x167 [ 996.456747] should_fail.cold+0x5/0xa [ 996.457208] ? create_object.isra.0+0x3a/0xa20 [ 996.457907] should_failslab+0x5/0x20 [ 996.458378] kmem_cache_alloc+0x5b/0x310 [ 996.458869] create_object.isra.0+0x3a/0xa20 [ 996.459406] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 996.460036] __kmalloc_track_caller+0x177/0x370 [ 996.460623] ? match_number+0xaf/0x1d0 [ 996.461142] kmemdup_nul+0x2d/0xa0 [ 996.461686] match_number+0xaf/0x1d0 [ 996.462300] ? match_u64+0x190/0x190 [ 996.462748] ? __kmalloc_track_caller+0x2c6/0x370 [ 996.463431] ? memcpy+0x39/0x60 [ 996.463888] parse_opts.part.0+0x1f3/0x340 [ 996.464421] ? p9_fd_show_options+0x1c0/0x1c0 [ 996.465090] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 996.465713] ? trace_hardirqs_on+0x5b/0x180 [ 996.466252] ? kfree+0xd7/0x340 [ 996.466756] p9_fd_create+0x98/0x4a0 [ 996.467365] ? p9_conn_create+0x510/0x510 [ 996.467852] ? p9_client_create+0x798/0x1230 [ 996.468369] ? kfree+0xd7/0x340 [ 996.468761] ? do_raw_spin_unlock+0x4f/0x220 [ 996.469448] p9_client_create+0x7ff/0x1230 [ 996.469961] ? p9_client_flush+0x430/0x430 [ 996.470584] ? trace_hardirqs_on+0x5b/0x180 [ 996.471111] ? lockdep_init_map_type+0x2c7/0x780 [ 996.471669] ? __raw_spin_lock_init+0x36/0x110 [ 996.472213] v9fs_session_init+0x1dd/0x1680 [ 996.472728] ? lock_release+0x680/0x680 [ 996.473199] ? kmem_cache_alloc_trace+0x151/0x320 [ 996.473921] ? v9fs_show_options+0x690/0x690 [ 996.474623] ? trace_hardirqs_on+0x5b/0x180 [ 996.475145] ? kasan_unpoison_shadow+0x33/0x50 [ 996.475686] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 996.476366] v9fs_mount+0x79/0x8f0 [ 996.476846] ? v9fs_write_inode+0x60/0x60 [ 996.477336] legacy_get_tree+0x105/0x220 [ 996.477975] vfs_get_tree+0x8e/0x300 [ 996.478498] path_mount+0x1429/0x2120 [ 996.479079] ? strncpy_from_user+0x9e/0x470 [ 996.479728] ? finish_automount+0xa90/0xa90 [ 996.480250] ? getname_flags.part.0+0x1dd/0x4f0 [ 996.480798] ? _copy_from_user+0xfb/0x1b0 [ 996.481292] __x64_sys_mount+0x282/0x300 [ 996.481782] ? copy_mnt_ns+0xa00/0xa00 [ 996.482249] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 996.482869] ? syscall_enter_from_user_mode+0x1d/0x50 [ 996.483638] do_syscall_64+0x33/0x40 [ 996.484084] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 996.484850] RIP: 0033:0x7f0ec334eb19 [ 996.485303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 996.487813] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 996.488714] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 996.489739] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 996.490727] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 996.491574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 996.492659] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 996.509122] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:56:34 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) 02:56:34 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:56:34 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', 0x802, 0x1) [ 996.545187] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 996.555264] loop6: detected capacity change from 0 to 33559552 [ 996.565215] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:56:34 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 996.650516] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1008.888988] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1008.908938] loop1: detected capacity change from 0 to 33559552 [ 1008.916972] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1008.934030] loop6: detected capacity change from 0 to 33559552 02:56:46 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 32) 02:56:46 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) 02:56:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:56:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:56:46 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000000c0)) 02:56:46 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:56:46 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000340)={0x0, 0x0, 0x10}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) openat(r3, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) r4 = syz_open_dev$tty1(0xc, 0x4, 0x4) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000027c0)=[r0, r3, r4, r0], 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x18}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r5, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(0x0, r2, &(0x7f0000000400)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x6, 0x3, &(0x7f0000002740)="d4abd2e2082d10a05a8d82050140bd3b2dbf4e9c302a4b1d24f60a7afc7fe56c43700e680af5415f28da391702311c31bc4e34a55f500ee5ef58d58b904884a69212b0152d58aeaca42ed42a262c109a888753cd6c59730b16b264a48dd62b29ffe27768f43a858d77787e", 0x20, 0x0, 0x1}, 0x9) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file1\x00', 0x80000000, 0x7, &(0x7f0000002680)=[{&(0x7f0000000300)="b4fc718ed28390ecb356699795c74d444b3613483c0ee050b03db90a22bc54d2248b9b86c2769996ae67cfd88f0f57ebbb1bb89d7a14eabcfbd113b04b6f02c738e5ba832e4b57d22378e34bf74cac815b4daf5b38316d9188f87cb4fa5c688d5571796e4ce8a67c6262aca22bc331accaae3c39bb8c6bdbb6f365a64aee6516367f37aeff0ef5792059ca66d290133b4169ba95c366613efcfc394bed7663cfa1c054542b9b69a4b9b7939da0ef2e6a92f689967da7d0ae1013229638041947b4cf706569a7422826f584c77e6607a0b70330e6585e04750c814fc231413c9549cf", 0xe2, 0x9}, {&(0x7f0000000480)="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", 0xfb, 0xdaa8}, {&(0x7f0000000580)="3eaebdf446ae5241576c3162925f9d0146aa721829a42c17daa959f1f7059bdbe17a115be81b5d34516ae449eac6c51d5bac86da7ff79b92ff649ee13572ae231f9849fcc2de15b197d648e7f1f4749f3cdd583a44c215773e2117f6d41d0ece1c7b9943b2560b2b9a82d853b46ddc707e5a353a1a5eaad451aad759dfed624e504db55957a91a967243db9619ae4adbff272cdd3fd68e8b7e9374d2836d14101fe0c7e61c08c63095c112aa856564d46817fab32209e61269fdfb84b54608336e632cd1eca4eb371317cb41c4c6cf6c7554e23ab2a230250dcb13ed9e41be9cbbe1b71b1aae4c89d8577020c688e07e85c4d1fe24ea75ede10078718498d4b74c0aa971fd75ca7db32e6fd16bc75add0efe02111fe218f6fb0e00ce03818e08943d330996d174db28eeccef29fb1ee390b1ea76c58f5d865b46efabc851ce65d45fdd6d33ddfb119e81b4601376ae446deee8065645c7deadde7724c38e558c97ac74903bf3fe2e57b2163896f856bfe35de1a00efae6950512c2abb674adabc04e01c6d7d482a1baac47ad508d5c90b6b0645cc0d8b260fea0be6de0291170c0898042fdd148f7a7b99db6986fc969ef9e8de72d9926fdac8dae9035132fc298145fd4ce0aa739812b472198bf4b1fd57f7ec70b3266f1599f0ebd36cda16bfdcbd24330a6725dca07c070abc3a583aa0483abf78d483c89d2916582d3b812beb6b88f8d6530fa041abe71cd36acea35c3be1cefa3ffe9cd40f8d93849e73d46db63bc9bc88d815e47817e5bf272c183769c55e944f2d8e6a26a676a904a637de1d6c5f6384f043367f8f76c445c6f55b198ebd672952d4725ff055620e3ecf22ae32eb5a8871f4bde40098361909c360ac49e35670ad9d8b0a30d3d31d43839f5b9c9bb6b2f3700e95cad727b910858472981bd73668206588d7c20ffb17c2800ad263bd68a4a364787b06155c84d4e18c4c40512498618beaf72d4a63de5e489e1403e39c4c08085e163fe1183ae1cce4f793279dff8e35985270efb0d9c6c8bd8d67025c8d8343535276b81a8a1922aa91119bf32f0f03ed944dec0d3c46371eb9fb4bebddefd9c7d17cae7a7202ab869da99737799f8009e73b8d6691a4d6194aac1dadb12009981bc9f08b55c922915155fcced9b4d713420c01a8e2da33a91b60436cdcb2f56c331f04a0fd0274fe0fab06b253004acd97d9041fca87aff229661a1ef495cb7f66accb1fdf2eaf53c0210cd9f832d4bad438a126924da6a135a6fa94332c8a59fcc085c1465e9236b7e5819f18b7eef9525fe40e1666735b45c5eb8840503bab8a1f3ce431f6a1006036c03b53728ad6b4b3fb7e260f9c2a9ffb70441a0392ef7466b2a662142c529ef3b24cfc9d3423098d7abbd43fd1e94264db51b99a42b07d6b56b8bc34dd0e899ae2385c778f3a216517cf1692b126da6e262b6d9aa8ef471b3a729c363f1591839dabb6a6cac2cb22afaa93f35898d37e541adf9c54021363204f63f9acc299fdc27cb34b20e56b8894173b328646c46bcd129b7a20ee2e0e3659d393226e689444d72579dc1bb4604a85dcd86dfdf6d5fe065294ac31da7b33c2b316b381c1239608abd8a55902fb3b4ee44cd4eb2d8cb9e4ffecaafca0936fdd3ed9a76bffd9f628229d5330c0a5d53bf9246c0e961b6a71d25f377e701695ab0371700218bcef4e6cc2a03c00fc1d7ba35494d3fbbacf422001669b6efaccf54186bbe60de67c1dd1a50dc3c34773f63a016fb8ee55b6b5ccfb330f0a21369b4158b269f519ab43721f132a827d567e7b3c4faf72370386ebc0e00a3046b19ca3f81efd672b92ce9ce975a01c818f18c0d4c44319752fe9b3bef4e102ac4ada8c50d8402c0b1c43991524a672f3140a162ca72a299c5a500006ae736c23932e206ddd1758605eec11af67b52c1a0b72a01ab1dc69a47022b6ff31ad8862dabc88786f0ba78e1d77a5e29e836d67e1d57799200e2ddec14738a560c1130376910806de36411a4b9399d70ffcf8a23c42b76282c2dc3336c2db27f9864fc556c24e6e126bb99ccdbd822d1ccf4774265032a363a96822cbe3d4383216d8dc1bfc9a52b865050894c774f4bc3ad410116f42e837f19d088abf4a6bff0a945908ca44dc38179e7fe4cf6dbbf4855eee3f5cf1b4a4083fd0a1eb93bdcaad49bf5188652c4cafd632625709669794be3bb4e7ac4012bef8d76fbcc22fd8ea06cf37f12ced375346dbc21c86f7e1fe6e7d681f1a5e3a2ab5075cc5ddebc5a211d9bbd03ee33b30c51bd4b6c78f40dfd873f2b9b0d184a7858e8bbc86ba8eaed0568c97a8ef20435ff74036c981c20cd0280d6ebfe1013289fba8ed13f9e4b1f69da745cf145bca0bf04b8492599adc49b71ab1c39e4da2921e3ce70dcab53dfb3f0c0fd5d9d0eb57110a6c4ca733bde69a5b23aaac5c0941b7a320523e5ef74a8b36e976e62524cd0e3b67cc79814512041af0497f3dd5e1ceed94a41fe15cde33fd4038fa5427cb8320bd4cad9ccfb06984f1eeb0dade32f8e1b72e953a64abf48932ce61c6bcb52f1f1eae33e9dba9673b04ecfa00386aa57482686002068f7b30f66e582620a574f54151dff39c317ac571f29c9615b90d819f17b9f6ec2fa518a967dcb82f34504acee4e116481f6848270c8e92bd77d892b087b79971169a1096a1dfdefbd3284d18a5fc6aab306f7f4d7c6d3249c88fe0f3f5be62c4b91b0289cf98213d3d963f41f2389067b51a97bd72764e755666404b9b30dcf6ffecd53b1fa0b5a602f10a5e86757fd147f6a1bc2a87b63a8fd733c15b7e54bc10c146d39c09b803975f2f4902f0c1cc5f2c50ae82a6f443039e45741d2d3a944898a5230717b57ee03d52876ba40cea0f0a86a4b2bbbd206b0255fbd53623ec95073bc360011c847af0b673e44b6481d8d254bbe6320b2eef7112f346e05ab2a7b553d557956f0530ff6cf987149ae62690da73dea649c32930244fad50ea87e54a450a4e3aa434859dccef5b0c3f55da5ef20a5e1bd4f80fe64bde7cbf9e500770f0ad43492e78ffda2f9c272f5c47bccb71bcd6c49ed7d332d51f487ee6616a78609c2aa3c079159a9c67ebe7bcc142112a2cd809b2d6449a5c0d2dc7eab23160ead6a0ada703813b1d17dadc10a57af2a6961ca4583b249ebd811915145037c48e5a9b4adb1631c01e0d432d7b24d42e2006c4ad4c31ff404c3332f7a2b85a06621fb2de60f0334f12e7cda7f9845b534a68b144ba478d2d14504210d1f8191b1a6c8e83971441756e92a308e41a76e02ad67fcc1a5e3c1e1108a23332af0d0fbbcba20b66d83d1ae8df6cc8256cc6c2b5ad44856b40c42e8401196871692a13e1136e22ce155649ed60ed4a209af17a4c33bb1908e72d7754fb848560eb5a5391c06c24c88a272ef4fa12668b37b73275eda74381891e746c980c3925ebc2edc1e0050cf5344cd88436ff3c1b27dc2fea5328c0c97976a729a411e2d3dc665aba91f99038f7368f6930fe440ffa1a8987f755435b1edc23eba4df645d274f8b895865eba02b5371a7538d73b054cfa7020ab7cd94a39612c403bbb5e2344fe6b7ff9ee5ea89c82e824e7bd36f57d2e1c3d485f153c766839aae28aaaef971309e6a0966facd48977baac5c1f219fecac734f434be26fb8536ca10f7b504ebcdc3c6e037cfb1bd6b6723f963ff91db5dbe3e62a65e6a66828ef60ca76c7e056bf5bcb4fa045b7e26a5efa516428073a0c893df2b533927ac35b2a71126c5a22d4dac34d7ad73d7e3fb3936e90749bdaf1f77f27753a80b3a123bda7d1932fd1b07cd830658b2887b6df3ac971f5c8cad5190865ed02e6471183197e9b40062213a388ddcf54f17439684b05138ae2b685518adce9838dd726dd5f08ca4176b1b26db4073bc5af90bc012c42bbc09f2b138601d04b3736e3890ffd273d52add20433cae8846ba4e227abffb688734457a039ff951cc2f14243bb0066695a0b8cdb874823d04d4f283ab758a394029ec17c6bb1e51a21f5bf61884cfea1239de8d15628fcf4afff7098289f79c2c99331bc488642c69bef1f9ae9a2bac2c59a84d7d611cc3a691a9896a5cae062bb7c14fc4a6f17f4191789276e800771e6b9b9e0d5727764f94ae964ed8cb9b3b9db5cd03cd684f35e991f8ec9d7c79981459696ac183595f80c2e4198f040fe9dff5a2b85c42ee572cd11c8c775c2e0039706db0cfc35464266851d1f57bc884a58abe54f55196b422c66c4f1b0a113c9301bd38c13d7658bf67c27c703c7bc46b59e108de2ec20cdacf6593cc4bea077ee7b4914d7d1239004be27f802bfd9bb14ab7737c0d6801cd5177d69c92cf34fd8ef00c0d202248f2ae7d6529f41650a02a40b51db7ed4be108ee287ad9d7509fa575603c96be8d0591035995f8804ed1e0e087dd301472d102bb1d3e4fd9c07c8feb0b637e5ea631dd74382a7d8af40f3b6c120362608b0d25442792f75cfface86fb9de1dfc3c9a28e43d4caa02910d2652c2f19be59d3b19e5605fd07090176b8993e3f52800e344f92ce6017c1b637207a7dd67e1b3b60341ea1626707def3bfb5f7d565749c543770c219daeae83ea39018ffb168d9bc2ae148906a28e26d2c85a89ccff0a9c06b1a58604116aea3221352b48812e53e98a0e46fd55beb17651ae8be4877495462d5940636b46941c495527ac4d30ad7154141769effe0dd274e00148f2b71910e7fc86eddb6d6055e408a9dbc86b26751c5355b6982dcbcb512bf591643844fcc8f0ec9685d15340edd58d315a21eb4e21f33c09cdab1bf2241d265586deb1038d6b08a6c71e05e6937af4b53a7dca5609243e81032bbcccf3d0a43077458d80c0b9b1cc4776ebb4bf1ac83fc00b889031690d36cc3c6f9a3bc552c0d6d58444ac7f57fc0d19c323200208006ee6f2dcf38348823dc5b3a0ef78c4a10e736d3f7d9e881c52384f3f00a250fc97e8b257ca6f0ca8bc1a3a11e79038f63abb3c221186d014424033f3d695c2d8f2d89c94f35f11ffac25c453ace2b8849801e147f3091256d735b4643ebdf17a3bb455a1c2a4b57e73a4b6f1dd19187c1063a90f53599fdfee8578bc276a31980d258d855002f6a82a6e7f2d8eb536202477c2f8e19c9fc18af387acc42f4ab7ae3ef7aa90954cd6ae04c907e23b429f7a6a7dcdbdb21f29a58ef5d375901a9e57442028ea1a0dc7dbb49d05e290ab16fe3d2c37bb332854e1b345fd720188818c684e6ba93b93892cd71c6124fbb176bcc5ac8be9d7618d85ae1d401208f57733b7e84f51dabf31bc7999be3e838056b690b467151e00c3763d012fc2f2eb352c0ba8b1670095e51bff10aee8eeb04d293201a69517190f39c9309ce4e92c1e8375d52182716750b459abbd87ba9afad9e62d85b1d9608e0b0f97cc0b7a4a9a485e152322193f82c4b671afb3bc0448b3f107dcadf432641cf78ef0035d143f09ac365713ec60325e15684116b1373092a93c4f2ae607081304a09052b9fdc74e88614cf73889e5803c79d95b4003d23c338524f3e0f8a81d3221025d19d79fd027ebd1e1c52bff17a3516ac376e91d457065181560f7e9354c1a810e9c7c638224a2389b00e9b072ad8ea71977a2fcc9c155175c95d2195a70280a46a22d1ba89813ce7f25e13f28a190416d386e7c45f4cb65ba6a81864fc2502d292348bad470e6cd9b539f13ff32f9f4f07733627aa99c696b18dcdd5c07b3dfc9b11e8058b1c2431f925de54ba9537c6237aa02f417ba7190da6d746a878ccbcf8fcaf9d", 0x1000, 0x400}, {&(0x7f0000001580)="eb08744d01b591db58d82c1ba2591bb03f5724214a8ac317658d23bba9cfe7e570976803c534efa45ce47edf3f0a27292094ed6d99a3a193f3e2f9e3cd5a32dd7684d730b4e95d92fc06456098f511b34a0b8974cca3f8681d557c9a95f6c4cd433fe2b7585f7f389274f2b71a51a84906f88d5050ef642c2f5c51b1c191257b469a93644bc90eb451d93c52ad264b3fa5a52c6642f413bb17bf5ac996c702e13880a459941a7762665c1809e4f96be1e7505d177c6c5c0762db57fc8226d3aecc842bdc44a46f800a891f0b3a870d745207c068908bfcac91535a4fe91f9b47868d8cb7b27db55f54dac2a711fe38368e9658557aeedcadc671c5c500c19edf435bb5f4fe6718a9643d82f29cdd1db54ee837a30054754b666f483679f4180dbb2de610251d1de432cede954c9d6b7bef3ee5fac5ae6c4cf6750b95544a4fc1e5f910971c4741036b4e0090ecae0b2c59363b7cda586f3ee52f27d859c44178cd454649b957e308e5e834c0c0d7c63cbc4474b3fa49f9439d04b2b8bb4032fecd1763a1c35919f7f0210ab22242c26f844bc63340c0b294c8204cc5f1052a13dd3a592da365b74b0e67fd6a54189b24f25d5141d2921cf61f85796ac8d673a1f89488cca951c36258e331677a167a9556dc6df3a27cc6baa4943a2ea742b2e55ec49e3a975c2812fd061cb7717fc79dc72af8af886d06369c3ccd21ba0488523aa46ade3d3f4e296321176ddd65bdc4e215ede980abae27153df2bce4dbd04d559eefaad927ff0e12fc20d5044fb4944ab7c8f8f82ba9390963c80473a05700b2b562609bf4efe8f31082b26c9af3c78ea2f10c46ba640d347ddea64ad1ebf734ce833d316b33c716124bca31747580d0f16791d47c6f489509a3de8fa8bd36d324473ae8e9ed56271ce3f1c2e3695293bb85fc4464ed0ddaea05d80d551f38f35c7c7a1d9e53af9b0d81e5ba03b9741e67af26d09ccdd5a18a02936118e5de63d414aaa051caae6a123c93bb711f799986e4d8bb0d7df2bfaa95f3f99f91c02fea41b9bcb0311793e0e6e755f382588a8a2be02faa1740d158d0b37f7461ff1e6b848cc900cf6d93b445b11a26e670a297bce74a9a46b004bb1d9a93b1138a490ef2328df02cb9b135492d44f150235415067f36d5d390626d4c0af59f963b21d76e7b75ad8bfd14cb0bda02acd6e5970b0bdd4e77a1b559b9d583740b7a36234497f0745f63c84ab76f7a83688739e06c718491a7b79a375f49c5be4a8130aeb7028caef160a117749fef7cfb23ac75b91f0de85436e4cb33b1373c12a44f4ca352a2448568595bda7bf2861981796f2ed856d38cdc39dfc2e6daa9fc7c86ba65b0697db4a5b3bdd54bc36a2755a122d8880ff49a9467b21ccaf8d3ed70ed91fd27a832d5046e14c95db735bb0e160cf51e82796f45f937e0a6d8ed7f066093e4b8cf46e7f625a7cec224cb1a98545c70ad561ee5f6eef20d1f0e878ec7df042b6465380efc9f94362398b10e466966b70195af54aad04deb64f070f7d7aee8f2509ddb5fe7d1977f24be89bd3d5e661986f7e97ce4273ae1edc6de8bfe108a01ea491c9ca005d77026b2e831d05c4c112d189c238679063d74545654b6dcd7cf174bab90b6ca9758354d1573decce776affab8572b6905e0791390d3fcd662d819ba01d73d2af44ee61dd22fda33f13daf995ca8929cd63a80c6c47210b648f36c0ac20754f34b2a8d184e1f7c4d7821f684e5edfd3abc61b4db6b275e28c66a1370f8e1f0bc83950e8ddb3d4003a916fa6b0c1fe2df5919a16a0c55f4017288703b20cd1ee007b9c561dca6f425c7430a886b14bc97b0a961243db0f8fc28711a4ea8e89461012fa0da80a7086065e9031f72b600bb4a29291c3742ce7554a770be45e06b3eb134d3b9e3f24f623914d37f48f39fb82a6733a432ebbc5bcaeaa64ff8b8e977dc809308ecc5fca1a846e835e3624ca4c1f50bba63fbbb196b3e43bb08c8dc37ae506bb945a7780af2de4f4e207f211937e3622aedabae00a356f225a84354403511ba7cbf66b993e16eb56732a28d96e3c9d15a284c66fd77892e24f8bf71dd5446b5042f4babf022b977fdb17aa18b5395f04c62d04f2b047aaea476468f14af5b5030d78ed4d4e2e577fbc52fc6bcf035cd4ba0808d8ca6fcb83ef175783eb9d40b28838dce64304bde44c7fd06fda3ee936f5d592daf8a78ac883d11c77a6dfc6ccc4b92521bd5b1800ee93d50467dcb2774c8f095995d8d9135f577251585a7e05fd84659da6b7229ea2d8bdaa31f570dc039ea52e347f1e41a663e194787ed8cfebecb3f19cb7840c535efa7db84fb8e1b96b3a401cc0cac2143df02e0dae48dbcc8a96522d06cd3f30fb3982a231240dbb01d5561fd427b2bad0851b8995ca2ece72a0a1519294edba18c6a8e2222d79807bd774495ccb7d204d3a864070a7cba8cf8a9b30ea5a1ca477f38781bc99a0c59e52783c03a05238e684438e388e205bf419c37a1b47566fca2b094f4286fe004d36537acfba078d20259ba0ad6529f7b7ab37eca569614e784124e783a9acf9a944316579c55a14b1cf052283006e28edaa6a6d180fd91763a4b84db22d7d7f4aabb1885e82179f0dafad4dc8c5903b208f43faf57f99e54d8567e2e2611ecb4cd48cb63dbad4ab74b6be15ce5b8e9672d0f1a26517a502e23d6caf0e911c9afb7c8688ae6c6e8adc950a80b25d60fc39e140aeacf2c1fd7449b4c0a0401c5ff961fbaca412a19d37bf1495ff6cc24cd007f8f75d1c2c41f4dc17b1fcc00d5d7a486d4ffc07946948a04470eb52ac35d035e208b7e019a345177695a12c4e0b6481214f15261a99323b6e7c88782e0b3d1f01961108825a3af817c1c46b2cfb16e413f8d94d91da950e2e5a6aea42e47bd6747a56263d31b60983c84dc307bece1782b08f97a8ed4586166952d3ec91b468466d0ce9a071beda843e7187c68b2de05ab20802573d8054efbe02c52ae66c97e9dfefde3e6a8b696ea0aaad7fa833f959b3c6796ea13cd1610523a4f957a83317917421f7547bd480fcff055154394dd9992d2dab761f69d43c65db65d5c01d39e190bf5b026fe10ce74339a9e00583871987c052296fc5921f3ea63da0b58718a2cf42c57a5ad1e11a16db7050e20e3c68159eb290339944868accabfa017bd524c4085ae363b6689439dd0c17702042b2d379f447a3732524ee7cf8c891b6ae281c545715d2c4edaf9096233fd0932ee5cdd3c362ef4681ad8bf329afabb835b69dc707aaa14df04087d47acecbf01fc135c3467a6c4c5a0460097bd74969486d1a9c3c10d0cd17d302f3997ae42ca45a0d5f2296f5f268bccc91e3ca94f15a75f96e62115889a43234f0d5782cc002b999e75b6e90171a1c15c49537537be60f1d27c7d6e251b8f4bed0aea29bd9a88156ce36b92370f7040d5d3e4f0e93aae1a8f6450f1ac7b79659e34aa07171958863a84e68a20d3ed5bce364ca7f498e7c9911a5afaed7b884805d718a75324d566da3ee3a2118f7bf659571f331e3b0a18fca91a4cd90385327a767977697f48391329337886e472ae19ad93608b0ceffa5a56778815833c564facce23a9d53524abdf18ec4f76add1c62d30337c98a8bf1fa25c83ef7088e6d9940a3e8090831be3230405af5ceeba3341a5b04be08c7b14f669b91d2d1fb30be04d0586aa86d8325357e5c4f49904b210ed699f5c2c5629fb95d9f1dc43d27f98cfabeb8fa33b39b49072f86e40f2c87d5515e913a68efc719117813ef57ef2d83535ed63c6596c6050d5d08cb1bc89b72531ae246b57b074fe583a7bf689bd3e86c2f5955b2e40033c5640a85ba6b84d9b7486b517556a212c9d210bdd9732c8ba8c3c90d44f5f7b2e2710fecdc3979a519bd8cc3b17864f85a1eb205f6b4c6f9ab410b7cddcf2b30a11ea1dcae2e8d7d27b4a0798532ec44f31885558a549b7adec98fda46b007ced74e1367727ba29b82695340229500284c60a60171a89cb3c5117421a01ab48a5951837d934b1993521fcd3ddc3a09259406c389f8c8af5b9a8b5760dc41b5970a0ec707c0782976a696f692b4c1da3b083339feda267e50df69b8db90a925f2989410cb5020419938b2f46f980acb45ea552fc77be3a756a1517e62703c2641755dd2285f515af4ccbc97334701d2e6e5ca74ebce1f6216668fbf4c5414adae35e7ec547c0a8f9e8d5d89cf4f1156119c5f084ccabb30fcf6774b24eb6cb210a2e0ec2cc3ae0863df14a9d82a6cbddea53429f49bbcd81c30f3661e2a7faf2e1bdb15c60353e305f83efbed25d4143a5b78c6483681792dfe994a38ed3d8144e6f0575b026db965fa28480c636865a77daef6a7e7cfed2d10b4a6a9bdc6834a5955585577171a8fe5a8c225b16abc5957f999d6953aa2b109ea1450cf1ecd30ae024dee6b83a1e5544b5a571671a92e1862429c7ccb350bb133fa58ed72c368ffff9e170b4d097198a8f444cd8aceee218f9c9f28e970f58131bb261dca3b0b90d0141b7aaffdf26b5f5a4613bfa2c1d3583fcd590d663b4d376504c66c37413335140536ef1e38a05c5274aee3ddfb3d53ac297c65977a5d3657cd82ea5a6d31133317794290925b87b1b404a285d398c6d0341bf1216bb2b5411f6ee061bb3bbe0f45cd272f3b37233a1b9931bf84a1b39a8e61e73c5f355184bed12617e99e65fe80a3bb6b206659eacf9f8f505b16f7ae30ce3ef95229b3358d026b2b48188d9bd2d16164f6ea9d88681212ceed591b6b5f1a3e00c5d0e125afe4ecab6d7809d6380522b7ca65ba63a993ab53b0592357d833070e70bee41591071e40807c3bd9b5081f66b77504741cfded9b1fc9a6010fcf97f0ce931cda945f8205284fb50d2fea428cc3154e6f875016efcf12545a1cd419fb888db2b02687c956bcd0aa6ff04572840cc243ca29d6a0a73f747d23ee3ba54ffda26927f31dd4d6668f5e1efc49ce0ec03d4195efc84e2044c250eaaefb10a931e3c9fa21e03ae40b216aff2f9576e5fe2859f8881131c75785a099cd553f4d85cae66f8e3036dff57c9e181688e175c9acbf10d3c03747a438a6b2b93be4b851a7b17ed62c51a0033c032471ded692d876d38b5fe9c049c08c4272278fa98da5ea40bbb2e7b130dab86ed17ea30d4408f4ccde4b74091706d63e420cc97e40a663bfe340e714f03ab0a08e5a45fc6cf8a8f6f089097cb5be3f72e3c184e53c777c2bae31d37127f475120b7816ea27d66755328c0f1beb6d21d99ba26a8cf386bd29af2ea62d479dc15042c5a0860f5fd3d809c6a830f77f1f1336dcbb7a8e3540cc9cb79c9a09973f02943f3b3526e89696adf57decc307f62bed37e5bac38001e867a3b9f359b124e66c555ee91304813e000de192fcc7535138483d0ba233259d5ebef448730a8c99a5c0bc7367fdd22d6b1e720e221d5928b7948c106bc2f0047ca3be2aa478c77bbe2c0bcc8703e959758378a22538da0c3740630032458dc7e2fa305b7b757e9b884f5eaee4b4d9246c44e4a745e29e52ed3355ef5c795a897bbf719be2b56cd4bef5c824aeb7005e7f82d0376007325ee14c893f5e86bbde83f2f424c4ce3bcb45b522f9ec17150483c044a25e810fd06125b627aff8b78cf52768aa795366f80190c51257694110d332d9f9dd90b1292885dcaef6be43f97910d4f8b163baf8d83eec1231f339c4d98a9537a9c34d400253d72bf3b9f5613b0d77830502bd035bc78a627dd8de717fc7caa9c26c158ef3407f5a7190c7316487d", 