3e6c5db78f61de95f6ea696", 0x6b}], 0x2, &(0x7f00000012c0)=[@rthdr={{0x68, 0x29, 0x39, {0x67, 0xa, 0x1, 0x6, 0x0, [@dev={0xfe, 0x80, '\x00', 0x16}, @private1={0xfc, 0x1, '\x00', 0x1}, @private1, @rand_addr=' \x01\x00', @loopback]}}}], 0x68}}], 0x3, 0x4) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x8, 0x0) sendmsg$inet6(r2, &(0x7f0000000940)={&(0x7f0000000100)={0xa, 0x4e21, 0x401, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8001}, 0x1c, &(0x7f0000000640)=[{&(0x7f0000000140)="bfddef5f5b0d9c02b57a5d0ed178abff8337043ebca0760557eaaf7c727e7fd034f964359605a8c698def3cfe412fbdc732de88f33087b1079a44ef02a15b33f0e3ce8c0382c3b1d2207f6bca3", 0x4d}, {&(0x7f0000000200)="739f9684155848c72a3f075a62608e254d0877627fd6b0828a9577ec9403b6b2489da9be0ab6d672a975221f92a78aaa93891278bb3db25267aa2981d8e09937c47b856ffb21ffb4328712", 0x4b}, {&(0x7f0000000280)="85afa59a3754f4de4e6e241de06f1902e2ed5e3ddaa2aa0bda8a4cdb8009295658d1b621881a485a88ecb2478ea51c1c5a53b27bb15c56fac7a3c5b5aaa72b27222d4a44927018631a8457d1895deca7c452ffa136670ad65c3b672fa014e6309cf8075f85eecc67a14bfb1ec8cf5dbbb79e87f9cadc6e110a03696ccf3210dca5cc3afb1f3358442b044d44d6a43443bb53c07dad57c304bc59fd83ac34a83b5fe3d33d82e383c44cd30c20a450b364a52a796185f3b1913f787c544c3e20304a233a2e117b172cbd36be2bd9dec61f6067fb0836a2c588977139bcdab30aad6d8927ce60fafd69a9e8e5f0fffd", 0xee}, {&(0x7f0000000380)="0a31ed0d3fa4eb1ec94c298a7fe36a532035e2e423772235a84eb2714757a54a74fdaad4ed8aefefcff63ff0a5f111a352104ddc76a5cda14df38e6eeb98fa286dfe208b1ebd70c974b5b353a3ffce21", 0x50}, {&(0x7f0000000400)="0ab63f006a3cb8ffe1be777c82d0dc2294f6cbcbcc87fefeb0109909f92666165803110049e5e13110056340a417bccb8a7043bad2c70573a12ef66883a9d8454f71f503bcfc80000529fb65ff9f805807f39feb6932bf8c9e266bb49c7a4ad313862e5671550f99a6ed119448f86e414068a621c82554b20e684348b1640868c1e1004d93f4f2d9621eb6cc30ce5a3f6ccd1b8d3114206da74b5d45ef94615f3ecca86e4e2f4f2c8cbfc5058ae1b6105e9403797a238c34e02a128d605f461aad466bdf0841d042e52db4cfb5c7bfcb67fa7bc0e95fe8560dd3a7e5cb98", 0xde}, {&(0x7f0000000500)="54c43b7279646d2b84a9a8c4", 0xc}, {&(0x7f0000000580)="0ce62d7c404ac215ad019223a5bbf71198465c70c2301ede342b849906e6ebf44d06d83fb59dc4ca1417acfc2b286b147788d5193af1a5df6ec9137bf7586440b9020feb8a96c0623b395bbc125b3945e5d2cbcba6840e9319be4b50bb352489a2a56cbda782b12ba730501d934ae313c82057b970c00449e98ace30079c1b813a1d5c8b92d885afae8d1dae8d4f57f42f0dcf476dc4431c816c24fae7395dd24430f20b51fd61c20c72fa5c986aca7a73c41246917f58f612dc", 0xba}], 0x7, &(0x7f0000000980)=[@rthdr={{0x98, 0x29, 0x39, {0x32, 0x10, 0x1, 0x1f, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x28}, @rand_addr=' \x01\x00', @private2={0xfc, 0x2, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev={0xfe, 