0x1000, 0x9cb}, {&(0x7f0000000100)="87476ffb7355f9b87e777b087d1760c6", 0x10, 0xcf}, {&(0x7f0000000240)="16b681501628ad0991495e434f1ee7f66d9a22aa94ca50e6acdd38b65be6cad46a3c93bdcb758fe6a9f7650042c07b301160858ed7e9c24bf9b48b29c7bc49cc280b6697624dba909387b5", 0x4b, 0x200}, {&(0x7f0000002580)="aea807646788f24abd4804aac0a66d0c0131c17c56a473e7db33de55110bde2d56eb09fd667c0b76b81857d16ffe14f1422fa20a4c595d879207fa14f81a904db0f15b8bb193451ba57ca249e413f736e7239a7afb53482729d9ab6e0d69eba5d242899be1ee7f6bd0bcd2c1ee558b8294dfef25b1f37ed3a1952e026ec48b5c6547df93b027d9015e5023793cc685493c68eba4568d1081cc8cea76ee098901cf848e6593113a753df6932c6fa0bffb316ace4f7a104ef8e65a6407aed58a00abc261ae2817c49ae384b9f945d460779925fb98fa8dde16cf8ab2400a7dc0", 0xdf, 0x8c}], 0x2000008, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6f6e756d7461696c3d302c73686f72746e616d653d6d697865642c636f6e746578743d73797361646d41a23a07"]) 02:56:46 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 1008.949917] FAULT_INJECTION: forcing a failure. [ 1008.949917] name failslab, interval 1, probability 0, space 0, times 0 [ 1008.952677] CPU: 0 PID: 7369 Comm: syz-executor.7 Not tainted 5.10.237 #1 02:56:46 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000000c0)) [ 1008.954502] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1008.956642] Call Trace: [ 1008.957297] dump_stack+0x107/0x167 [ 1008.958198] should_fail.cold+0x5/0xa [ 1008.959153] ? create_object.isra.0+0x3a/0xa20 [ 1008.960281] should_failslab+0x5/0x20 [ 1008.961208] kmem_cache_alloc+0x5b/0x310 [ 1008.962219] create_object.isra.0+0x3a/0xa20 [ 1008.963309] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1008.964552] __kmalloc_track_caller+0x177/0x370 [ 1008.965696] ? match_number+0xaf/0x1d0 [ 1008.966662] kmemdup_nul+0x2d/0xa0 [ 1008.967543] match_number+0xaf/0x1d0 [ 1008.968447] ? match_u64+0x190/0x190 [ 1008.969344] ? __kmalloc_track_caller+0x2c6/0x370 [ 1008.970523] ? memcpy+0x39/0x60 [ 1008.971352] parse_opts.part.0+0x1f3/0x340 [ 1008.972384] ? p9_fd_show_options+0x1c0/0x1c0 [ 1008.973489] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1008.974804] ? trace_hardirqs_on+0x5b/0x180 [ 1008.975878] ? kfree+0xd7/0x340 [ 1008.976702] p9_fd_create+0x98/0x4a0 [ 1008.977608] ? p9_conn_create+0x510/0x510 [ 1008.978635] ? p9_client_create+0x798/0x1230 [ 1008.979714] ? kfree+0xd7/0x340 [ 1008.980528] ? do_raw_spin_unlock+0x4f/0x220 [ 1008.981604] p9_client_create+0x7ff/0x1230 [ 1008.982661] ? p9_client_flush+0x430/0x430 [ 1008.983690] ? trace_hardirqs_on+0x5b/0x180 [ 1008.984759] ? lockdep_init_map_type+0x2c7/0x780 [ 1008.985923] ? __raw_spin_lock_init+0x36/0x110 [ 1008.987047] v9fs_session_init+0x1dd/0x1680 [ 1008.988121] ? lock_release+0x680/0x680 [ 1008.989102] ? kmem_cache_alloc_trace+0x151/0x320 [ 1008.990278] ? v9fs_show_options+0x690/0x690 [ 1008.991376] ? trace_hardirqs_on+0x5b/0x180 [ 1008.992435] ? kasan_unpoison_shadow+0x33/0x50 [ 1008.993550] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1008.994785] v9fs_mount+0x79/0x8f0 [ 1008.995661] ? v9fs_write_inode+0x60/0x60 [ 1008.996668] legacy_get_tree+0x105/0x220 [ 1008.997666] vfs_get_tree+0x8e/0x300 [ 1008.998566] path_mount+0x1429/0x2120 [ 1008.999515] ? strncpy_from_user+0x9e/0x470 [ 1009.000578] ? finish_automount+0xa90/0xa90 [ 1009.001630] ? getname_flags.part.0+0x1dd/0x4f0 [ 1009.002782] ? _copy_from_user+0xfb/0x1b0 [ 1009.003824] __x64_sys_mount+0x282/0x300 [ 1009.004827] ? copy_mnt_ns+0xa00/0xa00 [ 1009.005792] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1009.007092] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1009.008364] do_syscall_64+0x33/0x40 [ 1009.009263] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1009.010520] RIP: 0033:0x7f0ec334eb19 [ 1009.011432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1009.015933] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1009.017814] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1009.019586] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1009.021352] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1009.023132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1009.024900] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:56:46 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) [ 1009.032103] loop4: detected capacity change from 0 to 33559552 [ 1009.058493] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1009.175535] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:56:46 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 1009.204805] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:56:46 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) 02:56:46 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:56:46 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x80004, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) write$P9_RREADLINK(r2, &(0x7f0000000300)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) mount$9p_tcp(&(0x7f0000000040), &(0x7f0000000100)='./file1\x00', &(0x7f0000000140), 0x80, &(0x7f0000000240)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@aname={'aname', 0x3d, 'vfat\x00'}}], [{@subj_role}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@permit_directio}]}}) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:56:46 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 33) 02:56:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) [ 1009.387974] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1009.411857] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:56:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) [ 1009.444778] FAULT_INJECTION: forcing a failure. [ 1009.444778] name failslab, interval 1, probability 0, space 0, times 0 [ 1009.447237] CPU: 1 PID: 7394 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1009.448742] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1009.450551] Call Trace: [ 1009.451140] dump_stack+0x107/0x167 [ 1009.451938] should_fail.cold+0x5/0xa [ 1009.452770] ? create_object.isra.0+0x3a/0xa20 [ 1009.453775] should_failslab+0x5/0x20 [ 1009.454610] kmem_cache_alloc+0x5b/0x310 [ 1009.455506] ? p9_fd_show_options+0x1c0/0x1c0 [ 1009.456483] create_object.isra.0+0x3a/0xa20 [ 1009.457439] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1009.458550] kmem_cache_alloc_trace+0x151/0x320 [ 1009.459572] p9_fd_create+0x161/0x4a0 [ 1009.460405] ? p9_conn_create+0x510/0x510 [ 1009.461310] ? p9_client_create+0x798/0x1230 [ 1009.462268] ? kfree+0xd7/0x340 [ 1009.462983] ? do_raw_spin_unlock+0x4f/0x220 [ 1009.463962] p9_client_create+0x7ff/0x1230 [ 1009.464901] ? p9_client_flush+0x430/0x430 [ 1009.465796] ? trace_hardirqs_on+0x5b/0x180 [ 1009.466737] ? lockdep_init_map_type+0x2c7/0x780 [ 1009.467768] ? __raw_spin_lock_init+0x36/0x110 [ 1009.468761] v9fs_session_init+0x1dd/0x1680 [ 1009.469693] ? lock_release+0x680/0x680 [ 1009.470564] ? kmem_cache_alloc_trace+0x151/0x320 [ 1009.471616] ? v9fs_show_options+0x690/0x690 [ 1009.472572] ? trace_hardirqs_on+0x5b/0x180 [ 1009.473504] ? kasan_unpoison_shadow+0x33/0x50 [ 1009.474493] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1009.475599] v9fs_mount+0x79/0x8f0 [ 1009.476366] ? v9fs_write_inode+0x60/0x60 [ 1009.477266] legacy_get_tree+0x105/0x220 [ 1009.478145] vfs_get_tree+0x8e/0x300 [ 1009.478945] path_mount+0x1429/0x2120 [ 1009.479788] ? strncpy_from_user+0x9e/0x470 [ 1009.479870] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1009.480717] ? finish_automount+0xa90/0xa90 [ 1009.480736] ? getname_flags.part.0+0x1dd/0x4f0 [ 1009.480754] ? _copy_from_user+0xfb/0x1b0 [ 1009.480778] __x64_sys_mount+0x282/0x300 [ 1009.480794] ? copy_mnt_ns+0xa00/0xa00 [ 1009.480816] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1009.480835] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1009.480854] do_syscall_64+0x33/0x40 [ 1009.480873] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1009.480885] RIP: 0033:0x7f0ec334eb19 [ 1009.480910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1009.497387] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1009.499066] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1009.500643] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1009.502209] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1009.503778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1009.505343] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1009.517119] 9pnet: p9_fd_create_tcp (7395): problem connecting socket to 127.0.0.1 [ 1009.548049] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:56:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 34) 02:56:59 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:56:59 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:56:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:56:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:56:59 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) openat(r1, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='cgroup.events\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) mkdirat(r1, &(0x7f0000000100)='./file1\x00', 0x45) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400000, 0x4) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x3, 0xffff, 0x9}) 02:56:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) [ 1022.312020] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1022.330392] loop1: detected capacity change from 0 to 33559552 02:56:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) [ 1022.350320] FAULT_INJECTION: forcing a failure. [ 1022.350320] name failslab, interval 1, probability 0, space 0, times 0 [ 1022.351322] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1022.352187] CPU: 1 PID: 7417 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1022.356581] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1022.357927] Call Trace: [ 1022.358346] dump_stack+0x107/0x167 [ 1022.358941] should_fail.cold+0x5/0xa [ 1022.359581] ? p9_client_prepare_req.part.0+0x3a/0xac0 [ 1022.360417] should_failslab+0x5/0x20 [ 1022.361035] kmem_cache_alloc+0x5b/0x310 [ 1022.361693] p9_client_prepare_req.part.0+0x3a/0xac0 [ 1022.362519] p9_client_rpc+0x220/0x1370 [ 1022.363160] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1022.364017] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1022.364884] ? pipe_poll+0x21b/0x800 [ 1022.365472] ? p9_fd_close+0x4a0/0x4a0 [ 1022.366103] ? wait_for_partner+0x3c0/0x3c0 [ 1022.366779] ? p9_fd_poll+0x1e0/0x2c0 [ 1022.367386] ? p9_fd_create+0x357/0x4a0 [ 1022.368031] ? p9_conn_create+0x510/0x510 [ 1022.368700] ? p9_client_create+0x798/0x1230 [ 1022.369392] ? kfree+0xd7/0x340 [ 1022.369910] ? do_raw_spin_unlock+0x4f/0x220 [ 1022.370602] p9_client_create+0xa76/0x1230 [ 1022.371285] ? p9_client_flush+0x430/0x430 [ 1022.371940] ? trace_hardirqs_on+0x5b/0x180 [ 1022.372618] ? lockdep_init_map_type+0x2c7/0x780 [ 1022.373378] ? __raw_spin_lock_init+0x36/0x110 [ 1022.374120] v9fs_session_init+0x1dd/0x1680 [ 1022.374812] ? lock_release+0x680/0x680 [ 1022.375408] ? kmem_cache_alloc_trace+0x151/0x320 [ 1022.376186] ? v9fs_show_options+0x690/0x690 [ 1022.376891] ? trace_hardirqs_on+0x5b/0x180 [ 1022.377588] ? kasan_unpoison_shadow+0x33/0x50 [ 1022.378307] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1022.379130] v9fs_mount+0x79/0x8f0 [ 1022.379731] ? v9fs_write_inode+0x60/0x60 [ 1022.380397] legacy_get_tree+0x105/0x220 [ 1022.381060] vfs_get_tree+0x8e/0x300 [ 1022.381119] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1022.381657] path_mount+0x1429/0x2120 [ 1022.381674] ? strncpy_from_user+0x9e/0x470 [ 1022.381687] ? finish_automount+0xa90/0xa90 [ 1022.381700] ? getname_flags.part.0+0x1dd/0x4f0 [ 1022.381713] ? _copy_from_user+0xfb/0x1b0 [ 1022.381731] __x64_sys_mount+0x282/0x300 [ 1022.381742] ? copy_mnt_ns+0xa00/0xa00 [ 1022.381758] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1022.381773] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1022.381787] do_syscall_64+0x33/0x40 [ 1022.381801] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1022.381810] RIP: 0033:0x7f0ec334eb19 [ 1022.381822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1022.381838] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1022.396548] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1022.397657] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1022.398781] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1022.399908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1022.401026] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:56:59 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) 02:56:59 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 1022.404013] loop6: detected capacity change from 0 to 33559552 [ 1022.409943] loop4: detected capacity change from 0 to 33559552 02:57:00 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) 02:57:00 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 35) 02:57:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) openat(r0, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) openat(r0, &(0x7f0000000040)='./file0\x00', 0x101000, 0x10) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x5, 0x0, @fd, 0x0, 0x0, 0x0, {0x2100}, 0x1}, 0xfffffffc) [ 1022.624233] FAULT_INJECTION: forcing a failure. [ 1022.624233] name failslab, interval 1, probability 0, space 0, times 0 [ 1022.627071] CPU: 0 PID: 7435 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1022.628796] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1022.630730] Call Trace: [ 1022.631382] dump_stack+0x107/0x167 [ 1022.632236] should_fail.cold+0x5/0xa [ 1022.633164] ? p9_client_prepare_req.part.0+0x3a/0xac0 [ 1022.634420] should_failslab+0x5/0x20 [ 1022.635331] kmem_cache_alloc+0x5b/0x310 [ 1022.636290] p9_client_prepare_req.part.0+0x3a/0xac0 [ 1022.637508] p9_client_rpc+0x220/0x1370 [ 1022.638433] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1022.639701] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1022.640988] ? pipe_poll+0x21b/0x800 [ 1022.641897] ? p9_fd_close+0x4a0/0x4a0 [ 1022.642826] ? wait_for_partner+0x3c0/0x3c0 [ 1022.643863] ? p9_fd_poll+0x1e0/0x2c0 [ 1022.644763] ? p9_fd_create+0x357/0x4a0 [ 1022.645718] ? p9_conn_create+0x510/0x510 [ 1022.646710] ? p9_client_create+0x798/0x1230 [ 1022.647740] ? kfree+0xd7/0x340 [ 1022.648526] ? do_raw_spin_unlock+0x4f/0x220 [ 1022.649711] p9_client_create+0xa76/0x1230 [ 1022.650726] ? p9_client_flush+0x430/0x430 [ 1022.651769] ? trace_hardirqs_on+0x5b/0x180 [ 1022.652763] ? lockdep_init_map_type+0x2c7/0x780 [ 1022.653864] ? __raw_spin_lock_init+0x36/0x110 [ 1022.654948] v9fs_session_init+0x1dd/0x1680 [ 1022.655992] ? lock_release+0x680/0x680 [ 1022.656975] ? kmem_cache_alloc_trace+0x151/0x320 [ 1022.658106] ? v9fs_show_options+0x690/0x690 [ 1022.659308] ? trace_hardirqs_on+0x5b/0x180 [ 1022.660274] ? kasan_unpoison_shadow+0x33/0x50 [ 1022.661354] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1022.662560] v9fs_mount+0x79/0x8f0 [ 1022.663401] ? v9fs_write_inode+0x60/0x60 [ 1022.664381] legacy_get_tree+0x105/0x220 [ 1022.665357] vfs_get_tree+0x8e/0x300 [ 1022.666257] path_mount+0x1429/0x2120 [ 1022.667190] ? strncpy_from_user+0x9e/0x470 [ 1022.668235] ? finish_automount+0xa90/0xa90 [ 1022.669224] ? getname_flags.part.0+0x1dd/0x4f0 [ 1022.670329] ? _copy_from_user+0xfb/0x1b0 [ 1022.671331] __x64_sys_mount+0x282/0x300 [ 1022.672420] ? copy_mnt_ns+0xa00/0xa00 [ 1022.673345] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1022.674562] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1022.675784] do_syscall_64+0x33/0x40 [ 1022.676693] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1022.677890] RIP: 0033:0x7f0ec334eb19 [ 1022.678785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1022.683206] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1022.685004] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1022.686686] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1022.688423] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1022.690118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1022.691790] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1022.711896] loop6: detected capacity change from 0 to 33559552 02:57:12 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) 02:57:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:57:12 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 36) 02:57:12 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) 02:57:12 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(0x0, 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:57:12 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 1034.824782] loop1: detected capacity change from 0 to 33559552 02:57:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:57:12 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file1\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x9, 0x1, &(0x7f0000000100)=[{&(0x7f0000000480)="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", 0x1000, 0x8}], 0x20000, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7}}, {@grpjquota}, {@noinit_itable}, {@discard}, {@oldalloc}], [{@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@fowner_lt={'fowner<', 0xee00}}]}) [ 1034.847880] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1034.859850] loop6: detected capacity change from 0 to 33559552 [ 1034.864389] FAULT_INJECTION: forcing a failure. [ 1034.864389] name failslab, interval 1, probability 0, space 0, times 0 [ 1034.865860] CPU: 1 PID: 7454 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1034.866725] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1034.867803] Call Trace: [ 1034.868157] dump_stack+0x107/0x167 [ 1034.868639] should_fail.cold+0x5/0xa [ 1034.869117] ? p9_fcall_init+0x97/0x290 [ 1034.869625] should_failslab+0x5/0x20 [ 1034.870103] __kmalloc+0x72/0x390 [ 1034.870536] p9_fcall_init+0x97/0x290 [ 1034.871018] p9_client_prepare_req.part.0+0x8c/0xac0 [ 1034.871655] p9_client_rpc+0x220/0x1370 [ 1034.872145] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1034.872795] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1034.873456] ? pipe_poll+0x21b/0x800 [ 1034.873912] ? p9_fd_close+0x4a0/0x4a0 [ 1034.874404] ? wait_for_partner+0x3c0/0x3c0 [ 1034.874951] ? p9_fd_poll+0x1e0/0x2c0 [ 1034.875475] ? p9_fd_create+0x357/0x4a0 [ 1034.875968] ? p9_conn_create+0x510/0x510 [ 1034.876478] ? p9_client_create+0x798/0x1230 [ 1034.877018] ? kfree+0xd7/0x340 [ 1034.877429] ? do_raw_spin_unlock+0x4f/0x220 [ 1034.877982] p9_client_create+0xa76/0x1230 [ 1034.878529] ? p9_client_flush+0x430/0x430 [ 1034.879060] ? trace_hardirqs_on+0x5b/0x180 [ 1034.879616] ? lockdep_init_map_type+0x2c7/0x780 [ 1034.880203] ? __raw_spin_lock_init+0x36/0x110 [ 1034.880771] v9fs_session_init+0x1dd/0x1680 [ 1034.881315] ? lock_release+0x680/0x680 [ 1034.881809] ? kmem_cache_alloc_trace+0x151/0x320 [ 1034.882409] ? v9fs_show_options+0x690/0x690 [ 1034.882956] ? trace_hardirqs_on+0x5b/0x180 [ 1034.883491] ? kasan_unpoison_shadow+0x33/0x50 [ 1034.884050] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1034.884678] v9fs_mount+0x79/0x8f0 [ 1034.885140] ? v9fs_write_inode+0x60/0x60 [ 1034.885660] legacy_get_tree+0x105/0x220 [ 1034.886168] vfs_get_tree+0x8e/0x300 [ 1034.886627] path_mount+0x1429/0x2120 [ 1034.887099] ? strncpy_from_user+0x9e/0x470 [ 1034.887634] ? finish_automount+0xa90/0xa90 [ 1034.888183] ? getname_flags.part.0+0x1dd/0x4f0 [ 1034.888769] ? _copy_from_user+0xfb/0x1b0 [ 1034.889287] __x64_sys_mount+0x282/0x300 [ 1034.889797] ? copy_mnt_ns+0xa00/0xa00 [ 1034.890277] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1034.890923] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1034.891565] do_syscall_64+0x33/0x40 [ 1034.892021] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1034.892652] RIP: 0033:0x7f0ec334eb19 [ 1034.893289] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1034.895539] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1034.896470] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1034.897340] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1034.898212] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1034.899084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1034.899968] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:57:12 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) 02:57:12 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) [ 1034.908257] loop4: detected capacity change from 0 to 33559552 02:57:12 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 37) 02:57:12 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(0x0, 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:57:12 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000000001000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x9000, 0x40) chdir(&(0x7f0000000180)='./file0\x00') r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x90c0, 0x0) statx(r2, &(0x7f0000000240)='./file1/file0\x00', 0x2000, 0x1, &(0x7f0000000300)) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3}, './file2\x00'}) openat(r4, &(0x7f0000000100)='./file1\x00', 0x8040, 0x8) sendmsg$nl_generic(r2, &(0x7f0000003780)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000400)={&(0x7f0000003880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="080039003b88ffff010a67cb784ed346844b02b2ac23de8733641b0e4f92396ded20d5f844d730d6f8c005bf1e0a864608b0d3a8c289afd6240ced79d18f7e506c60719ac4be6f103a2b5a621645dfb460c917dc576ea5cb98b08aa93cf6d681b34d1f4f5d61252b528b4807ce7e13ef6e1ef92e6091f3de39198177560b6f58cae52f6e5e23df78d538a2a1a0f4a8e6df2da3d9ee29d925f3f2fbcec1acd02f076442fcef14006a8008001500cd4f7503000000000000b3506f4596d9215ee4229d0e621e2015936a097e1fa2db351f359b4d13a6af2e5527112627d746ce8e56ad95b1", @ANYRES32=0x0, @ANYBLOB="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"], 0x32e8}, 0x1, 0x0, 0x0, 0x40000}, 0x240000d0) r5 = io_uring_setup(0xa70, &(0x7f00000037c0)={0x0, 0x866b, 0x10, 0x3, 0x268, 0x0, r4}) fremovexattr(r5, &(0x7f0000003840)=@random={'user.', '\xf1\x00'}) 02:57:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1035.104085] FAULT_INJECTION: forcing a failure. [ 1035.104085] name failslab, interval 1, probability 0, space 0, times 0 [ 1035.106827] CPU: 0 PID: 7475 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1035.108392] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1035.110289] Call Trace: [ 1035.110894] dump_stack+0x107/0x167 [ 1035.111741] should_fail.cold+0x5/0xa [ 1035.112613] ? p9_fcall_init+0x97/0x290 [ 1035.113519] should_failslab+0x5/0x20 [ 1035.114385] __kmalloc+0x72/0x390 [ 1035.115172] p9_fcall_init+0x97/0x290 [ 1035.116051] p9_client_prepare_req.part.0+0x8c/0xac0 [ 1035.117207] p9_client_rpc+0x220/0x1370 [ 1035.118130] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1035.119328] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1035.120547] ? pipe_poll+0x21b/0x800 [ 1035.121385] ? p9_fd_close+0x4a0/0x4a0 [ 1035.122262] ? wait_for_partner+0x3c0/0x3c0 [ 1035.123244] ? p9_fd_poll+0x1e0/0x2c0 [ 1035.124112] ? p9_fd_create+0x357/0x4a0 [ 1035.125004] ? p9_conn_create+0x510/0x510 [ 1035.125943] ? p9_client_create+0x798/0x1230 [ 1035.126943] ? kfree+0xd7/0x340 [ 1035.127689] ? do_raw_spin_unlock+0x4f/0x220 [ 1035.128687] p9_client_create+0xa76/0x1230 [ 1035.129643] ? p9_client_flush+0x430/0x430 [ 1035.130601] ? trace_hardirqs_on+0x5b/0x180 [ 1035.131581] ? lockdep_init_map_type+0x2c7/0x780 [ 1035.132651] ? __raw_spin_lock_init+0x36/0x110 [ 1035.133685] v9fs_session_init+0x1dd/0x1680 [ 1035.134658] ? lock_release+0x680/0x680 [ 1035.135567] ? kmem_cache_alloc_trace+0x151/0x320 [ 1035.136651] ? v9fs_show_options+0x690/0x690 [ 1035.137648] ? trace_hardirqs_on+0x5b/0x180 [ 1035.138623] ? kasan_unpoison_shadow+0x33/0x50 [ 1035.139657] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1035.140805] v9fs_mount+0x79/0x8f0 [ 1035.141611] ? v9fs_write_inode+0x60/0x60 [ 1035.142548] legacy_get_tree+0x105/0x220 [ 1035.143479] vfs_get_tree+0x8e/0x300 [ 1035.144316] path_mount+0x1429/0x2120 [ 1035.145187] ? strncpy_from_user+0x9e/0x470 [ 1035.146156] ? finish_automount+0xa90/0xa90 [ 1035.147129] ? getname_flags.part.0+0x1dd/0x4f0 [ 1035.148189] ? _copy_from_user+0xfb/0x1b0 [ 1035.149126] __x64_sys_mount+0x282/0x300 [ 1035.150032] ? copy_mnt_ns+0xa00/0xa00 [ 1035.150914] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1035.152101] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1035.153262] do_syscall_64+0x33/0x40 [ 1035.154103] entry_SYSCALL_64_after_hwframe+0x67/0xd1 02:57:12 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(0x0, 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 1035.155263] RIP: 0033:0x7f0ec334eb19 [ 1035.156305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1035.160478] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1035.162200] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1035.163964] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1035.165576] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1035.167193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1035.168816] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:57:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) 02:57:12 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:57:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) [ 1035.307256] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:57:25 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 38) 02:57:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:57:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) 02:57:25 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:57:25 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:57:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:57:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) 02:57:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1047.716438] loop1: detected capacity change from 0 to 33559552 [ 1047.725048] loop4: detected capacity change from 0 to 33559552 [ 1047.726125] FAULT_INJECTION: forcing a failure. [ 1047.726125] name failslab, interval 1, probability 0, space 0, times 0 [ 1047.728791] CPU: 1 PID: 7510 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1047.730222] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1047.731935] Call Trace: [ 1047.732489] dump_stack+0x107/0x167 [ 1047.733244] should_fail.cold+0x5/0xa [ 1047.734034] ? p9_fcall_init+0x97/0x290 [ 1047.734858] should_failslab+0x5/0x20 [ 1047.735647] __kmalloc+0x72/0x390 [ 1047.736365] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1047.737368] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1047.737429] p9_fcall_init+0x97/0x290 [ 1047.740861] p9_client_prepare_req.part.0+0xf4/0xac0 [ 1047.741948] p9_client_rpc+0x220/0x1370 [ 1047.742782] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1047.743903] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1047.745029] ? pipe_poll+0x21b/0x800 [ 1047.745815] ? p9_fd_close+0x4a0/0x4a0 [ 1047.746634] ? wait_for_partner+0x3c0/0x3c0 [ 1047.747528] ? p9_fd_poll+0x1e0/0x2c0 [ 1047.748343] ? p9_fd_create+0x357/0x4a0 [ 1047.749161] ? p9_conn_create+0x510/0x510 [ 1047.750039] ? p9_client_create+0x798/0x1230 [ 1047.750961] ? kfree+0xd7/0x340 [ 1047.751656] ? do_raw_spin_unlock+0x4f/0x220 [ 1047.752575] p9_client_create+0xa76/0x1230 [ 1047.753473] ? p9_client_flush+0x430/0x430 [ 1047.754363] ? trace_hardirqs_on+0x5b/0x180 [ 1047.755290] ? lockdep_init_map_type+0x2c7/0x780 [ 1047.756304] ? __raw_spin_lock_init+0x36/0x110 [ 1047.757252] v9fs_session_init+0x1dd/0x1680 [ 1047.758164] ? lock_release+0x680/0x680 [ 1047.759003] ? kmem_cache_alloc_trace+0x151/0x320 [ 1047.760023] ? v9fs_show_options+0x690/0x690 [ 1047.760934] ? trace_hardirqs_on+0x5b/0x180 [ 1047.761835] ? kasan_unpoison_shadow+0x33/0x50 [ 1047.762776] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1047.763844] v9fs_mount+0x79/0x8f0 [ 1047.764567] ? v9fs_write_inode+0x60/0x60 [ 1047.765446] legacy_get_tree+0x105/0x220 [ 1047.766314] vfs_get_tree+0x8e/0x300 [ 1047.767095] path_mount+0x1429/0x2120 [ 1047.767886] ? strncpy_from_user+0x9e/0x470 [ 1047.768798] ? finish_automount+0xa90/0xa90 [ 1047.769705] ? getname_flags.part.0+0x1dd/0x4f0 [ 1047.770681] ? _copy_from_user+0xfb/0x1b0 [ 1047.771571] __x64_sys_mount+0x282/0x300 [ 1047.772419] ? copy_mnt_ns+0xa00/0xa00 [ 1047.773227] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1047.774338] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1047.775425] do_syscall_64+0x33/0x40 [ 1047.776233] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1047.777320] RIP: 0033:0x7f0ec334eb19 [ 1047.778112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1047.781990] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1047.783609] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1047.785107] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1047.786610] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1047.788114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1047.789621] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1047.804153] loop6: detected capacity change from 0 to 33559552 02:57:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) 02:57:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)) 02:57:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:57:25 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:57:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file1\x00', 0x6, 0x4, &(0x7f0000000580)=[{&(0x7f0000000300)="a56f7ff24ad52c6cad08d8f82d344123b2f85245343757a05ef57ad44057d85624383a2afdf7cbdc7788cf98122fbff54146e87fb43858bdeec55f375c42bade22ebfa47230d24a7f895324417cf6f14e8b704443e4767b2ff394ec78e4c757fc43848c4678778ebb5b6c62a2d16680f663582ee82f1522af647a861fa6a46a48c50c9efac651bb85a068599c29d4a03d292928e3712fb8a69428e90423601af76c202d7d60db63ca20926c432ad60625379128a82b1f65761e1cecc73149026531c7f49211ea272f59a70d594fec2c40e05ec6b6587a59dba7783", 0xdb, 0x9}, {&(0x7f0000000480)="421bcea040b62f7b34add83ed00295af72f6be9684eef95120f27e29dac17f6e2c7ae91da24a1c104418e3a3f6a671d1bbaceb37fad362bed1a9b3e3239d25769b308ef5f5125cdf73bac0f83c8302970e31fad0c6ee3fa9bfcd9fbd2a84d9ba0d5eb00bba3ac023434851eabd4fb42d54744ee9385e83e3e59353a1ac6b514b466c266d3ecddf071ace9f08502e31af6940441a12e8c2cc0ba12f5af97eb81277aaee27e00236049406f1cb33ba3e274f4584d457634848be5f644d9aafa8820ec0d40005da428856c40cec5e295a2fd50ddd156d1fd7044b62794f4319950752fbcf38aeb8ab8ae5abda5e98", 0xed, 0x4}, {&(0x7f0000000100)="b561cf758a2f8a6d6b286987787fef908373ec2f27e1ae1f13656158cdb26165796115149ed1bb3b5df018281a7b74de3860231887bc3f91d089", 0x3a, 0x7f}, {&(0x7f0000000240)="3de85dbaf8613e8f20f8e383310588290f548346f8bf763e7a280d9fa787c2782bdcad27f5e16ae50f68d7857cf2296d3981609d477751b829e2be8fca705254eca645", 0x43, 0x400}], 0x20000, &(0x7f0000000600)=ANY=[@ANYBLOB="29267b0e2f2c76666174002c76666174002c76666174002c76666174002c402c272c76666174002c2c657569643c", @ANYRESDEC, @ANYBLOB=',defcontept=staff_u,\x00']) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000400), 0x400, &(0x7f0000000680)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}, {@afid={'afid', 0x3d, 0x81}}], [{@subj_user}, {@uid_gt={'uid>', r1}}, {@euid_gt={'euid>', 0xee01}}]}}) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:57:25 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:57:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000000c0)) 02:57:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000000c0)) 02:57:25 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 39) [ 1047.993902] loop4: detected capacity change from 0 to 33559552 [ 1048.031351] loop6: detected capacity change from 0 to 33559552 02:57:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000000c0)) [ 1048.100949] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1048.143383] FAULT_INJECTION: forcing a failure. [ 1048.143383] name failslab, interval 1, probability 0, space 0, times 0 [ 1048.145966] CPU: 0 PID: 7542 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1048.147521] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1048.149408] Call Trace: [ 1048.150010] dump_stack+0x107/0x167 [ 1048.150835] should_fail.cold+0x5/0xa [ 1048.151713] ? create_object.isra.0+0x3a/0xa20 [ 1048.152750] should_failslab+0x5/0x20 [ 1048.153617] kmem_cache_alloc+0x5b/0x310 [ 1048.154540] create_object.isra.0+0x3a/0xa20 [ 1048.155536] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1048.156707] __kmalloc+0x16e/0x390 [ 1048.157521] p9_fcall_init+0x97/0x290 [ 1048.158389] p9_client_prepare_req.part.0+0xf4/0xac0 [ 1048.159556] p9_client_rpc+0x220/0x1370 [ 1048.160463] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1048.161664] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1048.162876] ? pipe_poll+0x21b/0x800 [ 1048.163732] ? p9_fd_close+0x4a0/0x4a0 [ 1048.164618] ? wait_for_partner+0x3c0/0x3c0 [ 1048.165594] ? p9_fd_poll+0x1e0/0x2c0 [ 1048.166462] ? p9_fd_create+0x357/0x4a0 02:57:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1048.167366] ? p9_conn_create+0x510/0x510 [ 1048.168444] ? p9_client_create+0x798/0x1230 [ 1048.169436] ? kfree+0xd7/0x340 [ 1048.170177] ? do_raw_spin_unlock+0x4f/0x220 [ 1048.171179] p9_client_create+0xa76/0x1230 [ 1048.172156] ? p9_client_flush+0x430/0x430 [ 1048.173117] ? trace_hardirqs_on+0x5b/0x180 [ 1048.174097] ? lockdep_init_map_type+0x2c7/0x780 [ 1048.175172] ? __raw_spin_lock_init+0x36/0x110 [ 1048.176214] v9fs_session_init+0x1dd/0x1680 [ 1048.177189] ? lock_release+0x680/0x680 [ 1048.178094] ? kmem_cache_alloc_trace+0x151/0x320 [ 1048.179186] ? v9fs_show_options+0x690/0x690 [ 1048.180193] ? trace_hardirqs_on+0x5b/0x180 [ 1048.181169] ? kasan_unpoison_shadow+0x33/0x50 [ 1048.182194] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1048.183334] v9fs_mount+0x79/0x8f0 [ 1048.184147] ? v9fs_write_inode+0x60/0x60 [ 1048.185080] legacy_get_tree+0x105/0x220 [ 1048.185998] vfs_get_tree+0x8e/0x300 [ 1048.186841] path_mount+0x1429/0x2120 [ 1048.187715] ? strncpy_from_user+0x9e/0x470 [ 1048.188684] ? finish_automount+0xa90/0xa90 [ 1048.189655] ? getname_flags.part.0+0x1dd/0x4f0 [ 1048.190707] ? _copy_from_user+0xfb/0x1b0 [ 1048.191653] __x64_sys_mount+0x282/0x300 [ 1048.192567] ? copy_mnt_ns+0xa00/0xa00 [ 1048.193442] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1048.194621] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1048.195785] do_syscall_64+0x33/0x40 [ 1048.196620] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1048.197779] RIP: 0033:0x7f0ec334eb19 [ 1048.198620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1048.202785] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1048.204511] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1048.206126] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1048.207743] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1048.209358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1048.210975] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:57:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1048.276161] loop4: detected capacity change from 0 to 33559552 [ 1048.285842] loop1: detected capacity change from 0 to 33559552 02:57:38 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:57:38 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 40) 02:57:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:57:38 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x8000, &(0x7f0000000000)=ANY=[@ANYRES32=0x0]) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) openat(r1, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x40) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1061.471671] FAULT_INJECTION: forcing a failure. [ 1061.471671] name failslab, interval 1, probability 0, space 0, times 0 [ 1061.473297] CPU: 0 PID: 7559 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1061.473830] loop1: detected capacity change from 0 to 33559552 [ 1061.474120] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1061.476091] Call Trace: [ 1061.476416] dump_stack+0x107/0x167 [ 1061.476862] should_fail.cold+0x5/0xa [ 1061.477330] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1061.478026] should_failslab+0x5/0x20 [ 1061.478490] kmem_cache_alloc+0x5b/0x310 02:57:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000000c0)) [ 1061.478985] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1061.479781] idr_get_free+0x4b5/0x8f0 [ 1061.480249] idr_alloc_u32+0x170/0x2d0 [ 1061.480722] ? __fprop_inc_percpu_max+0x130/0x130 [ 1061.481307] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1061.481963] ? lock_release+0x680/0x680 [ 1061.482442] idr_alloc+0xc2/0x130 [ 1061.482859] ? idr_alloc_u32+0x2d0/0x2d0 [ 1061.483345] ? rwlock_bug.part.0+0x90/0x90 [ 1061.483864] p9_client_prepare_req.part.0+0x612/0xac0 [ 1061.484492] p9_client_rpc+0x220/0x1370 [ 1061.484970] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 02:57:39 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000000c0)) 02:57:39 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 1061.485608] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1061.486308] ? pipe_poll+0x21b/0x800 [ 1061.486755] ? p9_fd_close+0x4a0/0x4a0 [ 1061.487219] ? wait_for_partner+0x3c0/0x3c0 [ 1061.487751] ? p9_fd_poll+0x1e0/0x2c0 [ 1061.488209] ? p9_fd_create+0x357/0x4a0 [ 1061.488683] ? p9_conn_create+0x510/0x510 [ 1061.489179] ? p9_client_create+0x798/0x1230 [ 1061.489706] ? kfree+0xd7/0x340 [ 1061.490101] ? do_raw_spin_unlock+0x4f/0x220 [ 1061.490636] p9_client_create+0xa76/0x1230 [ 1061.491151] ? p9_client_flush+0x430/0x430 [ 1061.491661] ? trace_hardirqs_on+0x5b/0x180 [ 1061.492183] ? lockdep_init_map_type+0x2c7/0x780 [ 1061.492757] ? __raw_spin_lock_init+0x36/0x110 [ 1061.493307] v9fs_session_init+0x1dd/0x1680 [ 1061.493827] ? lock_release+0x680/0x680 [ 1061.494306] ? kmem_cache_alloc_trace+0x151/0x320 [ 1061.494883] ? v9fs_show_options+0x690/0x690 [ 1061.495415] ? trace_hardirqs_on+0x5b/0x180 [ 1061.495944] ? kasan_unpoison_shadow+0x33/0x50 [ 1061.496490] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1061.497099] v9fs_mount+0x79/0x8f0 [ 1061.497522] ? v9fs_write_inode+0x60/0x60 [ 1061.498022] legacy_get_tree+0x105/0x220 [ 1061.498509] vfs_get_tree+0x8e/0x300 [ 1061.498955] path_mount+0x1429/0x2120 [ 1061.499414] ? strncpy_from_user+0x9e/0x470 [ 1061.499940] ? finish_automount+0xa90/0xa90 [ 1061.500453] ? getname_flags.part.0+0x1dd/0x4f0 [ 1061.501010] ? _copy_from_user+0xfb/0x1b0 [ 1061.501509] __x64_sys_mount+0x282/0x300 [ 1061.501995] ? copy_mnt_ns+0xa00/0xa00 [ 1061.502463] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1061.503094] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1061.503716] do_syscall_64+0x33/0x40 [ 1061.504164] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1061.504784] RIP: 0033:0x7f0ec334eb19 [ 1061.505232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1061.507446] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1061.508377] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1061.509236] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1061.510097] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1061.510954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1061.511822] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:57:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:57:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1061.538416] loop6: detected capacity change from 0 to 33559552 [ 1061.540958] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:57:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000000c0)) [ 1061.555298] loop4: detected capacity change from 0 to 33559552 02:57:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, 0x0) [ 1061.602911] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1061.623475] loop1: detected capacity change from 0 to 33559552 [ 1073.618376] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1073.629702] FAULT_INJECTION: forcing a failure. [ 1073.629702] name failslab, interval 1, probability 0, space 0, times 0 [ 1073.632340] CPU: 0 PID: 7593 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1073.633910] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1073.636050] Call Trace: [ 1073.636694] dump_stack+0x107/0x167 [ 1073.637548] should_fail.cold+0x5/0xa [ 1073.638427] ? create_object.isra.0+0x3a/0xa20 [ 1073.639480] should_failslab+0x5/0x20 [ 1073.640366] kmem_cache_alloc+0x5b/0x310 [ 1073.641306] create_object.isra.0+0x3a/0xa20 [ 1073.642308] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1073.643476] kmem_cache_alloc+0x159/0x310 [ 1073.644455] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1073.645742] idr_get_free+0x4b5/0x8f0 [ 1073.646629] idr_alloc_u32+0x170/0x2d0 [ 1073.647524] ? __fprop_inc_percpu_max+0x130/0x130 [ 1073.648644] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1073.649869] ? lock_release+0x680/0x680 [ 1073.650790] idr_alloc+0xc2/0x130 [ 1073.651598] ? idr_alloc_u32+0x2d0/0x2d0 [ 1073.652549] ? rwlock_bug.part.0+0x90/0x90 [ 1073.652774] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1073.653532] p9_client_prepare_req.part.0+0x612/0xac0 [ 1073.656297] p9_client_rpc+0x220/0x1370 [ 1073.657206] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1073.658413] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1073.659634] ? pipe_poll+0x21b/0x800 [ 1073.660495] ? p9_fd_close+0x4a0/0x4a0 [ 1073.661393] ? wait_for_partner+0x3c0/0x3c0 [ 1073.662389] ? p9_fd_poll+0x1e0/0x2c0 [ 1073.663278] ? p9_fd_create+0x357/0x4a0 [ 1073.664201] ? p9_conn_create+0x510/0x510 [ 1073.665165] ? p9_client_create+0x798/0x1230 [ 1073.666182] ? kfree+0xd7/0x340 [ 1073.666938] ? do_raw_spin_unlock+0x4f/0x220 [ 1073.667975] p9_client_create+0xa76/0x1230 [ 1073.668954] ? p9_client_flush+0x430/0x430 [ 1073.669929] ? trace_hardirqs_on+0x5b/0x180 [ 1073.670925] ? lockdep_init_map_type+0x2c7/0x780 [ 1073.672043] ? __raw_spin_lock_init+0x36/0x110 [ 1073.673115] v9fs_session_init+0x1dd/0x1680 [ 1073.674112] ? lock_release+0x680/0x680 [ 1073.675038] ? kmem_cache_alloc_trace+0x151/0x320 [ 1073.676187] ? v9fs_show_options+0x690/0x690 [ 1073.677219] ? trace_hardirqs_on+0x5b/0x180 [ 1073.678223] ? kasan_unpoison_shadow+0x33/0x50 [ 1073.679271] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1073.680442] v9fs_mount+0x79/0x8f0 [ 1073.681259] ? v9fs_write_inode+0x60/0x60 [ 1073.682217] legacy_get_tree+0x105/0x220 [ 1073.683149] vfs_get_tree+0x8e/0x300 [ 1073.684020] path_mount+0x1429/0x2120 [ 1073.684898] ? strncpy_from_user+0x9e/0x470 [ 1073.685894] ? finish_automount+0xa90/0xa90 [ 1073.686882] ? getname_flags.part.0+0x1dd/0x4f0 [ 1073.687959] ? _copy_from_user+0xfb/0x1b0 [ 1073.688921] __x64_sys_mount+0x282/0x300 [ 1073.689851] ? copy_mnt_ns+0xa00/0xa00 [ 1073.690752] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1073.691967] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1073.693154] do_syscall_64+0x33/0x40 [ 1073.694010] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1073.695183] RIP: 0033:0x7f0ec334eb19 [ 