0x80, '\x00', 0x12}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x85b}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0x38}}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x3}}, @flowinfo={{0x14, 0x29, 0xb, 0x270edc5}}, @tclass={{0x14, 0x29, 0x43, 0x4}}, @hopopts_2292={{0x30, 0x29, 0x36, {0x3b, 0x2, '\x00', [@generic={0x8, 0x12, "6bbdf77128d240020178c5e8303095855fdb"}]}}}, @hopopts={{0x8, 0x29, 0x36, {0x3c, 0x0, '\x00', [@generic={0x59}, @pad1]}}}, @rthdrdstopts={{0xc0, 0x29, 0x37, {0xff, 0x14, '\x00', [@hao={0xc9, 0x0, @private1={0xfc, 0x1, '\x00', 0x21}}, @ra={0x5, 0x2, 0x540}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}]}}}], 0x230}, 0xc064) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000001700)=""/4099, 0xffffff3e, 0xcd04, 0x0, 0xfffffffffffffed7) [ 343.963668] loop5: detected capacity change from 0 to 262144 04:20:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:20:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0), 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) 04:20:14 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 343.982190] loop4: detected capacity change from 0 to 135266304 [ 344.086806] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: special inode unallocated [ 344.103399] EXT4-fs (loop5): get root inode failed [ 344.104936] EXT4-fs (loop5): mount failed 04:20:14 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:20:14 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/mcfilter\x00') ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000280)) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/115, 0x73}], 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000064d922e8a300", @ANYRES16=0x0, @ANYBLOB="01002cbd7000fedbdf2574000000"], 0x14}}, 0x8000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) syz_io_uring_setup(0x24a7, &(0x7f0000000080), &(0x7f0000fed000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, 0x0, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000fef000/0x2000)=nil, 0x2000, 0xf, 0x12, r1, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)={0x0, 0xa1, 0x1}, 0x18) syz_io_uring_submit(r2, 0x0, 0x0, 0x0) mbind(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x0, 0x0, 0x0, 0x2) 04:20:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0), 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) [ 344.379819] loop5: detected capacity change from 0 to 262144 04:20:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000440)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000000)="19a72258db8799f3840d9debc2e602cb", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000200)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000000300)={{'\x00', 