1073.696049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1073.700264] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1073.701999] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1073.703631] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1073.705265] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1073.706942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1073.708585] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1073.711784] loop1: detected capacity change from 0 to 33559552 02:57:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 41) 02:57:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:57:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:57:51 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:57:51 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:57:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, 0x0) 02:57:51 executing program 6: r0 = semget$private(0x0, 0x6, 0x3) semctl$SEM_INFO(r0, 0x5, 0x13, &(0x7f0000000080)=""/101) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x505142, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x4}}, './file1\x00'}) fchmodat(r3, &(0x7f0000000100)='./file0\x00', 0x1) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:57:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1073.723110] loop5: detected capacity change from 0 to 33559552 02:57:51 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 1073.742132] loop4: detected capacity change from 0 to 33559552 [ 1073.767522] FAT-fs (loop6): bogus number of reserved sectors [ 1073.768588] FAT-fs (loop6): Can't find a valid FAT filesystem [ 1073.788802] loop2: detected capacity change from 0 to 33559552 02:57:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:57:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 42) 02:57:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1073.857195] FAULT_INJECTION: forcing a failure. [ 1073.857195] name failslab, interval 1, probability 0, space 0, times 0 [ 1073.858607] CPU: 1 PID: 7625 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1073.859484] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1073.860536] Call Trace: [ 1073.860885] dump_stack+0x107/0x167 [ 1073.861355] should_fail.cold+0x5/0xa [ 1073.861843] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1073.862550] should_failslab+0x5/0x20 [ 1073.863018] kmem_cache_alloc+0x5b/0x310 [ 1073.863528] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1073.864239] idr_get_free+0x4b5/0x8f0 [ 1073.864726] idr_alloc_u32+0x170/0x2d0 [ 1073.865209] ? __fprop_inc_percpu_max+0x130/0x130 [ 1073.865806] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1073.866463] ? lock_release+0x680/0x680 [ 1073.866969] idr_alloc+0xc2/0x130 [ 1073.867395] ? idr_alloc_u32+0x2d0/0x2d0 [ 1073.867901] ? rwlock_bug.part.0+0x90/0x90 [ 1073.868437] p9_client_prepare_req.part.0+0x612/0xac0 [ 1073.869084] p9_client_rpc+0x220/0x1370 [ 1073.869572] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1073.870223] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1073.870880] ? pipe_poll+0x21b/0x800 [ 1073.871342] ? p9_fd_close+0x4a0/0x4a0 [ 1073.871839] ? wait_for_partner+0x3c0/0x3c0 [ 1073.872368] ? p9_fd_poll+0x1e0/0x2c0 [ 1073.872846] ? p9_fd_create+0x357/0x4a0 [ 1073.873334] ? p9_conn_create+0x510/0x510 [ 1073.873857] ? p9_client_create+0x798/0x1230 [ 1073.874411] ? kfree+0xd7/0x340 [ 1073.874819] ? do_raw_spin_unlock+0x4f/0x220 [ 1073.875368] p9_client_create+0xa76/0x1230 [ 1073.875903] ? p9_client_flush+0x430/0x430 [ 1073.876429] ? trace_hardirqs_on+0x5b/0x180 [ 1073.876960] ? lockdep_init_map_type+0x2c7/0x780 [ 1073.877556] ? __raw_spin_lock_init+0x36/0x110 [ 1073.878115] v9fs_session_init+0x1dd/0x1680 [ 1073.878644] ? lock_release+0x680/0x680 [ 1073.879138] ? kmem_cache_alloc_trace+0x151/0x320 [ 1073.879735] ? v9fs_show_options+0x690/0x690 [ 1073.880285] ? trace_hardirqs_on+0x5b/0x180 [ 1073.880814] ? kasan_unpoison_shadow+0x33/0x50 [ 1073.881374] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1073.881998] v9fs_mount+0x79/0x8f0 [ 1073.882436] ? v9fs_write_inode+0x60/0x60 [ 1073.882946] legacy_get_tree+0x105/0x220 [ 1073.883443] vfs_get_tree+0x8e/0x300 [ 1073.883910] path_mount+0x1429/0x2120 [ 1073.884377] ? strncpy_from_user+0x9e/0x470 [ 1073.884905] ? finish_automount+0xa90/0xa90 [ 1073.885433] ? getname_flags.part.0+0x1dd/0x4f0 [ 1073.886004] ? _copy_from_user+0xfb/0x1b0 [ 1073.886518] __x64_sys_mount+0x282/0x300 [ 1073.887025] ? copy_mnt_ns+0xa00/0xa00 [ 1073.887514] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1073.888174] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1073.888808] do_syscall_64+0x33/0x40 [ 1073.889272] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1073.889899] RIP: 0033:0x7f0ec334eb19 [ 1073.890356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1073.892613] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1073.893546] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1073.894435] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1073.895302] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1073.896185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1073.897059] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1073.909296] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:57:51 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 1073.923993] loop1: detected capacity change from 0 to 33559552 02:57:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:57:51 executing program 6: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x30, 0xffffffffffffff75, 0x10001) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000940)=ANY=[@ANYBLOB="95b50000018fd33a76f1d2328800000018000000", @ANYRES32=r1, @ANYBLOB="04a500006ccf5e00a30878ffff75db00808ebf8b85b5363cdf1595a0bee6cc6ec57b594af05d2bcaace304ab11b2f0de03bff4371a9012ef1c32b4b5c6366f172a140b3c90f6de5877ef5a6a3a26844c4bc8c82413041c010b22156a4c9a107723a5f2df0884ac7b2d8cf48af5dc01fc3d1d08a58cc865e3f2f712e1a4eabdc0986bd04ce4c790d9de030b3ca0239c52c979afa3e6e8c80f01000eba254f7d13aa0b68306d66d92477fe946e898db0c1"]) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240), &(0x7f0000000300)={0x0, 0xfb, 0x64, 0x3, 0x5, "7d1162012363a18a915b34cd57ed5e9b", "cec27f7d02230caced6a89b5482ae90484f008e2059fa293365bba3e25c272ddfac562bd53d11ffa7e9180aef9a394de39dbe3364537bc1da0511f2a83b934681c2d892021319340108d23999653c2"}, 0x64, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x40, 0x9, 0x6d, 0x80, 0x0, 0x81, 0x40, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x100000000}, 0x738, 0xfb4, 0x0, 0x3, 0x4, 0x7, 0x3, 0x0, 0x8, 0x0, 0x4}, r0, 0x0, r1, 0x1) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1073.997217] loop4: detected capacity change from 0 to 33559552 02:57:51 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:57:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1074.041988] loop6: detected capacity change from 0 to 33559552 [ 1074.093124] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:58:03 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 43) 02:58:03 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, @out_args}, './file1\x00'}) mkdirat(r1, &(0x7f0000000040)='./file1\x00', 0x0) 02:58:03 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:58:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:03 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:58:03 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) 02:58:03 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 1086.380081] loop6: detected capacity change from 0 to 33559552 [ 1086.387480] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1086.389535] loop1: detected capacity change from 0 to 33559552 [ 1086.399193] loop4: detected capacity change from 0 to 33559552 [ 1086.411927] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1086.420718] FAULT_INJECTION: forcing a failure. [ 1086.420718] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.423279] CPU: 0 PID: 7666 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1086.424841] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1086.426763] Call Trace: [ 1086.427376] dump_stack+0x107/0x167 [ 1086.428227] should_fail.cold+0x5/0xa [ 1086.429090] ? ___slab_alloc+0x155/0x700 [ 1086.430006] ? create_object.isra.0+0x3a/0xa20 [ 1086.431046] should_failslab+0x5/0x20 [ 1086.431905] kmem_cache_alloc+0x5b/0x310 [ 1086.432861] create_object.isra.0+0x3a/0xa20 [ 1086.433849] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1086.434995] kmem_cache_alloc+0x159/0x310 [ 1086.435943] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1086.437261] idr_get_free+0x4b5/0x8f0 [ 1086.438138] idr_alloc_u32+0x170/0x2d0 [ 1086.439017] ? __fprop_inc_percpu_max+0x130/0x130 [ 1086.440120] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1086.441337] ? lock_release+0x680/0x680 [ 1086.442236] idr_alloc+0xc2/0x130 [ 1086.443020] ? idr_alloc_u32+0x2d0/0x2d0 [ 1086.443932] ? rwlock_bug.part.0+0x90/0x90 [ 1086.444917] p9_client_prepare_req.part.0+0x612/0xac0 [ 1086.446093] p9_client_rpc+0x220/0x1370 [ 1086.447017] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1086.448215] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1086.449415] ? pipe_poll+0x21b/0x800 [ 1086.450256] ? p9_fd_close+0x4a0/0x4a0 [ 1086.451132] ? wait_for_partner+0x3c0/0x3c0 [ 1086.452106] ? p9_fd_poll+0x1e0/0x2c0 [ 1086.452971] ? p9_fd_create+0x357/0x4a0 [ 1086.453860] ? p9_conn_create+0x510/0x510 [ 1086.454799] ? p9_client_create+0x798/0x1230 [ 1086.455784] ? kfree+0xd7/0x340 [ 1086.456530] ? do_raw_spin_unlock+0x4f/0x220 [ 1086.457523] p9_client_create+0xa76/0x1230 [ 1086.458483] ? p9_client_flush+0x430/0x430 [ 1086.459447] ? trace_hardirqs_on+0x5b/0x180 [ 1086.460434] ? lockdep_init_map_type+0x2c7/0x780 [ 1086.461500] ? __raw_spin_lock_init+0x36/0x110 [ 1086.462525] v9fs_session_init+0x1dd/0x1680 [ 1086.463496] ? lock_release+0x680/0x680 [ 1086.464439] ? kmem_cache_alloc_trace+0x151/0x320 [ 1086.465516] ? v9fs_show_options+0x690/0x690 [ 1086.466523] ? trace_hardirqs_on+0x5b/0x180 [ 1086.467497] ? kasan_unpoison_shadow+0x33/0x50 [ 1086.468582] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1086.469732] v9fs_mount+0x79/0x8f0 [ 1086.470551] ? v9fs_write_inode+0x60/0x60 [ 1086.471484] legacy_get_tree+0x105/0x220 [ 1086.472455] vfs_get_tree+0x8e/0x300 [ 1086.473288] path_mount+0x1429/0x2120 [ 1086.474191] ? strncpy_from_user+0x9e/0x470 [ 1086.475153] ? finish_automount+0xa90/0xa90 [ 1086.476145] ? getname_flags.part.0+0x1dd/0x4f0 [ 1086.477192] ? _copy_from_user+0xfb/0x1b0 [ 1086.478143] __x64_sys_mount+0x282/0x300 [ 1086.479061] ? copy_mnt_ns+0xa00/0xa00 [ 1086.479951] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1086.481135] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1086.482280] do_syscall_64+0x33/0x40 [ 1086.483112] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1086.484287] RIP: 0033:0x7f0ec334eb19 [ 1086.485120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1086.489345] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1086.491062] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1086.492682] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1086.494291] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1086.495897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1086.497517] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1086.509149] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:58:04 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x30, 0xffffffffffffff75, 0x10001) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000940)=ANY=[@ANYBLOB="95b50000018fd33a76f1d2328800000018000000", @ANYRES32=r1, @ANYBLOB="04a500006ccf5e00a30878ffff75db00808ebf8b85b5363cdf1595a0bee6cc6ec57b594af05d2bcaace304ab11b2f0de03bff4371a9012ef1c32b4b5c6366f172a140b3c90f6de5877ef5a6a3a26844c4bc8c82413041c010b22156a4c9a107723a5f2df0884ac7b2d8cf48af5dc01fc3d1d08a58cc865e3f2f712e1a4eabdc0986bd04ce4c790d9de030b3ca0239c52c979afa3e6e8c80f01000eba254f7d13aa0b68306d66d92477fe946e898db0c1"]) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240), &(0x7f0000000300)={0x0, 0xfb, 0x64, 0x3, 0x5, "7d1162012363a18a915b34cd57ed5e9b", "cec27f7d02230caced6a89b5482ae90484f008e2059fa293365bba3e25c272ddfac562bd53d11ffa7e9180aef9a394de39dbe3364537bc1da0511f2a83b934681c2d892021319340108d23999653c2"}, 0x64, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x40, 0x9, 0x6d, 0x80, 0x0, 0x81, 0x40, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x0, 0x100000000}, 0x738, 0xfb4, 0x0, 0x3, 0x4, 0x7, 0x3, 0x0, 0x8, 0x0, 0x4}, r0, 0x0, r1, 0x1) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1086.552974] loop5: detected capacity change from 0 to 33559552 02:58:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:04 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) openat(r0, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x4b) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x3, 0x6, &(0x7f0000001600)=[{&(0x7f0000000240)="4b104d175c199d0c5efbdb770412745a742e62fbcba1226cf983fe2410579495d0bac7f98ee62b9aa2040e4f3de72ee997a52f5dedfeea5533da767dd2586534381f9e2aa245491479f714cdc6db64e31f73072736d2e685fb32d576f470406c88b1", 0x62, 0x7c}, {&(0x7f00000001c0)="6b5568f239ff439009a8287ac5115c6a90ad70010ab2ae5ab551ce57a202bb3308e8698e6e288827cd707523ac269bd891e819e5", 0x34, 0xffffffffffffffff}, {&(0x7f0000000300)="a51c6c6c11d88c57714caf763a9ac1aa7e3fc6aab87850724ee33a5ebdf1396997c5035c813607dea92e2824a8f66404e65a63ff1f70f3917164e0de86ececd190358430210544f6ce76b1eda813a97f674d63a0b79012b45806d64b2761eae3167bb1f2fe98b52a17d8512066c9831462a246e0c3f2df4151f900f7234fc14b80434dcba9f3b2a728ad63c5b3ed00b0b8722f4df5", 0x95, 0x9}, {&(0x7f0000000480)="a3e1e6f892afce20d84e0da0711ecfb25575a50bda190b6bb8c986d0199f614d0cf41ed7677cfafac3edb61db5fbfec4b4447101e0709903eb4a30875268518611ec6ce1892676e7dc85deea49c6cbaac7af7a129f7656614070b058adf701b69f6517048f1a9f7dadf8f087661bebe1cfcb15a8ee7898b3862ff4303b", 0x7d, 0x6}, {&(0x7f0000000500)="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", 0x1000, 0x100000000}, {&(0x7f0000001500)="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", 0xfe}], 0x80002, &(0x7f00000016c0)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x2}}, {@journal_checksum}, {@test_dummy_encryption}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:04 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) 02:58:04 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 1086.659848] loop4: detected capacity change from 0 to 33559552 02:58:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1086.680457] loop6: detected capacity change from 0 to 33559552 02:58:04 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 44) 02:58:04 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:58:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1086.799514] FAULT_INJECTION: forcing a failure. [ 1086.799514] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.800875] CPU: 1 PID: 7699 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1086.801653] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1086.802618] Call Trace: [ 1086.802927] dump_stack+0x107/0x167 [ 1086.803343] should_fail.cold+0x5/0xa [ 1086.803783] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1086.804452] should_failslab+0x5/0x20 [ 1086.804889] kmem_cache_alloc+0x5b/0x310 [ 1086.805361] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1086.805814] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1086.806012] idr_get_free+0x4b5/0x8f0 [ 1086.806030] idr_alloc_u32+0x170/0x2d0 [ 1086.806049] ? __fprop_inc_percpu_max+0x130/0x130 [ 1086.810214] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1086.810840] ? lock_release+0x680/0x680 [ 1086.811299] idr_alloc+0xc2/0x130 [ 1086.811700] ? idr_alloc_u32+0x2d0/0x2d0 [ 1086.812185] ? rwlock_bug.part.0+0x90/0x90 [ 1086.812680] p9_client_prepare_req.part.0+0x612/0xac0 [ 1086.813279] p9_client_rpc+0x220/0x1370 [ 1086.813741] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1086.814363] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1086.814978] ? pipe_poll+0x21b/0x800 [ 1086.815410] ? p9_fd_close+0x4a0/0x4a0 [ 1086.815863] ? wait_for_partner+0x3c0/0x3c0 [ 1086.816362] ? p9_fd_poll+0x1e0/0x2c0 [ 1086.816806] ? p9_fd_create+0x357/0x4a0 [ 1086.817264] ? p9_conn_create+0x510/0x510 [ 1086.817740] ? p9_client_create+0x798/0x1230 [ 1086.818246] ? kfree+0xd7/0x340 [ 1086.818622] ? do_raw_spin_unlock+0x4f/0x220 [ 1086.819140] p9_client_create+0xa76/0x1230 [ 1086.819636] ? p9_client_flush+0x430/0x430 [ 1086.820130] ? trace_hardirqs_on+0x5b/0x180 [ 1086.820629] ? lockdep_init_map_type+0x2c7/0x780 [ 1086.821180] ? __raw_spin_lock_init+0x36/0x110 [ 1086.821721] v9fs_session_init+0x1dd/0x1680 [ 1086.822222] ? lock_release+0x680/0x680 [ 1086.822689] ? kmem_cache_alloc_trace+0x151/0x320 [ 1086.823246] ? v9fs_show_options+0x690/0x690 [ 1086.823758] ? trace_hardirqs_on+0x5b/0x180 [ 1086.824256] ? kasan_unpoison_shadow+0x33/0x50 [ 1086.824781] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1086.825375] v9fs_mount+0x79/0x8f0 [ 1086.825790] ? v9fs_write_inode+0x60/0x60 [ 1086.826271] legacy_get_tree+0x105/0x220 [ 1086.826751] vfs_get_tree+0x8e/0x300 [ 1086.827181] path_mount+0x1429/0x2120 [ 1086.827623] ? strncpy_from_user+0x9e/0x470 [ 1086.828129] ? finish_automount+0xa90/0xa90 [ 1086.828625] ? getname_flags.part.0+0x1dd/0x4f0 [ 1086.829163] ? _copy_from_user+0xfb/0x1b0 [ 1086.829655] __x64_sys_mount+0x282/0x300 [ 1086.830130] ? copy_mnt_ns+0xa00/0xa00 [ 1086.830583] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1086.831187] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1086.831783] do_syscall_64+0x33/0x40 [ 1086.832216] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1086.832815] RIP: 0033:0x7f0ec334eb19 [ 1086.833245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1086.835365] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1086.836252] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1086.836939] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1086.837081] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1086.837097] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1086.841434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1086.842246] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1086.845736] loop1: detected capacity change from 0 to 33559552 02:58:04 executing program 6: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7f}}, './file0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000300)={0xab9, 0xffffffff, 0x1, 'queue1\x00', 0x29}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netstat\x00') mkdirat(r1, &(0x7f0000000100)='./file1\x00', 0x104) 02:58:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1086.870700] loop4: detected capacity change from 0 to 33559552 [ 1086.951891] loop5: detected capacity change from 0 to 33559552 [ 1086.964630] loop6: detected capacity change from 0 to 33559552 [ 1086.965958] FAT-fs (loop5): bogus number of FAT sectors [ 1086.967249] FAT-fs (loop5): Can't find a valid FAT filesystem 02:58:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:16 executing program 6: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) ioctl$KDSETLED(r0, 0x4b32, 0x4) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) syz_io_uring_setup(0x3a75, &(0x7f0000000340)={0x0, 0x0, 0x10}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x18}, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) openat(r3, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_ACCEPT={0xd, 0x5, 0x0, r3, &(0x7f0000000000)=0x80, &(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x0, 0x80800, 0x1}, 0x8) 02:58:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:16 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:58:16 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:58:16 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 45) [ 1099.202431] loop6: detected capacity change from 0 to 33559552 [ 1099.202713] FAULT_INJECTION: forcing a failure. [ 1099.202713] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.205097] CPU: 0 PID: 7736 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1099.206225] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1099.207615] Call Trace: [ 1099.208059] dump_stack+0x107/0x167 [ 1099.208673] should_fail.cold+0x5/0xa [ 1099.209311] ? create_object.isra.0+0x3a/0xa20 [ 1099.210072] should_failslab+0x5/0x20 [ 1099.210702] kmem_cache_alloc+0x5b/0x310 [ 1099.211380] create_object.isra.0+0x3a/0xa20 [ 1099.212122] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1099.212964] kmem_cache_alloc+0x159/0x310 [ 1099.213658] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1099.214594] idr_get_free+0x4b5/0x8f0 [ 1099.215237] idr_alloc_u32+0x170/0x2d0 [ 1099.215886] ? __fprop_inc_percpu_max+0x130/0x130 [ 1099.216702] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1099.217602] ? lock_release+0x680/0x680 [ 1099.218266] idr_alloc+0xc2/0x130 [ 1099.218842] ? idr_alloc_u32+0x2d0/0x2d0 [ 1099.219535] ? rwlock_bug.part.0+0x90/0x90 [ 1099.220263] p9_client_prepare_req.part.0+0x612/0xac0 [ 1099.221118] p9_client_rpc+0x220/0x1370 [ 1099.221775] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1099.222657] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1099.223546] ? pipe_poll+0x21b/0x800 [ 1099.224173] ? p9_fd_close+0x4a0/0x4a0 [ 1099.224487] loop4: detected capacity change from 0 to 33559552 [ 1099.224822] ? wait_for_partner+0x3c0/0x3c0 [ 1099.224841] ? p9_fd_poll+0x1e0/0x2c0 [ 1099.226861] ? p9_fd_create+0x357/0x4a0 [ 1099.227541] ? p9_conn_create+0x510/0x510 [ 1099.228238] ? p9_client_create+0x798/0x1230 [ 1099.228967] ? kfree+0xd7/0x340 [ 