0x2}, {0xfff}, 0x0, 0x0, 0x0, &(0x7f0000000100)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f00000004c0)="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", 0x180, 0x0, &(0x7f0000000800)={0x2, 0x14b, {0x1, 0xc, 0xb5, "28cdc2b66cda88a5898df953db262d20d07860f82a3fe4029a7e24cba1c5cf07d2eafe7fc7a69a00d0bf415a8841a0af680a63a035511b36ed8b66ef60ee4012779e9c183c69d60871f26d296db750600286bd0d710588609411a8903f85dd6fbc9f1c138734b1c684df6272f49b5892c474c317e7cd83a3aeac23ce51ea293d0be7f1679d26d1042141400b47844bdb43210ed620c249393a9bad4527d0496ee053f806eab1a21b8ec832d5378d61f578b4aedf05", 0x89, "03aa5f73a7f715bab937c181abc2769913939e8b7b462b299272d70051233287aaf0fb3755b4e2c2d1734d442a5fb2795c158cffd07e482abcb7b0abfa3e7f4a645b2f10404168485adfe04976658fc600bde0ab9718c01efd0f94c4ab3ea8535e9cccd86e5a6bb7d7d4f0c7983d75c52bc15ff57b6c3dab271f8f53432729d92c178f6f80ed0068e7"}, 0x14, "f91723b67601c10b70d9f615411a01b78d70d6fa"}, 0x16b}) mkdirat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) pipe(0x0) syz_io_uring_setup(0x12a8, &(0x7f0000000240), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r2, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r1, 0x0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/177, 0xb1}, 0x0, 0x0, 0x1, {0x1}}, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x100000001) [ 344.525345] cgroup: fork rejected by pids controller in /syz2 [ 344.533816] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: special inode unallocated [ 344.535415] EXT4-fs (loop5): get root inode failed [ 344.536027] EXT4-fs (loop5): mount failed 04:20:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0), 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) 04:20:15 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 344.895046] loop6: detected capacity change from 0 to 41948160 [ 344.910755] loop5: detected capacity change from 0 to 262144 04:20:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000f40)={@dev={0xfe, 0x80, '\x00', 0x16}}, 0x14) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080), 0x4) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000900)={'syztnl1\x00', &(0x7f0000000cc0)={'syztnl1\x00', 0x0, 0x2f, 0x84, 0x2, 0x5, 0xa, @private0, @remote, 0x7800, 0x8000, 0x7c}}) sendmmsg$inet6(r0, &(0x7f0000001340)=[{{&(0x7f0000000700)={0xa, 0x4e22, 0x1, @remote, 0x10000}, 0x1c, &(0x7f0000000c40)=[{&(0x7f0000000740)="be43f171ea1a408593e607205792754cce6c71e170e5b8bdbbbebec2c5797a9386b3a01afe6a000d6b6b35946bf998c7a327b1a99ed7a50d270e9cacb393aebddde2512506773ef839f8f90c241a1621effc3c07d0513e22deb17bddcd5b044000b6246774", 0x65}, {&(0x7f00000007c0)="d2463411d93c96494eaef1cc7cbaf7918e32fcc19f4f30a2b5b07122ea96758cc0924c463a8b5d0d", 0x28}, {&(0x7f0000002740)="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", 0x1000}, {&(0x7f0000000800)="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", 0xfc}, {&(0x7f0000000b40)="c6e5702ff7b06ee2454bd47ab3f65f512b263d13b8a5a50ccc4d9cccce6041360c8a7d64ef2375a4dd5315415771bb998e08a048b0204382043635510931313d7681e80880ec7c0fb126e4c4e08a93af7f9916176cd7f09d6d3f886523ecbac19db72c2691e4ffa764dbdd49a8b8d8c6393a5cd35d5f64fe12b0ca30568861bc18656d3430e8c023b269a78fb5098ae0b66d6c2bd381f243d46e0257aeb6dd5dac0a60712c983c31f42a6113d6bf92605ca842cc4951a1dae8044a087b9dae2315e00d0b84933ba52fcbc026f0143acc72e7e0df279bd8d7e3e9b991d67fa1f4ecff168d20a292b6de02aa8503234a8e", 0xf0}], 0x5, &(0x7f0000000d40)=[@pktinfo={{0x24, 0x29, 0x32, {@private0, r1}}}, @rthdr={{0x28, 0x29, 0x39, {0x88, 0x2, 0x0, 0x4, 0x0, [@mcast1]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x9}}, @hoplimit={{0x14, 0x29, 0x34, 0x3}}, @dstopts={{0x108, 0x29, 0x37, {0x2e, 0x1d, '\x00', [@jumbo={0xc2, 0x4, 0x1f}, @pad1, @ra={0x5, 0x2, 0x8}, @calipso={0x7, 0x30, {0x2, 0xa, 0x4, 0x8, [0x3ff, 0x81, 0xff, 0x3, 0x0]}}, @generic={0x0, 0x51, "b31c0d61d461b6edbacf6e554795976fb2057de804bc7f6163f590e85657f85f39e00dd1d52744ee05c76ac7db5973e5c9f04d0f85490ef7917240bc9c8fcba6b3447cfc59f722a2de7add9ad801566480"}, @pad1, @calipso={0x7, 0x40, {0x56fd6ba8188c4b06, 0xe, 0x7, 0x0, [0x4, 0xde, 0x3, 0x0, 0x6, 0x7ff, 0x0]}}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x18}}]}}}], 0x188}}, {{&(0x7f0000000f00)={0xa, 0x4e23, 0x7fff, @mcast2, 0x4}, 0x1c, &(0x7f0000001000)=[{&(0x7f0000003740)="cd0ff04886f7786fc5689e6318248e3c9f67d9a8e7e6168346fab89b2913bb07b5e599f67f1ca20e4a479e89a5c19b22dba13055e21798d52a80c8953d738138baf056b51226c09df75566c17389d5f74dc806a606fb4c99436f29b7e11f105c06eaf71d5e342c6dd1f23d759fd6cefe8b8edd7f9ece16b92272e0176bdd43223f1853bec3598efb072228b6c142caea3a94781fed878d794400029bd27b2ec5f2b639ca136584900a9122546922daa8645893ce77b60e8e02626a3a3fdb7d2c5060ba643a7918733fd53c2fd02ad5295ef323c66ec102e952a7758293d56451ec70475ba9d6d4eb161633324330fa32a8fdc59d990217775c799a0f6431bfb7c701018b3927e667d7b6bace77aa949a3c74ab1dfcf6d10ebac2ddcf8999b4d17d6a818c3e480968d62c54435aab74f1b36b179de88a2556ea3fc5c2f6633156a9316ae48340330beed96e129a803690e682549476e1293ac56c28315fe943cca0ff007eda44f571d72ba1dd21bdafb8e344c36db39f32d6408d37bcdab528f2caf14d7f7296a68140603e97ff158e9330440a35fc5c1aae0fbe64804d420ea9e761aef75bd6a418de1b578ffcb0e802a5a33d7e5913f8ed685c453f61caf63c5e5112633cccfda42671156fb728e03aacb2c4b0f423d0706b9e0f1d3ca100fd6e4df8ea31359d5b5d387065d0a25aae5fe302ba9b657364b7bcca78ae3f8af2554bdc3f7a33da18cec0f9e42d34d9dda5e2ead9cac362719b8be936808b287ab27e50327ab67db95d4c417866689e4438b1777f8a4