1099.229514] ? do_raw_spin_unlock+0x4f/0x220 [ 1099.230253] p9_client_create+0xa76/0x1230 [ 1099.230957] ? p9_client_flush+0x430/0x430 [ 1099.231668] ? trace_hardirqs_on+0x5b/0x180 [ 1099.232398] ? lockdep_init_map_type+0x2c7/0x780 [ 1099.233193] ? __raw_spin_lock_init+0x36/0x110 [ 1099.233951] v9fs_session_init+0x1dd/0x1680 [ 1099.234662] ? lock_release+0x680/0x680 [ 1099.235324] ? kmem_cache_alloc_trace+0x151/0x320 [ 1099.236124] ? v9fs_show_options+0x690/0x690 [ 1099.236858] ? trace_hardirqs_on+0x5b/0x180 [ 1099.237581] ? kasan_unpoison_shadow+0x33/0x50 [ 1099.238336] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1099.239192] v9fs_mount+0x79/0x8f0 [ 1099.239818] ? v9fs_write_inode+0x60/0x60 [ 1099.240522] legacy_get_tree+0x105/0x220 [ 1099.241204] vfs_get_tree+0x8e/0x300 [ 1099.241831] path_mount+0x1429/0x2120 [ 1099.242468] ? strncpy_from_user+0x9e/0x470 [ 1099.243190] ? finish_automount+0xa90/0xa90 [ 1099.243917] ? getname_flags.part.0+0x1dd/0x4f0 [ 1099.244713] ? _copy_from_user+0xfb/0x1b0 [ 1099.245441] __x64_sys_mount+0x282/0x300 [ 1099.246120] ? copy_mnt_ns+0xa00/0xa00 [ 1099.246781] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1099.247674] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1099.248555] do_syscall_64+0x33/0x40 [ 1099.249183] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1099.250052] RIP: 0033:0x7f0ec334eb19 [ 1099.250674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1099.253744] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1099.255023] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1099.256256] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1099.257480] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1099.258724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1099.259964] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:58:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:16 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 1099.272868] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1099.277054] loop5: detected capacity change from 0 to 33559552 [ 1099.283852] loop1: detected capacity change from 0 to 33559552 [ 1099.285674] loop2: detected capacity change from 0 to 33559552 [ 1099.298666] FAT-fs (loop5): invalid media value (0x00) [ 1099.299730] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1099.302306] FAT-fs (loop2): bogus number of FAT sectors [ 1099.302980] FAT-fs (loop2): Can't find a valid FAT filesystem 02:58:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1099.336399] loop4: detected capacity change from 0 to 33559552 02:58:16 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 1099.389494] loop1: detected capacity change from 0 to 33559552 [ 1099.399379] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:58:16 executing program 6: ioctl$CDROM_LOCKDOOR(0xffffffffffffffff, 0x5329, 0x1) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) 02:58:33 executing program 5: ioctl$CDROM_LOCKDOOR(0xffffffffffffffff, 0x5329, 0x1) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) 02:58:33 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:58:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:33 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x4}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000540)=[{&(0x7f0000000240)="348bf892d7f2c8d977032c34b6733b2d556347fee6056ebcdf21d4c8f2f18a343464f84c4234eb683f1e32b993c4391e9d24bc69c0aa9e579f18621094d2e3e3d04772cbe68ed5424ebaef0897adde754d87e20142bb48eb39", 0x59, 0x5}, {&(0x7f0000000300)="6dee82b15f380415060057e9854b0de641113dbccefddb02ceca7493abd07567e048b25ae78dd699283df2826b8c20f9322e8022fd41b455dcb65b42bbee95f93fe80bce04f74fcdeb6d578a3a8e59493a441aff615ef51c38dbaa2adeec7b014e9c76800630b2676d6164f352e1f440249a5423f6c66b613249a2d79fea32b86f31bcd9f08ce5126b079bb480004326270bb92d2aae41270240095f905d248931a704059fe09e8f517884bf171403bd1d30ddc017ad4f82f270012ce24a4a6636cf2269a8a60d1370ea473c0f1148d6", 0xd0, 0x2fd}, {&(0x7f0000000140)="1895a56c1aaed68f9be56783e51dc4b89690edce94072e3499a0f5f395844ef39667a3a2e9d49091d3", 0x29, 0x8}, {&(0x7f00000001c0)="3dd6ecadecadd52133fbed9980bf676d67d7b9d0b2521db91d96abf3de1dd03a3928c300864ce9cc1fc8c12ab2bc", 0x2e, 0x81}, {&(0x7f0000000480)="d8f2d9ad4ba58ba48a55a3d5e8a7a98e1d4d8b35be085c12dc1a5724ad4e78338adaa802e5acd8f4c21f3fc2de56b6f0b7e8b60fea9b17cbda4ff460b00cf57c4cbe2538d0a5", 0x46}, {&(0x7f0000000400)="c6736a31206ff9c300f9f3d359bca07c127db08e485ff386b2ec0f8c206443b98d2c6cce7ac0", 0x26, 0x2e}, {&(0x7f0000000500)="f93525cba226635a9965338e4cd064e5e182d25cc0fb12ef78dac8ace1", 0x1d, 0x80000001}], 0x400000, &(0x7f0000000600)={[{@huge_advise}, {@huge_never}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}, {@mode={'mode', 0x3d, 0xff}}, {@nr_blocks={'nr_blocks', 0x3d, [0x39, 0x36, 0x36]}}, {@huge_never}], [{@audit}, {@hash}, {@smackfsroot={'smackfsroot', 0x3d, '#.'}}, {@smackfshat={'smackfshat', 0x3d, ',-\\^'}}]}) openat(r0, &(0x7f00000006c0)='./file0\x00', 0x101000, 0x12) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:33 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x0, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:58:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:33 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 46) 02:58:33 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 1116.048323] FAULT_INJECTION: forcing a failure. [ 1116.048323] name failslab, interval 1, probability 0, space 0, times 0 [ 1116.048819] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1116.049764] CPU: 0 PID: 7783 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1116.053307] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1116.054332] Call Trace: [ 1116.054664] dump_stack+0x107/0x167 [ 1116.055113] should_fail.cold+0x5/0xa [ 1116.055579] ? p9pdu_readf+0xadb/0x1d40 [ 1116.056066] should_failslab+0x5/0x20 [ 1116.056536] __kmalloc+0x72/0x390 [ 1116.056888] FAT-fs (loop6): bogus number of reserved sectors [ 1116.056966] p9pdu_readf+0xadb/0x1d40 [ 1116.058307] FAT-fs (loop6): Can't find a valid FAT filesystem [ 1116.058717] ? pipe_poll+0x21b/0x800 [ 1116.058726] ? p9pdu_writef+0x100/0x100 [ 1116.058734] ? p9_fd_poll+0x1e0/0x2c0 [ 1116.058748] ? p9_fd_create+0x357/0x4a0 [ 1116.060865] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1116.060987] ? p9_conn_create+0x510/0x510 [ 1116.061004] ? p9_client_create+0x798/0x1230 [ 1116.064812] ? kfree+0xd7/0x340 [ 1116.065215] ? do_raw_spin_unlock+0x4f/0x220 [ 1116.065756] p9_client_create+0xaee/0x1230 [ 1116.066278] ? p9_client_flush+0x430/0x430 [ 1116.066802] ? trace_hardirqs_on+0x5b/0x180 [ 1116.067340] ? lockdep_init_map_type+0x2c7/0x780 [ 1116.067917] ? __raw_spin_lock_init+0x36/0x110 [ 1116.068485] v9fs_session_init+0x1dd/0x1680 [ 1116.069011] ? lock_release+0x680/0x680 [ 1116.069500] ? kmem_cache_alloc_trace+0x151/0x320 [ 1116.070087] ? v9fs_show_options+0x690/0x690 [ 1116.070627] ? trace_hardirqs_on+0x5b/0x180 [ 1116.071156] ? kasan_unpoison_shadow+0x33/0x50 [ 1116.071721] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1116.072348] v9fs_mount+0x79/0x8f0 [ 1116.073042] ? v9fs_write_inode+0x60/0x60 [ 1116.074173] legacy_get_tree+0x105/0x220 [ 1116.075292] vfs_get_tree+0x8e/0x300 [ 1116.076322] path_mount+0x1429/0x2120 [ 1116.077377] ? strncpy_from_user+0x9e/0x470 [ 1116.078552] ? finish_automount+0xa90/0xa90 [ 1116.079742] ? getname_flags.part.0+0x1dd/0x4f0 [ 1116.080847] ? _copy_from_user+0xfb/0x1b0 [ 1116.081561] __x64_sys_mount+0x282/0x300 [ 1116.082263] ? copy_mnt_ns+0xa00/0xa00 [ 1116.082936] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1116.083837] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1116.084694] do_syscall_64+0x33/0x40 [ 1116.085152] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1116.085776] RIP: 0033:0x7f0ec334eb19 [ 1116.086233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1116.088501] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1116.089443] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1116.090324] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1116.091203] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1116.092079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1116.092956] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1116.097752] loop4: detected capacity change from 0 to 33559552 [ 1116.112961] loop5: detected capacity change from 0 to 33559552 [ 1116.117875] loop1: detected capacity change from 0 to 33559552 02:58:33 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x0, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:58:33 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:58:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:33 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) [ 1116.157514] loop6: detected capacity change from 0 to 135266304 [ 1116.164488] tmpfs: Unsupported parameter 'huge' 02:58:33 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 47) 02:58:33 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x0, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 1116.225953] loop1: detected capacity change from 0 to 33559552 [ 1116.242848] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1116.246481] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1116.275264] loop4: detected capacity change from 0 to 33559552 [ 1116.279075] FAULT_INJECTION: forcing a failure. [ 1116.279075] name failslab, interval 1, probability 0, space 0, times 0 [ 1116.281571] CPU: 1 PID: 7809 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1116.283019] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1116.284788] Call Trace: [ 1116.285372] dump_stack+0x107/0x167 [ 1116.286158] should_fail.cold+0x5/0xa [ 1116.286972] ? p9pdu_readf+0xadb/0x1d40 [ 1116.287832] should_failslab+0x5/0x20 [ 1116.288655] __kmalloc+0x72/0x390 [ 1116.289403] p9pdu_readf+0xadb/0x1d40 [ 1116.290225] ? pipe_poll+0x21b/0x800 [ 1116.291022] ? p9pdu_writef+0x100/0x100 [ 1116.291873] ? p9_fd_poll+0x1e0/0x2c0 [ 1116.292712] ? p9_fd_create+0x357/0x4a0 [ 1116.293565] ? p9_conn_create+0x510/0x510 [ 1116.294458] ? p9_client_create+0x798/0x1230 [ 1116.295397] ? kfree+0xd7/0x340 [ 1116.296098] ? do_raw_spin_unlock+0x4f/0x220 [ 1116.297066] p9_client_create+0xaee/0x1230 [ 1116.297984] ? p9_client_flush+0x430/0x430 [ 1116.298893] ? trace_hardirqs_on+0x5b/0x180 [ 1116.299811] ? lockdep_init_map_type+0x2c7/0x780 [ 1116.300839] ? __raw_spin_lock_init+0x36/0x110 [ 1116.301821] v9fs_session_init+0x1dd/0x1680 [ 1116.302743] ? lock_release+0x680/0x680 [ 1116.303597] ? kmem_cache_alloc_trace+0x151/0x320 [ 1116.304630] ? v9fs_show_options+0x690/0x690 [ 1116.305573] ? trace_hardirqs_on+0x5b/0x180 [ 1116.306498] ? kasan_unpoison_shadow+0x33/0x50 [ 1116.307469] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1116.308566] v9fs_mount+0x79/0x8f0 [ 1116.309322] ? v9fs_write_inode+0x60/0x60 [ 1116.310206] legacy_get_tree+0x105/0x220 [ 1116.311072] vfs_get_tree+0x8e/0x300 [ 1116.311867] path_mount+0x1429/0x2120 [ 1116.312692] ? strncpy_from_user+0x9e/0x470 [ 1116.313606] ? finish_automount+0xa90/0xa90 [ 1116.314524] ? getname_flags.part.0+0x1dd/0x4f0 [ 1116.315517] ? _copy_from_user+0xfb/0x1b0 [ 1116.316422] __x64_sys_mount+0x282/0x300 [ 1116.317289] ? copy_mnt_ns+0xa00/0xa00 [ 1116.318125] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1116.319242] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1116.320346] do_syscall_64+0x33/0x40 [ 1116.321171] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1116.322272] RIP: 0033:0x7f0ec334eb19 [ 1116.323072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1116.326966] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1116.328600] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1116.330123] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1116.331623] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1116.333155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1116.334652] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:58:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:46 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 48) 02:58:46 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:58:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:46 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) stat(&(0x7f0000000000)='./file2\x00', &(0x7f0000000240)) 02:58:46 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) 02:58:46 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:58:46 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() [ 1129.398843] loop6: detected capacity change from 0 to 33559552 [ 1129.407776] loop1: detected capacity change from 0 to 33559552 [ 1129.416856] FAULT_INJECTION: forcing a failure. [ 1129.416856] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.418287] CPU: 1 PID: 7818 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1129.419114] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1129.420119] Call Trace: [ 1129.420452] dump_stack+0x107/0x167 [ 1129.420897] should_fail.cold+0x5/0xa [ 1129.421363] should_failslab+0x5/0x20 [ 1129.421822] __kmalloc_track_caller+0x79/0x370 [ 1129.422373] ? kasprintf+0xbb/0xf0 [ 1129.422803] ? __delete_object+0xb3/0x100 [ 1129.423306] kvasprintf+0xb5/0x150 [ 1129.423735] ? bust_spinlocks+0xe0/0xe0 [ 1129.424216] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1129.424860] kasprintf+0xbb/0xf0 [ 1129.425270] ? kvasprintf_const+0x1a0/0x1a0 [ 1129.425792] ? kmem_cache_free+0x249/0x2d0 [ 1129.426306] ? p9_client_create+0xbfa/0x1230 [ 1129.426839] p9_client_create+0xc1b/0x1230 [ 1129.427353] ? p9_client_flush+0x430/0x430 [ 1129.427863] ? trace_hardirqs_on+0x5b/0x180 [ 1129.428382] ? lockdep_init_map_type+0x2c7/0x780 [ 1129.428959] ? __raw_spin_lock_init+0x36/0x110 [ 1129.429512] v9fs_session_init+0x1dd/0x1680 [ 1129.429854] loop4: detected capacity change from 0 to 33559552 [ 1129.430033] ? lock_release+0x680/0x680 [ 1129.430056] ? kmem_cache_alloc_trace+0x151/0x320 [ 1129.432781] ? v9fs_show_options+0x690/0x690 [ 1129.433365] ? trace_hardirqs_on+0x5b/0x180 [ 1129.433896] ? kasan_unpoison_shadow+0x33/0x50 [ 1129.434454] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1129.435076] v9fs_mount+0x79/0x8f0 [ 1129.435508] ? v9fs_write_inode+0x60/0x60 [ 1129.436017] legacy_get_tree+0x105/0x220 [ 1129.436512] vfs_get_tree+0x8e/0x300 [ 1129.436963] path_mount+0x1429/0x2120 [ 1129.437423] ? strncpy_from_user+0x9e/0x470 [ 1129.437943] ? finish_automount+0xa90/0xa90 [ 1129.438464] ? getname_flags.part.0+0x1dd/0x4f0 [ 1129.439057] ? _copy_from_user+0xfb/0x1b0 [ 1129.439563] __x64_sys_mount+0x282/0x300 [ 1129.440058] ? copy_mnt_ns+0xa00/0xa00 [ 1129.440539] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1129.441170] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1129.441790] do_syscall_64+0x33/0x40 [ 1129.442238] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1129.442867] RIP: 0033:0x7f0ec334eb19 [ 1129.443319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1129.445555] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1129.446474] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1129.447332] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1129.448192] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1129.449060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1129.449907] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1129.476123] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1129.485279] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1129.489641] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:58:46 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x602, 0x8, 0x1}, 0x18) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 49) [ 1129.544816] loop6: detected capacity change from 0 to 33559552 02:58:47 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:58:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, 0x0) (fail_nth: 1) 02:58:47 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:58:47 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 1129.606928] FAULT_INJECTION: forcing a failure. [ 1129.606928] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.607620] loop1: detected capacity change from 0 to 33559552 [ 1129.608328] CPU: 1 PID: 7843 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1129.610469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1129.611450] Call Trace: [ 1129.611769] dump_stack+0x107/0x167 [ 1129.612206] should_fail.cold+0x5/0xa [ 1129.612674] ? create_object.isra.0+0x3a/0xa20 [ 1129.613216] should_failslab+0x5/0x20 [ 1129.613669] kmem_cache_alloc+0x5b/0x310 [ 1129.614150] ? vsnprintf+0x4ba/0x1600 [ 1129.614606] create_object.isra.0+0x3a/0xa20 [ 1129.615104] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1129.615716] __kmalloc_track_caller+0x177/0x370 [ 1129.616244] ? kasprintf+0xbb/0xf0 [ 1129.616686] kvasprintf+0xb5/0x150 [ 1129.617100] ? bust_spinlocks+0xe0/0xe0 [ 1129.617573] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1129.618199] kasprintf+0xbb/0xf0 [ 1129.618619] ? kvasprintf_const+0x1a0/0x1a0 [ 1129.619104] ? kmem_cache_free+0x249/0x2d0 [ 1129.619610] ? p9_client_create+0xbfa/0x1230 [ 1129.620103] p9_client_create+0xc1b/0x1230 [ 1129.620620] ? p9_client_flush+0x430/0x430 [ 1129.621096] ? trace_hardirqs_on+0x5b/0x180 [ 1129.621608] ? lockdep_init_map_type+0x2c7/0x780 [ 1129.622142] ? __raw_spin_lock_init+0x36/0x110 [ 1129.622688] v9fs_session_init+0x1dd/0x1680 [ 1129.623173] ? lock_release+0x680/0x680 [ 1129.623654] ? kmem_cache_alloc_trace+0x151/0x320 [ 1129.624202] ? v9fs_show_options+0x690/0x690 [ 1129.624734] ? trace_hardirqs_on+0x5b/0x180 [ 1129.625241] ? kasan_unpoison_shadow+0x33/0x50 [ 1129.625779] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1129.626380] v9fs_mount+0x79/0x8f0 [ 1129.626803] ? v9fs_write_inode+0x60/0x60 [ 1129.627296] legacy_get_tree+0x105/0x220 [ 1129.627778] vfs_get_tree+0x8e/0x300 [ 1129.628214] path_mount+0x1429/0x2120 [ 1129.628652] ? strncpy_from_user+0x9e/0x470 [ 1129.628867] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1129.629173] ? finish_automount+0xa90/0xa90 [ 1129.632352] ? getname_flags.part.0+0x1dd/0x4f0 [ 1129.632884] ? _copy_from_user+0xfb/0x1b0 [ 1129.633355] __x64_sys_mount+0x282/0x300 [ 1129.633808] ? copy_mnt_ns+0xa00/0xa00 [ 1129.634247] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1129.634829] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1129.635436] do_syscall_64+0x33/0x40 [ 1129.635852] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1129.636463] RIP: 0033:0x7f0ec334eb19 [ 1129.636885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1129.639054] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1129.639671] FAULT_INJECTION: forcing a failure. [ 1129.639671] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1129.639900] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1129.639916] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1129.644050] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1129.644843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1129.645630] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1129.646437] CPU: 0 PID: 7851 Comm: syz-executor.2 Not tainted 5.10.237 #1 [ 1129.647983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1129.649870] Call Trace: [ 1129.650473] dump_stack+0x107/0x167 [ 1129.651292] should_fail.cold+0x5/0xa 02:58:47 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x24000, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) r1 = openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x18000, 0x1) openat(r1, &(0x7f0000000040)='./file1\x00', 0x880, 0x2) statx(r1, &(0x7f0000000100)='./file1\x00', 0x1000, 0x40, &(0x7f0000000300)) 02:58:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1129.652159] _copy_to_user+0x2e/0x180 [ 1129.653148] simple_read_from_buffer+0xcc/0x160 [ 1129.654217] proc_fail_nth_read+0x198/0x230 [ 1129.655209] ? proc_sessionid_read+0x230/0x230 [ 1129.656275] ? security_file_permission+0xb1/0xe0 [ 1129.657373] ? proc_sessionid_read+0x230/0x230 [ 1129.658452] vfs_read+0x228/0x620 [ 1129.659250] ksys_read+0x12d/0x260 [ 1129.660055] ? vfs_write+0xb10/0xb10 [ 1129.660912] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1129.662111] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1129.663277] do_syscall_64+0x33/0x40 [ 1129.664132] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1129.665302] RIP: 0033:0x7fb6dc4e969c [ 1129.666136] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1129.670319] RSP: 002b:00007fb6d9aac170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1129.672062] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fb6dc4e969c [ 1129.673672] RDX: 000000000000000f RSI: 00007fb6d9aac1e0 RDI: 0000000000000004 [ 1129.675285] RBP: 00007fb6d9aac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1129.676891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1129.678518] R13: 00007ffe57c3e96f R14: 00007fb6d9aac300 R15: 0000000000022000 [ 1129.713962] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:58:47 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:58:47 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 1129.804516] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:58:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:58:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 50) 02:58:47 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 1129.846427] loop4: detected capacity change from 0 to 33559552 02:58:47 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 1129.870918] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:58:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, 0x0) (fail_nth: 1) [ 