676660a32f0e24aa0545b29306287fe81e3f36bf780acf3823d8c7d59b182fdf8a5dfeefa4b423ef89f04a0d6cbda8cef51efa263cf4155ee26e23379a7e864f1c83b6b8fc7caf0dcc4659d7d3b428955ad7c1ddf16dd7e75d70493fa4730960a6bd10208f57b0b814e488387fa1c5cbcf91203767fd709223a5c72ee07b4f2a870e88707d238af0c0ceeec9cc09bb38581c9e0a5d1e4162fc981ca3cd1b032538620160689804dfb4a2053ff71880a831ed7929454d060068c3b92e76de672bfafe15c60d343e1fe684d6598ae151f20f67df5d910339a89e7ee4ae91953f689c2dd7b38fb38bfab602a3d60462552e336a147d8bab96155b5876dd645bff37da0d060d3cfd44dcbb98bb5800c21565f328c7d3d65331245d2fd59eecefb8a15f8406d0607e4ddb23a048d7ee5eaaae35f7d96a8c8c2edd293dc794bf4c7d15dfd0cb2803259da09bfa44cb406e6306e599f68bfd3217665cd78d0b41a24ccafac98bce2a20c41afcb8136fddfca70c9165aaa701a90fc411135cbd81b70fe86f7be7e2ca7dfc14ceeda5b726ce1f9e81a471429e4f4f65fc4ef32b00a733be55cc1561762ab993e21937318bb4347d8d4c680559e8896dc8f7a645d356de424312e96f714a2136eb0739c40dec9bc17d78dfdb3efcff3c9000df0a2170829170e5fd93a1872fe90c546405c4c561ff42de94e90a8b360a0e50ddc02113a482353a14056f6f75b625323d465c177f590d9fd08d1399f77a879196fb73aa886cac3e94947b614739c372748352e492f652ec60066ea3418b68fdfe77858afae0c55fb097fdf484e154c465bc97d6e7e4f165b59f3f899c1794ef855c434912da6d463d259a21dc1cac0f6a8323c19a5b0a318903d8f958f7e3c49dbe77fdcc216a80454f6b358889b46b10c96b2a760507599214d6dfccee82f2254035ad1d3c22485d7dbf4d5d0bac4626c6ef293c9e9627aa06df5e0207142b48eba49514db2a9d6ce76d1a909e52512025e7a912ade3635a416cf1ec44dca2362a3f5d1712c005f94d0ec9fdc00b7edaab13eca8daae1ee04aa1f2ea1c7129083110d7ea9a61544efd811f5afaac0380c4d8a1bbe67fae636942756fee79de50a424b3336a472355ddc141a9ee0f5deb11dcd5ac87d47b9c35a7b509d5b8b8110618925d2f242a9fffc9eaadf79e0cd402d9dab92e4ae9dd3c338409e039cb91ca08971eb1e1f772e28c846647b04037862e58bf05f3352a1378db46294c71ae5762ec62f9ef0101e97216c48c983cac8c0d129c022933eac1db9a02a1c78bffc005d84055d5c281954a748068e8c7bd75bea8b402c618c45aafd6a3a9d3295178792bf4376821e5d427a3690ecf278b16d85ba1a630c5446e906cdeb1a1bf0ea1ecf7918219cb5614cf6906ab3282695cf85efba8b74148879c4e2fea1f0ea9db4257aafea6b38066756b96dc35b85a93e5454577d6c969a8e60a8d13e25259641bb6f3ff09691dd4a363bc5af5b3a26e90b074b0e326fe94dac08e39feee681c926f671d7dc21f4dbcc79e063a2cbde5db8a91900db913aa7b0ff4ac486bcd05168e6cee686eef4cabb94a2f127711edd187e02c41c274868c840eede9473bbb30a6c55b3497c9a574b00519abc0f4f14bf5e2b5d64f17608cb3a22d8a96a4220707f36161d9cbe8c6607b57763d3897a6edbd31cb8b51b12ed69c15486e1400cec1732159033e6e8c8bf34fb94dbc853a13770e68f125becd809b5cc35cd5f314a48d0c368614bf9428f6932cb27869dc630c98ebbbe03cf49c4799ad57d29f0a159b1de114bf07c4f949dc2035c589047ee6411640ca5fb48762aaf77e940f28fa20600533a0c6b37698ef651288410d2e54d76253ba8ac68fb8990d2bddd1cbb7c344b6ec73fd5ec88089