1129.885954] FAULT_INJECTION: forcing a failure. [ 1129.885954] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.888922] CPU: 0 PID: 7870 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1129.890457] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1129.892301] Call Trace: [ 1129.892901] dump_stack+0x107/0x167 [ 1129.893717] should_fail.cold+0x5/0xa [ 1129.894574] should_failslab+0x5/0x20 [ 1129.895426] __kmalloc_track_caller+0x79/0x370 [ 1129.896439] ? kstrdup_const+0x53/0x80 [ 1129.897326] ? kasprintf+0xbb/0xf0 [ 1129.898125] kstrdup+0x36/0x70 [ 1129.898853] kstrdup_const+0x53/0x80 [ 1129.899682] kmem_cache_create_usercopy+0x12f/0x2f0 [ 1129.900808] p9_client_create+0xc6a/0x1230 [ 1129.901754] ? p9_client_flush+0x430/0x430 [ 1129.902689] ? trace_hardirqs_on+0x5b/0x180 [ 1129.903652] ? lockdep_init_map_type+0x2c7/0x780 [ 1129.903934] loop1: detected capacity change from 0 to 33559552 [ 1129.904711] ? __raw_spin_lock_init+0x36/0x110 [ 1129.906434] v9fs_session_init+0x1dd/0x1680 [ 1129.907388] ? lock_release+0x680/0x680 [ 1129.908279] ? kmem_cache_alloc_trace+0x151/0x320 [ 1129.909351] ? v9fs_show_options+0x690/0x690 [ 1129.910332] ? trace_hardirqs_on+0x5b/0x180 [ 1129.911287] ? kasan_unpoison_shadow+0x33/0x50 [ 1129.912303] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1129.913438] v9fs_mount+0x79/0x8f0 [ 1129.914232] ? v9fs_write_inode+0x60/0x60 [ 1129.915159] legacy_get_tree+0x105/0x220 [ 1129.916055] vfs_get_tree+0x8e/0x300 [ 1129.916882] path_mount+0x1429/0x2120 [ 1129.917735] ? strncpy_from_user+0x9e/0x470 [ 1129.918714] ? finish_automount+0xa90/0xa90 [ 1129.919681] ? getname_flags.part.0+0x1dd/0x4f0 [ 1129.920741] ? _copy_from_user+0xfb/0x1b0 [ 1129.921663] __x64_sys_mount+0x282/0x300 [ 1129.922578] ? copy_mnt_ns+0xa00/0xa00 [ 1129.923464] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1129.924702] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1129.925860] do_syscall_64+0x33/0x40 [ 1129.926702] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1129.927864] RIP: 0033:0x7f0ec334eb19 [ 1129.928707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1129.932853] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1129.934570] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1129.936174] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1129.937792] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1129.939394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1129.941005] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1129.942718] kmem_cache_create(9p-fcall-cache-90) failed with error -12 [ 1129.944246] CPU: 0 PID: 7870 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1129.945803] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1129.947672] Call Trace: [ 1129.948263] dump_stack+0x107/0x167 [ 1129.949105] kmem_cache_create_usercopy.cold+0x17/0x65 [ 1129.950298] p9_client_create+0xc6a/0x1230 [ 1129.951262] ? p9_client_flush+0x430/0x430 [ 1129.952210] ? trace_hardirqs_on+0x5b/0x180 [ 1129.953189] ? lockdep_init_map_type+0x2c7/0x780 [ 1129.954265] ? __raw_spin_lock_init+0x36/0x110 [ 1129.955294] v9fs_session_init+0x1dd/0x1680 [ 1129.956279] ? lock_release+0x680/0x680 [ 1129.957195] ? kmem_cache_alloc_trace+0x151/0x320 [ 1129.958272] ? v9fs_show_options+0x690/0x690 [ 1129.959262] ? trace_hardirqs_on+0x5b/0x180 [ 1129.960238] ? kasan_unpoison_shadow+0x33/0x50 [ 1129.961271] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1129.962426] v9fs_mount+0x79/0x8f0 [ 1129.963214] ? v9fs_write_inode+0x60/0x60 [ 1129.964149] legacy_get_tree+0x105/0x220 [ 1129.965054] vfs_get_tree+0x8e/0x300 [ 1129.965877] path_mount+0x1429/0x2120 [ 1129.966726] ? strncpy_from_user+0x9e/0x470 [ 1129.967697] ? finish_automount+0xa90/0xa90 [ 1129.968661] ? getname_flags.part.0+0x1dd/0x4f0 [ 1129.969694] ? _copy_from_user+0xfb/0x1b0 [ 1129.970614] __x64_sys_mount+0x282/0x300 [ 1129.971513] ? copy_mnt_ns+0xa00/0xa00 [ 1129.972376] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1129.973546] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1129.974687] do_syscall_64+0x33/0x40 [ 1129.975507] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1129.976655] RIP: 0033:0x7f0ec334eb19 [ 1129.977478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1129.981563] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1129.983254] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1129.984843] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1129.986417] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1129.987993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1129.989569] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1130.028884] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:58:47 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 1130.037237] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1130.054654] FAULT_INJECTION: forcing a failure. [ 1130.054654] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1130.057332] CPU: 0 PID: 7883 Comm: syz-executor.5 Not tainted 5.10.237 #1 [ 1130.058864] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1130.060751] Call Trace: [ 1130.061340] dump_stack+0x107/0x167 [ 1130.062157] should_fail.cold+0x5/0xa [ 1130.063031] _copy_to_user+0x2e/0x180 [ 1130.063889] simple_read_from_buffer+0xcc/0x160 [ 1130.064953] proc_fail_nth_read+0x198/0x230 [ 1130.065935] ? proc_sessionid_read+0x230/0x230 [ 1130.066971] ? security_file_permission+0xb1/0xe0 [ 1130.068059] ? proc_sessionid_read+0x230/0x230 [ 1130.069098] vfs_read+0x228/0x620 [ 1130.069882] ksys_read+0x12d/0x260 [ 1130.070692] ? vfs_write+0xb10/0xb10 [ 1130.071522] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1130.072725] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1130.073892] do_syscall_64+0x33/0x40 [ 1130.074727] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1130.075883] RIP: 0033:0x7fba6734969c [ 1130.076736] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1130.080896] RSP: 002b:00007fba6490c170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1130.082616] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fba6734969c [ 1130.084221] RDX: 000000000000000f RSI: 00007fba6490c1e0 RDI: 0000000000000004 [ 1130.085837] RBP: 00007fba6490c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1130.087450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1130.089068] R13: 00007ffcde725cdf R14: 00007fba6490c300 R15: 0000000000022000 02:58:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, 0x0) 02:58:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 51) 02:58:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, 0x0) [ 1142.265217] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1142.265737] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1142.280387] FAULT_INJECTION: forcing a failure. [ 1142.280387] name failslab, interval 1, probability 0, space 0, times 0 [ 1142.281818] CPU: 1 PID: 7897 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1142.282646] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1142.283664] Call Trace: [ 1142.283998] dump_stack+0x107/0x167 [ 1142.284447] should_fail.cold+0x5/0xa [ 1142.284937] ? create_object.isra.0+0x3a/0xa20 [ 1142.285481] should_failslab+0x5/0x20 [ 1142.285932] kmem_cache_alloc+0x5b/0x310 [ 1142.286423] ? lock_acquire+0x197/0x470 [ 1142.286917] create_object.isra.0+0x3a/0xa20 [ 1142.287455] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1142.288081] __kmalloc_track_caller+0x177/0x370 [ 1142.288659] ? kstrdup_const+0x53/0x80 [ 1142.289142] ? kasprintf+0xbb/0xf0 [ 1142.289585] kstrdup+0x36/0x70 [ 1142.289963] kstrdup_const+0x53/0x80 [ 1142.290423] kmem_cache_create_usercopy+0x12f/0x2f0 [ 1142.291020] p9_client_create+0xc6a/0x1230 [ 1142.291522] ? p9_client_flush+0x430/0x430 [ 1142.292021] ? trace_hardirqs_on+0x5b/0x180 [ 1142.292526] ? lockdep_init_map_type+0x2c7/0x780 [ 1142.293066] ? __raw_spin_lock_init+0x36/0x110 [ 1142.293607] v9fs_session_init+0x1dd/0x1680 [ 1142.294115] ? lock_release+0x680/0x680 [ 1142.294587] ? kmem_cache_alloc_trace+0x151/0x320 [ 1142.295125] ? v9fs_show_options+0x690/0x690 [ 1142.295645] ? trace_hardirqs_on+0x5b/0x180 [ 1142.296153] ? kasan_unpoison_shadow+0x33/0x50 [ 1142.296700] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1142.297271] v9fs_mount+0x79/0x8f0 [ 1142.297688] ? v9fs_write_inode+0x60/0x60 [ 1142.298161] legacy_get_tree+0x105/0x220 [ 1142.298638] vfs_get_tree+0x8e/0x300 [ 1142.299055] path_mount+0x1429/0x2120 [ 1142.299483] ? strncpy_from_user+0x9e/0x470 [ 1142.299960] ? finish_automount+0xa90/0xa90 [ 1142.300436] ? getname_flags.part.0+0x1dd/0x4f0 [ 1142.300961] ? _copy_from_user+0xfb/0x1b0 [ 1142.301453] __x64_sys_mount+0x282/0x300 [ 1142.301927] ? copy_mnt_ns+0xa00/0xa00 [ 1142.302368] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1142.302981] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1142.303557] do_syscall_64+0x33/0x40 [ 1142.303988] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1142.304560] RIP: 0033:0x7f0ec334eb19 [ 1142.305006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1142.307035] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1142.308148] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1142.308992] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 02:58:59 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) mount$cgroup2(0x0, &(0x7f0000000280)='./file1\x00', &(0x7f0000000300), 0x8000, &(0x7f0000000340)={[{@memory_localevents}, {@memory_recursiveprot}, {}, {@subsystem='cpuset'}, {}, {@memory_localevents}], [{@measure}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0xb}}]}) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x100) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/128, 0x80}, {&(0x7f0000000040)=""/18, 0x12}, {&(0x7f00000001c0)=""/112, 0x70}], 0x3, 0x9, 0x8) 02:58:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(0x0, 0x1) 02:58:59 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:58:59 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:58:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1142.309823] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1142.310813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1142.311708] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:58:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x2, 0x0) [ 1142.333604] loop4: detected capacity change from 0 to 33559552 [ 1142.334152] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1142.339393] loop1: detected capacity change from 0 to 33559552 [ 1142.346486] FAT-fs (loop6): bogus number of reserved sectors [ 1142.347903] FAT-fs (loop6): Can't find a valid FAT filesystem [ 1142.367141] cgroup2: Unknown parameter 'cpuset' 02:58:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x2, 0x0) 02:58:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x4b47, 0x0) [ 1142.399095] FAT-fs (loop6): Unrecognized mount option "./file1" or missing value [ 1142.448657] cgroup2: Unknown parameter 'cpuset' 02:59:12 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:59:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:59:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x4b47, 0x0) 02:59:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x4b49, 0x0) 02:59:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(0x0, 0x1) 02:59:12 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = syz_io_uring_setup(0x3a75, &(0x7f0000000340)={0x0, 0x0, 0x10}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x18}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) syz_io_uring_setup(0x353b, &(0x7f0000000000)={0x0, 0xa5b5, 0x10, 0x3, 0x5d, 0x0, r0}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f00000001c0)=0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3, r7}}, 0x6) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x3, 0x6000, @fd=r6, 0xfffffffffffffffa, &(0x7f0000000100)=[{&(0x7f0000000180)=""/74, 0x4a}], 0x1, 0x12, 0x0, {0x0, r7}}, 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x1, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r7}}, 0x2) syz_io_uring_submit(r4, r5, &(0x7f0000000240)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x1) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:59:12 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:59:12 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 52) [ 1155.288877] loop6: detected capacity change from 0 to 33559552 [ 1155.307263] loop4: detected capacity change from 0 to 33559552 [ 1155.321814] loop1: detected capacity change from 0 to 33559552 02:59:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x4b49, 0x0) 02:59:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x541b, 0x0) [ 1155.354156] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1155.366036] FAULT_INJECTION: forcing a failure. [ 1155.366036] name failslab, interval 1, probability 0, space 0, times 0 [ 1155.368391] CPU: 1 PID: 7946 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1155.369830] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1155.371562] Call Trace: [ 1155.372120] dump_stack+0x107/0x167 [ 1155.372893] should_fail.cold+0x5/0xa [ 1155.373698] ? create_object.isra.0+0x3a/0xa20 [ 1155.374660] should_failslab+0x5/0x20 [ 1155.375462] kmem_cache_alloc+0x5b/0x310 [ 1155.376320] create_object.isra.0+0x3a/0xa20 [ 1155.377256] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1155.378331] kmem_cache_alloc+0x159/0x310 [ 1155.379211] kmem_cache_create_usercopy+0x190/0x2f0 [ 1155.380267] p9_client_create+0xc6a/0x1230 [ 1155.381189] ? p9_client_flush+0x430/0x430 [ 1155.382080] ? trace_hardirqs_on+0x5b/0x180 [ 1155.382986] ? lockdep_init_map_type+0x2c7/0x780 [ 1155.383984] ? __raw_spin_lock_init+0x36/0x110 [ 1155.384968] v9fs_session_init+0x1dd/0x1680 [ 1155.385859] ? lock_release+0x680/0x680 [ 1155.386709] ? kmem_cache_alloc_trace+0x151/0x320 [ 1155.387696] ? v9fs_show_options+0x690/0x690 [ 1155.388638] ? trace_hardirqs_on+0x5b/0x180 [ 1155.389535] ? kasan_unpoison_shadow+0x33/0x50 [ 1155.390491] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1155.391538] v9fs_mount+0x79/0x8f0 [ 1155.392286] ? v9fs_write_inode+0x60/0x60 [ 1155.393144] legacy_get_tree+0x105/0x220 [ 1155.393999] vfs_get_tree+0x8e/0x300 [ 1155.394762] path_mount+0x1429/0x2120 [ 1155.395568] ? strncpy_from_user+0x9e/0x470 [ 1155.396449] ? finish_automount+0xa90/0xa90 [ 1155.397362] ? getname_flags.part.0+0x1dd/0x4f0 [ 1155.398334] ? _copy_from_user+0xfb/0x1b0 [ 1155.399212] __x64_sys_mount+0x282/0x300 [ 1155.400073] ? copy_mnt_ns+0xa00/0xa00 [ 1155.400913] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1155.402013] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1155.403099] do_syscall_64+0x33/0x40 [ 1155.403868] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1155.404966] RIP: 0033:0x7f0ec334eb19 [ 1155.405730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1155.409601] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1155.411170] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1155.412632] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1155.414092] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1155.415555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1155.417022] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:59:13 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(0x0, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:59:25 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 53) 02:59:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x541b, 0x0) 02:59:25 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(0x0, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:59:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:59:25 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:59:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x3, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}, {&(0x7f0000000300)="2f076efc7d0d7e2bc958b52c8eece6759489871265d9ce121dc90fc2531acc6f13564162322c5d0d2e237bb1fc73e1a04e1607bbcb30a6fc23ba572c6c1386c57a2b43df6f64e9d25912e840b5561a29158aa89556942ca934a2dd84f5d58f2927401fbf33ad0b3cc7338942e857be5e9f6d32f8b33ddc968908e208a19d83b64e89bb20c29120883e47ed346d932d1c25d07ab35345b01ac369a97d4861f6e4e551fed1de65c75dc216a34dc511ae416d06242f186155619e9f4fb5847cb0654e02428f3286b1a1e757e864edf21c362469a0f6acd5800508c0", 0xda, 0x4}], 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES16=0x0]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:59:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5421, 0x0) 02:59:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(0x0, 0x1) [ 1167.686754] loop6: detected capacity change from 0 to 33559552 [ 1167.700746] FAULT_INJECTION: forcing a failure. [ 1167.700746] name failslab, interval 1, probability 0, space 0, times 0 [ 1167.702305] CPU: 1 PID: 7975 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1167.703194] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1167.704244] Call Trace: [ 1167.704580] dump_stack+0x107/0x167 [ 1167.705055] should_fail.cold+0x5/0xa [ 1167.705539] ? __kmem_cache_create+0x10e/0x520 [ 1167.706117] should_failslab+0x5/0x20 [ 1167.706599] kmem_cache_alloc_node+0x55/0x330 [ 1167.707172] __kmem_cache_create+0x10e/0x520 [ 1167.707735] kmem_cache_create_usercopy+0x1db/0x2f0 [ 1167.708367] p9_client_create+0xc6a/0x1230 [ 1167.708907] ? p9_client_flush+0x430/0x430 [ 1167.709442] ? trace_hardirqs_on+0x5b/0x180 [ 1167.709994] ? lockdep_init_map_type+0x2c7/0x780 [ 1167.710599] ? __raw_spin_lock_init+0x36/0x110 [ 1167.711183] v9fs_session_init+0x1dd/0x1680 [ 1167.711721] ? lock_release+0x680/0x680 [ 1167.712227] ? kmem_cache_alloc_trace+0x151/0x320 [ 1167.712830] ? v9fs_show_options+0x690/0x690 [ 1167.713392] ? trace_hardirqs_on+0x5b/0x180 [ 1167.713939] ? kasan_unpoison_shadow+0x33/0x50 [ 1167.714505] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1167.715152] v9fs_mount+0x79/0x8f0 [ 1167.715604] ? v9fs_write_inode+0x60/0x60 [ 1167.716133] legacy_get_tree+0x105/0x220 [ 1167.716646] vfs_get_tree+0x8e/0x300 [ 1167.717127] path_mount+0x1429/0x2120 [ 1167.717611] ? strncpy_from_user+0x9e/0x470 [ 1167.718160] ? finish_automount+0xa90/0xa90 [ 1167.718710] ? getname_flags.part.0+0x1dd/0x4f0 [ 1167.718806] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1167.719305] ? _copy_from_user+0xfb/0x1b0 [ 1167.719323] __x64_sys_mount+0x282/0x300 [ 1167.722903] ? copy_mnt_ns+0xa00/0xa00 [ 1167.723393] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1167.724058] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1167.724707] do_syscall_64+0x33/0x40 [ 1167.725176] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1167.725817] RIP: 0033:0x7f0ec334eb19 [ 1167.726285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1167.728312] FAT-fs (loop6): Unrecognized mount option "…¶ñÅy<('⾩Ƚ¾ämº úY¥Ñð ë„ýtTÕ°ìP?ð¦ay·Pü¬õmyaHW£ â e¸ÝÈäåR;þížšÓŨ‚ø+çî$§¦ÀcÐ`Pg«Î@ñ‡Ý!ð&IpF±Ò5漑þÓUFOˆ€™a¬iÀ6½ W¸§VQøNÏxìÆá:a+BÅIâñoëèìåÂSPVÆ:fUÓ^R2“e‰=µŸgDpèØ³HóÝú¶ÝmÍg^©FmpÓÆ;R ²èõ³JlèÄZ’r" or missing value [ 1167.728606] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1167.728619] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1167.728626] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1167.728643] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1167.737731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1167.738607] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1167.739614] kmem_cache_create(9p-fcall-cache-93) failed with error -22 [ 1167.740430] CPU: 1 PID: 7975 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1167.741277] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1167.742293] Call Trace: [ 1167.742619] dump_stack+0x107/0x167 [ 1167.743072] kmem_cache_create_usercopy.cold+0x17/0x65 [ 1167.743720] p9_client_create+0xc6a/0x1230 [ 1167.744259] ? p9_client_flush+0x430/0x430 [ 1167.744782] ? trace_hardirqs_on+0x5b/0x180 [ 1167.745326] ? lockdep_init_map_type+0x2c7/0x780 [ 1167.745925] ? __raw_spin_lock_init+0x36/0x110 [ 1167.746493] v9fs_session_init+0x1dd/0x1680 [ 1167.747032] ? lock_release+0x680/0x680 [ 1167.747531] ? kmem_cache_alloc_trace+0x151/0x320 [ 1167.748127] ? v9fs_show_options+0x690/0x690 [ 1167.748681] ? trace_hardirqs_on+0x5b/0x180 [ 1167.749231] ? kasan_unpoison_shadow+0x33/0x50 [ 1167.749798] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1167.750436] v9fs_mount+0x79/0x8f0 [ 1167.750882] ? v9fs_write_inode+0x60/0x60 [ 1167.751408] legacy_get_tree+0x105/0x220 [ 1167.751917] vfs_get_tree+0x8e/0x300 [ 1167.752379] path_mount+0x1429/0x2120 [ 1167.752871] ? strncpy_from_user+0x9e/0x470 [ 1167.753406] ? finish_automount+0xa90/0xa90 [ 1167.753938] ? getname_flags.part.0+0x1dd/0x4f0 [ 1167.754508] ? _copy_from_user+0xfb/0x1b0 [ 1167.755021] __x64_sys_mount+0x282/0x300 [ 1167.755534] ? copy_mnt_ns+0xa00/0xa00 [ 1167.756017] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1167.756667] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1167.757322] do_syscall_64+0x33/0x40 [ 1167.757787] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1167.758420] RIP: 0033:0x7f0ec334eb19 [ 1167.758877] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1167.761155] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1167.762083] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1167.762950] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1167.763823] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1167.764696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1167.765573] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1167.785956] loop1: detected capacity change from 0 to 33559552 02:59:25 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 54) [ 1167.792639] loop4: detected capacity change from 0 to 33559552 [ 1167.821411] loop6: detected capacity change from 0 to 33559552 [ 1167.832847] FAT-fs (loop6): Unrecognized mount option "…¶ñÅy<('⾩Ƚ¾ämº úY¥Ñð ë„ýtTÕ°ìP?