b8c9898bf93b4a053c5e1cb130a6d40f3f325ddebdb614f2e44cb694b9c5faa0bfd920a5b6c264ec9ccbc831b20ba7b40d731b369114e2374f97a045c826720e4bd4691880dd3ea9d6c0cd615a7e95bdd1bcd71d93992506e0664ee15b2abb403a6e998e0cb0364e5b3f160f7cc050b5230807412eb5afaf393e7dde35852e4c658ff432597dd776567316a739d2b54fc157a52f619d0d660f6adaa7d5820d33897fd8d315b0a6a6401157f049a6dace1f2c828e422cc8d25b6d513aa174f520515acd8137ce185126b57f6eee78932d0581be4ea508a65e630c14f1f31d9631c282957c5acaa0613559a2412382384a9e73c465489eb07ea2b87879e3dd3aeb2b6688d630b7508a960f74104b8ea29f8852a4cbd3a429e0c8bcb4822cd77309c799d63313f32debbc4de59c9f46e9ed03093d4c5caac17e45aaa07ba57e569d67afd1bbe715d5d55e4e3c8b06566060ecb3e0fb77e7faac6be61e8a38e884cfea8fa2a298252922bff400b9e14fd6f3bbf763b01c69ae9ebd3a7bc1c8b6ff732c34e5d8c90ee1e171adc4fa6234630793913b34e92ed91c1e20189b673eec5100c658e1154452e3b526cb675b77af87ca3d91efdb191208801bfa1e50c4fe40fb47b4396c0f5e846dad1e70013d9a4d9e756b8c52baef61645513fbfad1b84c7ab206e8522c071f4f98bad2729e6a598e9885aa10d7d6d6e75a09466a2a15550d16eda0c845279c3a92f56d062b66d842fdf592ebcbd541af45074909855ad2d55ddba94ab9e53021830c79198f727a885b98ff3d4463332f6d04991338265eff8b5a3a7ab18233c1f03576fb5e1763c945819d63ba6a9cb1d24b9b4386d0193a763fea26b1fd26fa78a75f211cf7b402386e5068bd181d6f6698ca8fdbf086dcecad1a7281563b6a856c3dcd606b0ce6477b86fdbb46218911e39d20d442beebfca9cc0227c8afdcdb817309fcfcbe1de7e3ec8a4a4b3349f408268206c7d9f663bb9ea011576d47a61b66deb17a2148f288e2ff0bae87c2eb8b54053f89ffcd92a7c50a2a2135e48b0c5ddeb02189a41fd178856f82167a2a3090548fc1f3c9677b9b5ac78e16f83f4a52ed34e834719f952fcd812772f99bcd96e1fb5bb833008f3d51042cfbf71eb3f5b19cb2606483ac80a1f118483c46750f86afc1350d2dd7f3c9eda5a89cc1ae382b4b82c4c2b3e092d92b3024fc3a6a1944364932ca421bc254b434f09c35e28719f626686bef32038e5092b5d3bf0ac426a426bf5dd87b82539698c46b54f3380169c8f3900a28f9c543ff9be60af101bc23fdd2acc7f362acd380947fb59cf9e391453f62ccf821b3fcc43485fb55ba6b9eccd74db08a7c01b36d0b275aade976690a73d15a13d8084ea014a7c367d42dde2496563edb41f1d0fd203587e5ed9868471d9108c790e3d3364f660d16638cbb01224ffd00f6bcd843373d45819c1804079c216b5756a47cc00e22f24dab17db75e37c35c9013f2c159520081bced48c48ea3d9e9ce1e8307591511b1abec769e92d126b7c0eacb90067e0f718f7adf1094fdd82c7f8db90c48cf29608186240908fdba064b8e7f0b76ab7e1a76044bb0e8c20cfe5079e2a05d445a37eec1c74d90bb647888ccd6380c448e0281453992eaf1ae6d7b8c6b6d9c8317ffe066037b8b87eea3493ab4777b18c1b81fc6fc387b7283e55671d07604276bb40e080b3aa8fa592b72ed3b113cead2d4a86c75352cf1fac10e32919c0dc61b0253dc566efd7507e7496595e7a1a9a13f1354498db0addd1c5d8fd37f27632291506b1db17231a4ad4c9b8bc73131ae770205089792f0a23d98b41080b9d3b456c13a2dfee0dffed09f7680bea17b44e692c5c81fcced60518b81cedb3e870ab6c110e5e8c067ce553971c19765a1c5d68e96ef8e38d4cf3d3f16e3ecf7a8211877d777ff4d2b7491e22b059a7cccc4ce8e54d5a75021f70d0224a0f73a0f67578996ba073319cbffd360bcb25fcf309992088ced53d9f52c83a7dd5bbcd0acdefbeb414de2bccf2ea91a66c6f6689efb81951f2fc8b7c6f8d1dbedb6c63fbe634d622a8f6520943f0ba1b51f80c7859426ae6b71c166ee796457f7676f77db7e1613afe12a0a79b2e6489c1ee2c3164f836a79e5a7fe1897839da48fa60159b25bd69326b87c2d13462ac8ddc723bdf130898071a89f0126c88c68ce0f90e70a1dbbf1d60c6ef94afdb3eae1332f7e93ee27cad43cf5813b51236181081db1c2286fa812852fda1470a890a0de9605698f489457c1d1f3476477a4258ec6722b0f5a4701b337a5dfa90d9b1760cc013ad9f818f0c263e0eafc2af8067dabf09f7f0c0c33df137e8720f4e5f94a3b912445d15a48aa0c03991d576715c77180db8609a61fbf7a91b5174e37e3d9cc423b58dbfcd64bbae94ebb6226af961fc91f81a69e272d82bd118650e76462455a356898131352711ee4b8ee421364daff7355eefcfb2d25df76453a9003abfd7a5dc350a699d3d977f53f52b538a2f9c2f7b686e5056d96a261d1371520a768ba7978570e0f993c62838417a0cd0433d8ccfa3bc4286b01ca7313039da4b9e265907793f11ec80730087d8e50f8a84f31d1704496c84a43ddcaa1e70b022baa5dc51771fd58bf624b37a44328b804012856d5adfa0688657e40e3ef3ed6573c3d743018f2daf255743e93ba8d55ea1422c27407f7f8d0c1347f607ce89981c2928264482cd8203f650a09eecf238155f152342aba1bb078623d0adfefcdb68d480f727598dff48eb8d1ccfa3a2f8bfbe4ba13cfda4901c04ccc7ac0fda37b5aee5773564eef492490c03527482174c99de3cc229f462d1e70f14575a0a1e29474917be1dc50d52251621e23964dd458db7549049d8856a307210fa619aba140f4448cd5b5adbd338e733dbfeedb6066cb07dca3e7732f2d7b6e253a37219589c7fe7b65ad858f5a7b2ecb0a6b0c1c94617ba426751b2841ba175019ad32bbbe9eb43be92a3ec762db61684576b203855cb89baa98b6d5ed7692626d21f0dbc1f358e0551ea2a5898c47cc4bbd4e673e475b3022eeff48ec9f72", 0x1000}, {&(0x7f0000000f40)}, {&(0x7f0000000f80)="a810ea3fdc33ee52fd85a3c1fef1b73385baf20c5ab207fb54d5b3998faeba86be819bc9827beda4c0c6b4af047d9328b8576ab9774b16996d62de67129bfb8d36beb32bc09dade2aa48f673c77b4e6cf96e647f892d03c8acb0b41b20935d05eee2b5276b4a5330b7", 0x69}], 0x3, &(0x7f0000001040)=[@pktinfo={{0x24, 0x29, 0x32, {@private1}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x8}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xd94}}], 0x58}}, {{&(0x7f00000010c0)={0xa, 0x4e22, 0x8, @private2, 0x7}, 0x1c, &(0x7f0000001280)=[{&(0x7f0000001100)="4d12345c674d9bfb94fd1ced7761daab6ed1c0695b0e160a97f124cb4ac049f4a037f96906524f2c7db6543b21ee97d469c4ad997d651d1abeffd50faab931f23870fba9023a2523b38eed94a47e89a370fd9f4b6aef7731cccfbfef2140b60679f41d014276430fb63a185580082677cb1c9e6cafc3299b14f99c2cf0651a155333f819db5193afe3dc932e95cf0be16ce4a3b5f3865bbad19de96f5c946aa18bd8001c6bbcfdb01e4fabc6aa23915ee1610ac5df0d493ee1ee5eb69058aa6d68d2b59f833fa1e84f58230d6f431bc2b56dc26d397a40f65b73e26f3301f5298237a564eb", 