ð¦ay·Pü¬õmyaHW£ â e¸ÝÈäåR;þížšÓŨ‚ø+çî$§¦ÀcÐ`Pg«Î@ñ‡Ý!ð&IpF±Ò5漑þÓUFOˆ€™a¬iÀ6½ W¸§VQøNÏxìÆá:a+BÅIâñoëèìåÂSPVÆ:fUÓ^R2“e‰=µŸgDpèØ³HóÝú¶ÝmÍg^©FmpÓÆ;R ²èõ³JlèÄZ’r" or missing value 02:59:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(0x0, 0x1) 02:59:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5421, 0x0) 02:59:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5450, 0x0) 02:59:25 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(0x0, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 1167.879765] FAULT_INJECTION: forcing a failure. [ 1167.879765] name failslab, interval 1, probability 0, space 0, times 0 [ 1167.881127] CPU: 1 PID: 7992 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1167.881930] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1167.882904] Call Trace: [ 1167.883217] dump_stack+0x107/0x167 [ 1167.883643] should_fail.cold+0x5/0xa [ 1167.884091] ? __kmem_cache_create+0x10e/0x520 [ 1167.884625] should_failslab+0x5/0x20 [ 1167.885080] kmem_cache_alloc_node+0x55/0x330 [ 1167.885611] __kmem_cache_create+0x10e/0x520 [ 1167.886133] kmem_cache_create_usercopy+0x1db/0x2f0 [ 1167.886725] p9_client_create+0xc6a/0x1230 [ 1167.887227] ? p9_client_flush+0x430/0x430 [ 1167.887756] ? trace_hardirqs_on+0x5b/0x180 [ 1167.888268] ? lockdep_init_map_type+0x2c7/0x780 [ 1167.888832] ? __raw_spin_lock_init+0x36/0x110 [ 1167.889376] v9fs_session_init+0x1dd/0x1680 [ 1167.889889] ? lock_release+0x680/0x680 [ 1167.890361] ? kmem_cache_alloc_trace+0x151/0x320 [ 1167.890931] ? v9fs_show_options+0x690/0x690 [ 1167.891457] ? trace_hardirqs_on+0x5b/0x180 [ 1167.891967] ? kasan_unpoison_shadow+0x33/0x50 [ 1167.892499] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1167.893101] v9fs_mount+0x79/0x8f0 [ 1167.893515] ? v9fs_write_inode+0x60/0x60 [ 1167.894001] legacy_get_tree+0x105/0x220 [ 1167.894475] vfs_get_tree+0x8e/0x300 [ 1167.894911] path_mount+0x1429/0x2120 [ 1167.895359] ? strncpy_from_user+0x9e/0x470 [ 1167.895858] ? finish_automount+0xa90/0xa90 [ 1167.896362] ? getname_flags.part.0+0x1dd/0x4f0 [ 1167.896914] ? _copy_from_user+0xfb/0x1b0 [ 1167.897398] __x64_sys_mount+0x282/0x300 [ 1167.897870] ? copy_mnt_ns+0xa00/0xa00 [ 1167.898324] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1167.898932] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1167.899529] do_syscall_64+0x33/0x40 [ 1167.899961] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1167.900557] RIP: 0033:0x7f0ec334eb19 [ 1167.901002] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1167.903121] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1167.904009] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1167.904837] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1167.905671] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1167.906497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1167.907331] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1167.908517] kmem_cache_create(9p-fcall-cache-94) failed with error -22 [ 1167.909363] CPU: 1 PID: 7992 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1167.910155] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1167.911114] Call Trace: [ 1167.911419] dump_stack+0x107/0x167 [ 1167.911844] kmem_cache_create_usercopy.cold+0x17/0x65 [ 1167.912453] p9_client_create+0xc6a/0x1230 [ 1167.912950] ? p9_client_flush+0x430/0x430 [ 1167.913447] ? trace_hardirqs_on+0x5b/0x180 [ 1167.913947] ? lockdep_init_map_type+0x2c7/0x780 [ 1167.914502] ? __raw_spin_lock_init+0x36/0x110 [ 1167.915044] v9fs_session_init+0x1dd/0x1680 [ 1167.915554] ? lock_release+0x680/0x680 [ 1167.916028] ? kmem_cache_alloc_trace+0x151/0x320 [ 1167.916584] ? v9fs_show_options+0x690/0x690 [ 1167.917102] ? trace_hardirqs_on+0x5b/0x180 [ 1167.917602] ? kasan_unpoison_shadow+0x33/0x50 [ 1167.918129] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1167.918718] v9fs_mount+0x79/0x8f0 [ 1167.919130] ? v9fs_write_inode+0x60/0x60 [ 1167.919617] legacy_get_tree+0x105/0x220 [ 1167.920082] vfs_get_tree+0x8e/0x300 [ 1167.920513] path_mount+0x1429/0x2120 [ 1167.920963] ? strncpy_from_user+0x9e/0x470 [ 1167.921462] ? finish_automount+0xa90/0xa90 [ 1167.921961] ? getname_flags.part.0+0x1dd/0x4f0 [ 1167.922497] ? _copy_from_user+0xfb/0x1b0 [ 1167.922982] __x64_sys_mount+0x282/0x300 [ 1167.923453] ? copy_mnt_ns+0xa00/0xa00 [ 1167.923904] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1167.924507] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1167.925113] do_syscall_64+0x33/0x40 [ 1167.925541] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1167.926130] RIP: 0033:0x7f0ec334eb19 [ 1167.926559] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1167.928672] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1167.929555] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1167.930376] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1167.931200] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1167.932030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1167.932846] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1167.939201] loop1: detected capacity change from 0 to 33559552 02:59:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5451, 0x0) 02:59:25 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:59:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = fsmount(0xffffffffffffffff, 0x1, 0x80) getsockname(r0, &(0x7f0000000000)=@tipc=@id, &(0x7f0000000100)=0x80) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:59:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5450, 0x0) 02:59:25 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) [ 1168.093920] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1168.125590] loop6: detected capacity change from 0 to 33559552 02:59:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x0) 02:59:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(0x0, 0x1) 02:59:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5452, 0x0) [ 1180.673291] FAULT_INJECTION: forcing a failure. [ 1180.673291] name failslab, interval 1, probability 0, space 0, times 0 [ 1180.674873] CPU: 0 PID: 8023 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1180.675792] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1180.676919] Call Trace: [ 1180.677282] dump_stack+0x107/0x167 [ 1180.677768] should_fail.cold+0x5/0xa [ 1180.678281] ? create_object.isra.0+0x3a/0xa20 [ 1180.678912] should_failslab+0x5/0x20 [ 1180.679438] kmem_cache_alloc+0x5b/0x310 [ 1180.679987] create_object.isra.0+0x3a/0xa20 [ 1180.680585] kmemleak_alloc_percpu+0xa0/0x100 [ 1180.681200] pcpu_alloc+0x4e2/0x1240 [ 1180.681715] __kmem_cache_create+0x35a/0x520 [ 1180.682316] kmem_cache_create_usercopy+0x1db/0x2f0 [ 1180.682984] p9_client_create+0xc6a/0x1230 [ 1180.683561] ? p9_client_flush+0x430/0x430 [ 1180.684134] ? trace_hardirqs_on+0x5b/0x180 [ 1180.684717] ? lockdep_init_map_type+0x2c7/0x780 [ 1180.685369] ? __raw_spin_lock_init+0x36/0x110 [ 1180.685992] v9fs_session_init+0x1dd/0x1680 [ 1180.686571] ? lock_release+0x680/0x680 [ 1180.687109] ? kmem_cache_alloc_trace+0x151/0x320 [ 1180.687756] ? v9fs_show_options+0x690/0x690 [ 1180.688345] ? trace_hardirqs_on+0x5b/0x180 [ 1180.688929] ? kasan_unpoison_shadow+0x33/0x50 [ 1180.689551] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1180.690236] v9fs_mount+0x79/0x8f0 [ 1180.690724] ? v9fs_write_inode+0x60/0x60 [ 1180.691275] legacy_get_tree+0x105/0x220 [ 1180.691827] vfs_get_tree+0x8e/0x300 [ 1180.692326] path_mount+0x1429/0x2120 [ 1180.692859] ? strncpy_from_user+0x9e/0x470 [ 1180.693439] ? finish_automount+0xa90/0xa90 [ 1180.694033] ? getname_flags.part.0+0x1dd/0x4f0 [ 1180.694669] ? _copy_from_user+0xfb/0x1b0 [ 1180.695231] __x64_sys_mount+0x282/0x300 [ 1180.695789] ? copy_mnt_ns+0xa00/0xa00 [ 1180.696317] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1180.697037] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1180.697735] do_syscall_64+0x33/0x40 [ 1180.698241] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1180.698931] RIP: 0033:0x7f0ec334eb19 [ 1180.699420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1180.702163] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1180.703200] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1180.704145] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1180.705082] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1180.706021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1180.706961] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:59:38 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:59:38 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) truncate(&(0x7f0000000000)='./file0\x00', 0x98) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:59:38 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:59:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5451, 0x0) 02:59:38 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 55) [ 1180.720710] loop6: detected capacity change from 0 to 33559552 [ 1180.726747] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1180.732066] loop1: detected capacity change from 0 to 33559552 02:59:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5460, 0x0) [ 1180.740309] loop4: detected capacity change from 0 to 33559552 02:59:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5452, 0x0) 02:59:38 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:59:38 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x7, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:59:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x0) 02:59:38 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000000)='./file1/file0\x00') truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 02:59:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x6609, 0x0) [ 1180.945866] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1180.975876] loop6: detected capacity change from 0 to 33559552 02:59:38 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 56) 02:59:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5460, 0x0) [ 1180.999283] loop4: detected capacity change from 0 to 33559552 [ 1181.056235] FAULT_INJECTION: forcing a failure. [ 1181.056235] name failslab, interval 1, probability 0, space 0, times 0 [ 1181.058757] CPU: 1 PID: 8063 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1181.060214] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1181.061985] Call Trace: [ 1181.062547] dump_stack+0x107/0x167 [ 1181.063324] should_fail.cold+0x5/0xa [ 1181.064141] ? create_object.isra.0+0x3a/0xa20 [ 1181.065133] should_failslab+0x5/0x20 [ 1181.065943] kmem_cache_alloc+0x5b/0x310 [ 1181.066815] ? mark_held_locks+0x9e/0xe0 [ 1181.067693] create_object.isra.0+0x3a/0xa20 [ 1181.068641] kmemleak_alloc_percpu+0xa0/0x100 [ 1181.069615] pcpu_alloc+0x4e2/0x1240 [ 1181.070420] __kmem_cache_create+0x35a/0x520 [ 1181.071368] kmem_cache_create_usercopy+0x1db/0x2f0 [ 1181.072438] p9_client_create+0xc6a/0x1230 [ 1181.073357] ? p9_client_flush+0x430/0x430 [ 1181.074261] ? trace_hardirqs_on+0x5b/0x180 [ 1181.075185] ? lockdep_init_map_type+0x2c7/0x780 [ 1181.076193] ? __raw_spin_lock_init+0x36/0x110 [ 1181.077189] v9fs_session_init+0x1dd/0x1680 [ 1181.078117] ? lock_release+0x680/0x680 [ 1181.078975] ? kmem_cache_alloc_trace+0x151/0x320 [ 1181.080003] ? v9fs_show_options+0x690/0x690 [ 1181.080948] ? trace_hardirqs_on+0x5b/0x180 [ 1181.081868] ? kasan_unpoison_shadow+0x33/0x50 [ 1181.082836] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1181.083917] v9fs_mount+0x79/0x8f0 [ 1181.084680] ? v9fs_write_inode+0x60/0x60 [ 1181.085575] legacy_get_tree+0x105/0x220 [ 1181.086446] vfs_get_tree+0x8e/0x300 [ 1181.087242] path_mount+0x1429/0x2120 [ 1181.088062] ? strncpy_from_user+0x9e/0x470 [ 1181.088980] ? finish_automount+0xa90/0xa90 [ 1181.089909] ? getname_flags.part.0+0x1dd/0x4f0 [ 1181.090892] ? _copy_from_user+0xfb/0x1b0 [ 1181.091786] __x64_sys_mount+0x282/0x300 [ 1181.092653] ? copy_mnt_ns+0xa00/0xa00 [ 1181.093500] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1181.094610] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1181.095722] do_syscall_64+0x33/0x40 [ 1181.096521] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1181.097620] RIP: 0033:0x7f0ec334eb19 [ 1181.098418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1181.102382] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1181.104023] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1181.105550] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1181.107066] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1181.108589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1181.110116] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:59:38 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 1181.202183] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:59:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x660c, 0x0) 02:59:53 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 57) 02:59:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x0) 02:59:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x6609, 0x0) 02:59:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(0x0, 0x1) [ 1195.675851] FAULT_INJECTION: forcing a failure. [ 1195.675851] name failslab, interval 1, probability 0, space 0, times 0 [ 1195.677474] CPU: 0 PID: 8080 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1195.678394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1195.679541] Call Trace: [ 1195.679915] dump_stack+0x107/0x167 [ 1195.680416] should_fail.cold+0x5/0xa [ 1195.680951] should_failslab+0x5/0x20 [ 1195.681485] __kmalloc_track_caller+0x79/0x370 [ 1195.682118] ? kstrdup_const+0x53/0x80 [ 1195.682663] kstrdup+0x36/0x70 [ 1195.683111] kstrdup_const+0x53/0x80 [ 1195.683625] kvasprintf_const+0x10c/0x1a0 [ 1195.684194] kobject_set_name_vargs+0x56/0x150 [ 1195.684824] kobject_init_and_add+0xc9/0x160 [ 1195.685444] ? kobject_create_and_add+0xb0/0xb0 [ 1195.686093] ? wait_for_completion_io+0x270/0x270 [ 1195.686763] ? kernfs_name_hash+0xe7/0x110 [ 1195.687345] ? kernfs_find_ns+0x256/0x380 [ 1195.687928] sysfs_slab_add+0x172/0x200 [ 1195.688486] __kmem_cache_create+0x3db/0x520 [ 1195.689107] kmem_cache_create_usercopy+0x1db/0x2f0 [ 1195.689804] p9_client_create+0xc6a/0x1230 [ 1195.690394] ? p9_client_flush+0x430/0x430 [ 1195.690984] ? trace_hardirqs_on+0x5b/0x180 [ 1195.691587] ? lockdep_init_map_type+0x2c7/0x780 [ 1195.692241] ? __raw_spin_lock_init+0x36/0x110 [ 1195.692883] v9fs_session_init+0x1dd/0x1680 [ 1195.693498] ? lock_release+0x680/0x680 [ 1195.694057] ? kmem_cache_alloc_trace+0x151/0x320 [ 1195.694715] ? v9fs_show_options+0x690/0x690 [ 1195.695328] ? trace_hardirqs_on+0x5b/0x180 [ 1195.695920] ? kasan_unpoison_shadow+0x33/0x50 [ 1195.696560] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1195.697270] v9fs_mount+0x79/0x8f0 [ 1195.697760] ? v9fs_write_inode+0x60/0x60 [ 1195.698331] legacy_get_tree+0x105/0x220 [ 1195.698896] vfs_get_tree+0x8e/0x300 [ 1195.699411] path_mount+0x1429/0x2120 [ 1195.699945] ? strncpy_from_user+0x9e/0x470 [ 1195.700533] ? finish_automount+0xa90/0xa90 [ 1195.701118] ? getname_flags.part.0+0x1dd/0x4f0 [ 1195.701621] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1195.701762] ? _copy_from_user+0xfb/0x1b0 [ 1195.701789] __x64_sys_mount+0x282/0x300 [ 1195.705572] ? copy_mnt_ns+0xa00/0xa00 [ 1195.706111] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1195.706832] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1195.707539] do_syscall_64+0x33/0x40 [ 1195.708053] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1195.708762] RIP: 0033:0x7f0ec334eb19 [ 1195.709277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1195.711821] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1195.712862] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1195.713849] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1195.714820] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1195.715772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1195.716727] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1195.717747] kobject: can not set name properly! [ 1195.718432] kmem_cache_create(9p-fcall-cache-97) failed with error -12 [ 1195.719345] CPU: 0 PID: 8080 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1195.720255] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1195.721361] Call Trace: [ 1195.721723] dump_stack+0x107/0x167 [ 1195.722228] kmem_cache_create_usercopy.cold+0x17/0x65 [ 1195.722952] p9_client_create+0xc6a/0x1230 [ 1195.723536] ? p9_client_flush+0x430/0x430 [ 1195.724120] ? trace_hardirqs_on+0x5b/0x180 [ 1195.724711] ? lockdep_init_map_type+0x2c7/0x780 [ 1195.725358] ? __raw_spin_lock_init+0x36/0x110 [ 1195.725989] v9fs_session_init+0x1dd/0x1680 [ 1195.726573] ? lock_release+0x680/0x680 [ 1195.727119] ? kmem_cache_alloc_trace+0x151/0x320 [ 1195.727775] ? v9fs_show_options+0x690/0x690 [ 1195.728385] ? trace_hardirqs_on+0x5b/0x180 [ 1195.728967] ? kasan_unpoison_shadow+0x33/0x50 [ 1195.729600] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1195.730286] v9fs_mount+0x79/0x8f0 [ 1195.730771] ? v9fs_write_inode+0x60/0x60 [ 1195.731340] legacy_get_tree+0x105/0x220 [ 1195.731889] vfs_get_tree+0x8e/0x300 [ 1195.732400] path_mount+0x1429/0x2120 [ 1195.732923] ? strncpy_from_user+0x9e/0x470 [ 1195.733513] ? finish_automount+0xa90/0xa90 [ 1195.734104] ? getname_flags.part.0+0x1dd/0x4f0 [ 1195.734732] ? _copy_from_user+0xfb/0x1b0 [ 1195.735319] __x64_sys_mount+0x282/0x300 [ 1195.735864] ? copy_mnt_ns+0xa00/0xa00 [ 1195.736403] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1195.737289] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1195.737997] do_syscall_64+0x33/0x40 [ 1195.738499] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1195.739211] RIP: 0033:0x7f0ec334eb19 [ 1195.739710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1195.742232] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1195.743263] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1195.744237] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1195.745214] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1195.746189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1195.747167] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:59:53 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:59:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 02:59:53 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e666174000208010004e36dd8fb2569", 0x17}, {0x0, 0x0, 0x40c7}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1195.749127] loop4: detected capacity change from 0 to 33559552 [ 1195.756477] loop6: detected capacity change from 0 to 32768 [ 1195.762957] loop1: detected capacity change from 0 to 33559552 [ 1195.787323] FAT-fs (loop6): invalid media value (0x25) [ 1195.788584] FAT-fs (loop6): Can't find a valid FAT filesystem 02:59:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 1195.863086] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 02:59:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x660c, 0x0) [ 1195.884038] loop6: detected capacity change from 0 to 32768 02:59:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x6611, 0x0) [ 1195.900947] FAT-fs (loop6): Unrecognized mount option "./file1" or missing value 02:59:53 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 02:59:53 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 58) 02:59:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) [ 1196.076445] FAULT_INJECTION: forcing a failure. [ 1196.076445] name failslab, interval 1, probability 0, space 0, times 0 [ 1196.079208] CPU: 0 PID: 8112 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1196.080762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1196.082679] Call Trace: [ 1196.083285] dump_stack+0x107/0x167 [ 1196.084142] should_fail.cold+0x5/0xa [ 1196.085022] ? create_object.isra.0+0x3a/0xa20 [ 1196.086096] should_failslab+0x5/0x20 [ 1196.086958] kmem_cache_alloc+0x5b/0x310 [ 1196.087896] ? mark_held_locks+0x9e/0xe0 [ 1196.088848] create_object.isra.0+0x3a/0xa20 [ 1196.089880] kmemleak_alloc_percpu+0xa0/0x100 [ 1196.090917] pcpu_alloc+0x4e2/0x1240 [ 1196.092013] __kmem_cache_create+0x35a/0x520 [ 1196.093077] kmem_cache_create_usercopy+0x1db/0x2f0 [ 1196.094243] p9_client_create+0xc6a/0x1230 [ 1196.095219] ? p9_client_flush+0x430/0x430 [ 1196.096200] ? trace_hardirqs_on+0x5b/0x180 [ 1196.097208] ? lockdep_init_map_type+0x2c7/0x780 [ 1196.098300] ? __raw_spin_lock_init+0x36/0x110 [ 1196.099352] v9fs_session_init+0x1dd/0x1680 [ 1196.100353] ? lock_release+0x680/0x680 [ 1196.101294] ? kmem_cache_alloc_trace+0x151/0x320 [ 1196.102410] ? v9fs_show_options+0x690/0x690 [ 1196.103431] ? trace_hardirqs_on+0x5b/0x180 [ 1196.104426] ? kasan_unpoison_shadow+0x33/0x50 [ 1196.105488] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1196.106664] v9fs_mount+0x79/0x8f0 [ 1196.107498] ? v9fs_write_inode+0x60/0x60 [ 1196.108470] legacy_get_tree+0x105/0x220 [ 1196.109430] vfs_get_tree+0x8e/0x300 [ 1196.110355] path_mount+0x1429/0x2120 [ 1196.111484] ? strncpy_from_user+0x9e/0x470 [ 1196.112724] ? finish_automount+0xa90/0xa90 [ 1196.114027] ? getname_flags.part.0+0x1dd/0x4f0 [ 1196.115260] ? _copy_from_user+0xfb/0x1b0 [ 1196.116267] __x64_sys_mount+0x282/0x300 [ 1196.117232] ? copy_mnt_ns+0xa00/0xa00 [ 1196.118152] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1196.119384] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1196.120612] do_syscall_64+0x33/0x40 [ 1196.121503] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1196.122701] RIP: 0033:0x7f0ec334eb19 [ 1196.123584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1196.127874] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1196.129668] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1196.131320] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1196.132978] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1196.134641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1196.136315] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 02:59:53 executing program 6: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYRES64=r0, @ANYRES32=0x0, @ANYBLOB="0c009900070000000d0000000c0058003100000000000000"], 0x34}, 0x1, 0x0, 0x0, 0x40080}, 0x4040080) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680)={0x0}, &(0x7f00000006c0)=0xc) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x89, 0x7, 0x6, 0xff, 0x0, 0x1, 0x1, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0xa9, 0xffff}, 0x12104, 0x7ff, 0x586, 0xf, 0x1, 0xfffffff9, 0x1, 0x0, 0xf504, 0x0, 0x200000}, r2, 0x4, r1, 0x0) fallocate(r1, 0x30, 0xffffffffffffff75, 0x10001) r3 = openat2(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', &(0x7f0000000380)={0x125200, 0x14, 0x2}, 0x18) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000280)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000540)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="05000000000000000000a5ae6ba6dabf5c033b45a29517fc2bfb4400000008000300042fce2f8c251422523d29dc8a6cea443173103768903bd05cd05cdea53be1c9a756c22a73c79e4467284f4c50cbd44e8ee09f2efdb0e500f5ba4607d6f8828602238033d457af604b8b1ee264cf6bd77be5d3eabe4602e963276427422fc158a722c419fad744fbc2114a6d24c4a509769cf7f9", @ANYRES32=r7, @ANYBLOB="0c0023800500070002000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)={0x74, r5, 0x300, 0x70bd2d, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0xfffffff7, 0x3}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x2}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x3}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x74}, 0x1, 0x0, 0x0, 0x11}, 0x2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000740)=ANY=[@ANYBLOB="95b50000018fd73a76f1d232880000001800000074691ed445df6e200a800594b185294770a2813006e3225b251db6f3b54e", @ANYRES32=r1, @ANYBLOB="04a500006ccf5e00a30878ffff75db00808ebf8b85b5363cdf1595a0bee6cc6ec57b594af05d2bcaace304ab11b2f0de03bff4371a9012ef1c32b4b5c6366f172a140b3c90f6de5877ef5a6a3a26844c4bc8c82413041c010b22156a4c9a107723a5f2df0884ac7b2d8cf48af5dc01fc3d1d08a58cc865e3f2f712e1a4eabdc0986bd04ce4c790d9de030b3ca0239c52c979afa3e6e8c80f01000eba254f7d13aa0b68306d66d92477fe946e898db0c1"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000100)={0x3000000a}) ioctl$FAT_IOCTL_GET_VOLUME_ID(r1, 0x80047213, &(0x7f0000000000)) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x211d030, &(0x7f0000000ac0)=ANY=[@ANYRES16=r1, @ANYBLOB="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", @ANYRES16, @ANYRESHEX, @ANYRES16=r6, @ANYRESDEC=r7]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1196.156113] loop6: detected capacity change from 0 to 33559552 02:59:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x6612, 0x0) [ 1196.229764] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1196.267075] loop6: detected capacity change from 0 to 33559552 03:00:08 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0xff, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 03:00:08 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 03:00:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 59) 03:00:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x6628, 0x0) 03:00:08 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17, 0x800}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) open(&(0x7f0000000100)='./file2\x00', 0x80, 0x64) faccessat2(r1, &(0x7f0000000000)='./file0\x00', 0x140, 0x1200) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) openat(r0, &(0x7f0000000040)='./file0\x00', 0x82800, 0x8a) 03:00:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(&(0x7f00000000c0)='./file1\x00', 0x0) 03:00:08 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 03:00:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x6611, 0x0) 03:00:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40046629, 0x0) [ 1210.889863] FAULT_INJECTION: forcing a failure. [ 1210.889863] name failslab, interval 1, probability 0, space 0, times 0 [ 1210.891506] CPU: 0 PID: 8132 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1210.892467] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1210.893638] Call Trace: [ 1210.893783] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1210.894026] dump_stack+0x107/0x167 [ 1210.897008] should_fail.cold+0x5/0xa [ 1210.897544] should_failslab+0x5/0x20 [ 1210.898058] __kmalloc_track_caller+0x79/0x370 [ 1210.898696] ? kstrdup_const+0x53/0x80 [ 1210.899238] kstrdup+0x36/0x70 [ 1210.899690] kstrdup_const+0x53/0x80 [ 1210.900191] __kernfs_new_node+0x9d/0x860 [ 1210.900766] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1210.901412] ? lock_acquire+0x197/0x470 [ 1210.901965] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1210.902678] ? lock_release+0x680/0x680 [ 1210.903212] ? find_held_lock+0x2c/0x110 [ 1210.903761] kernfs_new_node+0x18d/0x250 [ 1210.904313] kernfs_create_dir_ns+0x49/0x160 [ 1210.904917] sysfs_create_dir_ns+0x127/0x290 [ 1210.905516] ? sysfs_create_mount_point+0xb0/0xb0 [ 1210.906160] ? rwlock_bug.part.0+0x90/0x90 [ 1210.906741] ? do_raw_spin_unlock+0x4f/0x220 [ 1210.907344] kobject_add_internal+0x25e/0xa30 [ 1210.907955] kobject_init_and_add+0x101/0x160 [ 1210.908561] ? kobject_create_and_add+0xb0/0xb0 [ 1210.909200] ? wait_for_completion_io+0x270/0x270 [ 1210.909858] ? kernfs_name_hash+0xe7/0x110 [ 1210.910423] ? kernfs_find_ns+0x256/0x380 [ 1210.910979] sysfs_slab_add+0x172/0x200 [ 1210.911513] __kmem_cache_create+0x3db/0x520 [ 1210.912102] kmem_cache_create_usercopy+0x1db/0x2f0 [ 1210.912783] p9_client_create+0xc6a/0x1230 [ 1210.913365] ? p9_client_flush+0x430/0x430 [ 1210.913924] ? trace_hardirqs_on+0x5b/0x180 [ 1210.914505] ? lockdep_init_map_type+0x2c7/0x780 [ 1210.915136] ? __raw_spin_lock_init+0x36/0x110 [ 1210.915760] v9fs_session_init+0x1dd/0x1680 [ 1210.916338] ? lock_release+0x680/0x680 [ 1210.916894] ? kmem_cache_alloc_trace+0x151/0x320 [ 1210.917565] ? v9fs_show_options+0x690/0x690 [ 1210.918174] ? trace_hardirqs_on+0x5b/0x180 [ 1210.918750] ? kasan_unpoison_shadow+0x33/0x50 [ 1210.919357] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1210.920029] v9fs_mount+0x79/0x8f0 [ 1210.920505] ? v9fs_write_inode+0x60/0x60 [ 1210.921083] legacy_get_tree+0x105/0x220 [ 1210.921659] vfs_get_tree+0x8e/0x300 [ 1210.922171] path_mount+0x1429/0x2120 [ 1210.922479] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1210.922697] ? strncpy_from_user+0x9e/0x470 [ 1210.922709] ? finish_automount+0xa90/0xa90 [ 1210.922720] ? getname_flags.part.0+0x1dd/0x4f0 [ 1210.922731] ? _copy_from_user+0xfb/0x1b0 [ 1210.922757] __x64_sys_mount+0x282/0x300 [ 1210.928043] ? copy_mnt_ns+0xa00/0xa00 [ 1210.928559] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1210.929264] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1210.929982] do_syscall_64+0x33/0x40 [ 1210.930472] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1210.931154] RIP: 0033:0x7f0ec334eb19 [ 1210.931651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1210.934147] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1210.935158] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1210.936131] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1210.937090] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1210.938046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1210.939014] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1210.940055] kobject_add_internal failed for 9p-fcall-cache-99 (error: -12 parent: slab) [ 1210.941219] kmem_cache_create(9p-fcall-cache-99) failed with error -12 [ 1210.942125] CPU: 0 PID: 8132 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1210.943027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1210.944147] Call Trace: [ 1210.944495] dump_stack+0x107/0x167 [ 1210.944982] kmem_cache_create_usercopy.cold+0x17/0x65 [ 1210.945698] p9_client_create+0xc6a/0x1230 [ 1210.946268] ? p9_client_flush+0x430/0x430 [ 1210.946832] ? trace_hardirqs_on+0x5b/0x180 [ 1210.947396] ? lockdep_init_map_type+0x2c7/0x780 [ 1210.948033] ? __raw_spin_lock_init+0x36/0x110 [ 1210.948639] v9fs_session_init+0x1dd/0x1680 [ 1210.949207] ? lock_release+0x680/0x680 [ 1210.949753] ? kmem_cache_alloc_trace+0x151/0x320 [ 1210.950397] ? v9fs_show_options+0x690/0x690 [ 1210.950987] ? trace_hardirqs_on+0x5b/0x180 [ 1210.951559] ? kasan_unpoison_shadow+0x33/0x50 [ 1210.952176] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1210.952861] v9fs_mount+0x79/0x8f0 [ 1210.953322] ? v9fs_write_inode+0x60/0x60 [ 1210.953881] legacy_get_tree+0x105/0x220 [ 1210.954426] vfs_get_tree+0x8e/0x300 [ 1210.954924] path_mount+0x1429/0x2120 [ 1210.955439] ? strncpy_from_user+0x9e/0x470 [ 1210.956007] ? finish_automount+0xa90/0xa90 [ 1210.956583] ? getname_flags.part.0+0x1dd/0x4f0 [ 1210.957192] ? _copy_from_user+0xfb/0x1b0 [ 1210.957776] __x64_sys_mount+0x282/0x300 [ 1210.958319] ? copy_mnt_ns+0xa00/0xa00 [ 1210.958832] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1210.959526] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1210.960208] do_syscall_64+0x33/0x40 [ 1210.960714] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1210.961399] RIP: 0033:0x7f0ec334eb19 [ 1210.961890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1210.964329] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1210.965325] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1210.966270] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1210.967216] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1210.968154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1210.969109] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 03:00:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x6612, 0x0) [ 1210.974966] loop6: detected capacity change from 0 to 33559552 [ 1210.978670] FAT-fs (loop6): bogus number of reserved sectors [ 1210.979460] FAT-fs (loop6): Can't find a valid FAT filesystem [ 1210.983868] loop1: detected capacity change from 0 to 33559552 [ 1210.998749] loop6: detected capacity change from 0 to 33559552 [ 1211.001928] FAT-fs (loop6): Unrecognized mount option "./file1" or missing value 03:00:08 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000300)="19c4ac960eb3fea4b37dc2d43989b06c393ec018c0921d95cd87953e15d5e8f9b6245c12542079bedaf21349148ec93fdeb695953730d0844f5afb697af2a88f255023ebcaab3b7c381fb4a878dc2cbc7ba639a2957e1f05abfa0b49f16ad9a4ffc3a13c3b9362a921f9510ff2701f33396b6fe31e0aa4c914421a6f4b771aef077aa5edb143a50baf0ca421c03dea670367797c5547", 0x0, 0x0, 0x0, {0x0, r0}}, 0xffffffff) r1 = syz_io_uring_setup(0x3a75, &(0x7f0000000340)={0x0, 0x0, 0x10}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x18}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) r5 = syz_open_dev$mouse(&(0x7f0000000040), 0x7, 0x220000) syz_io_uring_submit(0x0, r3, &(0x7f0000000100)=@IORING_OP_FALLOCATE={0x11, 0x1, 0x0, @fd=r5, 0x2, 0x0, 0x100}, 0xa0) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) 03:00:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40049409, 0x0) [ 1211.044021] loop6: detected capacity change from 0 to 33559552 03:00:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) truncate(0x0, 0x1) [ 1211.119194] loop4: detected capacity change from 0 to 33559552 03:00:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 60) 03:00:08 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) execve(&(0x7f0000000040)='./file2\x00', &(0x7f00000003c0)=[&(0x7f0000000140)='}}\'\'K\xe9-\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000480)=[&(0x7f0000000400)=':\x00']) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000018000000000000fa11fa26d75aaae8a8d989a197bdfe12f6e08e08c9f8c9fddeb6b57c8185db4dd7e261e3a7d2f79b558ff1fe5155397c04", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x7, 0x0, 0x6, 0x0, 0x45a, 0x100, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x20, 0x2000000000000, 0x7, 0x4, 0xfffffffffffffff7, 0xcc, 0x6, 0x0, 0x6, 0x0, 0x4}, r2, 0x6, r1, 0x9) mknodat$loop(0xffffffffffffffff, &(0x7f0000000440)='./file2\x00', 0x1000, 0x1) 03:00:08 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xdf, 0x3, 0x0, 0x0, 0x0, 0x4, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x2, @perf_config_ext={0x4, 0x7f}, 0x11a4, 0x1, 0x6, 0x9, 0x80000001, 0xa30, 0x8, 0x0, 0xffffffc1}, 0x0, 0xf, r0, 0x3) process_vm_readv(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff, r3}) ptrace$peek(0x1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x80464c453f) connect$inet6(r4, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 03:00:08 executing program 6: arch_prctl$ARCH_GET_CPUID(0x1011) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1/file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) [ 1211.193681] loop6: detected capacity change from 0 to 33559552 [ 1211.204234] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1211.257850] FAULT_INJECTION: forcing a failure. [ 1211.257850] name failslab, interval 1, probability 0, space 0, times 0 [ 1211.259381] CPU: 0 PID: 8173 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1211.260253] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1211.261296] Call Trace: [ 1211.261651] dump_stack+0x107/0x167 [ 1211.262101] should_fail.cold+0x5/0xa [ 1211.262579] should_failslab+0x5/0x20 [ 1211.263057] __kmalloc_track_caller+0x79/0x370 [ 1211.263624] ? kstrdup_const+0x53/0x80 [ 1211.264113] kstrdup+0x36/0x70 [ 1211.264514] kstrdup_const+0x53/0x80 [ 1211.264975] __kernfs_new_node+0x9d/0x860 [ 1211.265492] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1211.266080] ? lock_acquire+0x197/0x470 [ 1211.266570] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1211.267211] ? lock_release+0x680/0x680 [ 1211.267694] ? find_held_lock+0x2c/0x110 [ 1211.268200] kernfs_new_node+0x18d/0x250 [ 1211.268699] kernfs_create_dir_ns+0x49/0x160 [ 1211.269242] sysfs_create_dir_ns+0x127/0x290 [ 1211.269791] ? sysfs_create_mount_point+0xb0/0xb0 [ 1211.270380] ? rwlock_bug.part.0+0x90/0x90 [ 1211.270901] ? do_raw_spin_unlock+0x4f/0x220 [ 1211.271446] kobject_add_internal+0x25e/0xa30 [ 1211.271998] kobject_init_and_add+0x101/0x160 [ 1211.272549] ? kobject_create_and_add+0xb0/0xb0 [ 1211.273122] ? wait_for_completion_io+0x270/0x270 [ 1211.273719] ? kernfs_name_hash+0xe7/0x110 [ 1211.274238] ? kernfs_find_ns+0x256/0x380 [ 1211.274752] sysfs_slab_add+0x172/0x200 [ 1211.275252] __kmem_cache_create+0x3db/0x520 [ 1211.275796] kmem_cache_create_usercopy+0x1db/0x2f0 [ 1211.276413] p9_client_create+0xc6a/0x1230 [ 1211.276942] ? p9_client_flush+0x430/0x430 [ 1211.277470] ? trace_hardirqs_on+0x5b/0x180 [ 1211.278000] ? lockdep_init_map_type+0x2c7/0x780 [ 1211.278579] ? __raw_spin_lock_init+0x36/0x110 [ 1211.279145] v9fs_session_init+0x1dd/0x1680 [ 1211.279676] ? lock_release+0x680/0x680 [ 1211.280169] ? kmem_cache_alloc_trace+0x151/0x320 [ 1211.280761] ? v9fs_show_options+0x690/0x690 [ 1211.281309] ? trace_hardirqs_on+0x5b/0x180 [ 1211.281848] ? kasan_unpoison_shadow+0x33/0x50 [ 1211.282408] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1211.283031] v9fs_mount+0x79/0x8f0 [ 1211.283469] ? v9fs_write_inode+0x60/0x60 [ 1211.283975] legacy_get_tree+0x105/0x220 [ 1211.284476] vfs_get_tree+0x8e/0x300 [ 1211.284933] path_mount+0x1429/0x2120 [ 1211.285411] ? strncpy_from_user+0x9e/0x470 [ 1211.285939] ? finish_automount+0xa90/0xa90 [ 1211.286473] ? getname_flags.part.0+0x1dd/0x4f0 [ 1211.287040] ? _copy_from_user+0xfb/0x1b0 [ 1211.287556] __x64_sys_mount+0x282/0x300 [ 1211.288051] ? copy_mnt_ns+0xa00/0xa00 [ 1211.288526] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1211.289172] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1211.289817] do_syscall_64+0x33/0x40 [ 1211.290284] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1211.290907] RIP: 0033:0x7f0ec334eb19 [ 1211.291364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1211.293620] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1211.294565] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1211.295441] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1211.296312] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1211.297181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1211.298062] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1211.299056] kobject_add_internal failed for 9p-fcall-cache-100 (error: -12 parent: slab) [ 1211.300127] kmem_cache_create(9p-fcall-cache-100) failed with error -12 [ 1211.300968] CPU: 0 PID: 8173 Comm: syz-executor.7 Not tainted 5.10.237 #1 [ 1211.301811] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1211.302823] Call Trace: [ 1211.303146] dump_stack+0x107/0x167 [ 1211.303599] kmem_cache_create_usercopy.cold+0x17/0x65 [ 1211.304241] p9_client_create+0xc6a/0x1230 [ 1211.304760] ? p9_client_flush+0x430/0x430 [ 1211.305275] ? trace_hardirqs_on+0x5b/0x180 [ 1211.305809] ? lockdep_init_map_type+0x2c7/0x780 [ 1211.306388] ? __raw_spin_lock_init+0x36/0x110 [ 1211.306947] v9fs_session_init+0x1dd/0x1680 [ 1211.307472] ? lock_release+0x680/0x680 [ 1211.307968] ? kmem_cache_alloc_trace+0x151/0x320 [ 1211.308559] ? v9fs_show_options+0x690/0x690 [ 1211.309097] ? trace_hardirqs_on+0x5b/0x180 [ 1211.309630] ? kasan_unpoison_shadow+0x33/0x50 [ 1211.310194] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1211.310813] v9fs_mount+0x79/0x8f0 [ 1211.311245] ? v9fs_write_inode+0x60/0x60 [ 1211.311750] legacy_get_tree+0x105/0x220 [ 1211.312244] vfs_get_tree+0x8e/0x300 [ 1211.312693] path_mount+0x1429/0x2120 [ 1211.313161] ? strncpy_from_user+0x9e/0x470 [ 1211.313700] ? finish_automount+0xa90/0xa90 [ 1211.314222] ? getname_flags.part.0+0x1dd/0x4f0 [ 1211.314798] ? _copy_from_user+0xfb/0x1b0 [ 1211.315309] __x64_sys_mount+0x282/0x300 [ 1211.315809] ? copy_mnt_ns+0xa00/0xa00 [ 1211.316286] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1211.316932] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1211.317570] do_syscall_64+0x33/0x40 [ 1211.318021] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1211.318644] RIP: 0033:0x7f0ec334eb19 [ 1211.319096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1211.321347] RSP: 002b:00007f0ec08c4188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1211.322275] RAX: ffffffffffffffda RBX: 00007f0ec3461f60 RCX: 00007f0ec334eb19 [ 1211.323140] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 1211.324008] RBP: 00007f0ec08c41d0 R08: 00000000200005c0 R09: 0000000000000000 [ 1211.324897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1211.325785] R13: 00007ffc79d1b64f R14: 00007f0ec08c4300 R15: 0000000000022000 [ 1224.821784] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888008da06c0 (size 32): comm "syz-executor.7", pid 8132, jiffies 4295877742 (age 22.508s) hex dump (first 32 bytes): 39 70 2d 66 63 61 6c 6c 2d 63 61 63 68 65 2d 39 9p-fcall-cache-9 39 00 da 08 80 88 ff ff 5f 74 00 73 30 00 00 00 9......._t.s0... backtrace: [<00000000d3304659>] kstrdup+0x36/0x70 [<00000000c284c5a9>] kstrdup_const+0x53/0x80 [<000000003db77d0c>] kvasprintf_const+0x10c/0x1a0 [<00000000ce6efd99>] kobject_set_name_vargs+0x56/0x150 [<000000005cdc4aa7>] kobject_init_and_add+0xc9/0x160 [<000000007071df98>] sysfs_slab_add+0x172/0x200 [<00000000e4c8e25d>] __kmem_cache_create+0x3db/0x520 [<00000000a9a6dbb9>] kmem_cache_create_usercopy+0x1db/0x2f0 [<000000006074b721>] p9_client_create+0xc6a/0x1230 [<000000002b704102>] v9fs_session_init+0x1dd/0x1680 [<00000000f53a2934>] v9fs_mount+0x79/0x8f0 [<000000001e513877>] legacy_get_tree+0x105/0x220 [<0000000087bb0baf>] vfs_get_tree+0x8e/0x300 [<000000004426d938>] path_mount+0x1429/0x2120 [<000000004e28dbea>] __x64_sys_mount+0x282/0x300 [<0000000076374451>] do_syscall_64+0x33/0x40 BUG: leak checking failed VM DIAGNOSIS: 03:00:31 Registers: info registers vcpu 0 RAX=ffffffff83e91390 RBX=0000000000000000 RCX=ffffffff83e78f2c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e91998 RBP=0000000000000000 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85678748 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e9139e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f4b0f988020 CR3=000000000e294000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=00000000dddd06aa EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000bfe62e42fefa39ef XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e91390 RBX=0000000000000001 RCX=ffffffff83e78f2c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e91998 RBP=0000000000000001 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85678748 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e9139e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffdbb6a9720 CR3=000000000e294000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=532e29646d432a282e636578652f736f XMM03=00000000000000000000000000000000 XMM04=6b61656c2079726f6d656d203a475542 XMM05=32343178302b746e756f6d5f68746170 XMM06=303c5b202020200a3032313278302f39 XMM07=3e616562643832653430303030303030 XMM08=6e756f6d5f7379735f3436785f5f205d XMM09=20200a30303378302f32383278302b74 XMM10=3733363730303030303030303c5b2020 XMM11=6c61637379735f6f64205d3e31353434 XMM12=0a0a303478302f333378302b34365f6c XMM13=69727420636578650b00657461646964 XMM14=696d696e696d20636578650d00656761 XMM15=000073746e696820636578650a00657a