0xe5}, {&(0x7f0000001200)="fed1a7042b8edca9900b6c8381d9d109bac2d3cc381a4707c03b7a3c0d45981abd9d68563f36e457553f57a9fd09302f6f2679fec9c736fdfdd0efe300a8e36fe50c3a2969d316ecfcc1469f82b1f38f20c14229f1cfabca63dc016c8759c683e6c5db78f61de95f6ea696", 0x6b}], 0x2, &(0x7f00000012c0)=[@rthdr={{0x68, 0x29, 0x39, {0x67, 0xa, 0x1, 0x6, 0x0, [@dev={0xfe, 0x80, '\x00', 0x16}, @private1={0xfc, 0x1, '\x00', 0x1}, @private1, @rand_addr=' \x01\x00', @loopback]}}}], 0x68}}], 0x3, 0x4) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x8, 0x0) sendmsg$inet6(r2, &(0x7f0000000940)={&(0x7f0000000100)={0xa, 0x4e21, 0x401, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8001}, 0x1c, &(0x7f0000000640)=[{&(0x7f0000000140)="bfddef5f5b0d9c02b57a5d0ed178abff8337043ebca0760557eaaf7c727e7fd034f964359605a8c698def3cfe412fbdc732de88f33087b1079a44ef02a15b33f0e3ce8c0382c3b1d2207f6bca3", 0x4d}, {&(0x7f0000000200)="739f9684155848c72a3f075a62608e254d0877627fd6b0828a9577ec9403b6b2489da9be0ab6d672a975221f92a78aaa93891278bb3db25267aa2981d8e09937c47b856ffb21ffb4328712", 0x4b}, {&(0x7f0000000280)="85afa59a3754f4de4e6e241de06f1902e2ed5e3ddaa2aa0bda8a4cdb8009295658d1b621881a485a88ecb2478ea51c1c5a53b27bb15c56fac7a3c5b5aaa72b27222d4a44927018631a8457d1895deca7c452ffa136670ad65c3b672fa014e6309cf8075f85eecc67a14bfb1ec8cf5dbbb79e87f9cadc6e110a03696ccf3210dca5cc3afb1f3358442b044d44d6a43443bb53c07dad57c304bc59fd83ac34a83b5fe3d33d82e383c44cd30c20a450b364a52a796185f3b1913f787c544c3e20304a233a2e117b172cbd36be2bd9dec61f6067fb0836a2c588977139bcdab30aad6d8927ce60fafd69a9e8e5f0fffd", 0xee}, {&(0x7f0000000380)="0a31ed0d3fa4eb1ec94c298a7fe36a532035e2e423772235a84eb2714757a54a74fdaad4ed8aefefcff63ff0a5f111a352104ddc76a5cda14df38e6eeb98fa286dfe208b1ebd70c974b5b353a3ffce21", 0x50}, {&(0x7f0000000400)="0ab63f006a3cb8ffe1be777c82d0dc2294f6cbcbcc87fefeb0109909f92666165803110049e5e13110056340a417bccb8a7043bad2c70573a12ef66883a9d8454f71f503bcfc80000529fb65ff9f805807f39feb6932bf8c9e266bb49c7a4ad313862e5671550f99a6ed119448f86e414068a621c82554b20e684348b1640868c1e1004d93f4f2d9621eb6cc30ce5a3f6ccd1b8d3114206da74b5d45ef94615f3ecca86e4e2f4f2c8cbfc5058ae1b6105e9403797a238c34e02a128d605f461aad466bdf0841d042e52db4cfb5c7bfcb67fa7bc0e95fe8560dd3a7e5cb98", 0xde}, {&(0x7f0000000500)="54c43b7279646d2b84a9a8c4", 0xc}, {&(0x7f0000000580)="0ce62d7c404ac215ad019223a5bbf71198465c70c2301ede342b849906e6ebf44d06d83fb59dc4ca1417acfc2b286b147788d5193af1a5df6ec9137bf7586440b9020feb8a96c0623b395bbc125b3945e5d2cbcba6840e9319be4b50bb352489a2a56cbda782b12ba730501d934ae313c82057b970c00449e98ace30079c1b813a1d5c8b92d885afae8d1dae8d4f57f42f0dcf476dc4431c816c24fae7395dd24430f20b51fd61c20c72fa5c986aca7a73c41246917f58f612dc", 0xba}], 0x7, &(0x7f0000000980)=[@rthdr={{0x98, 0x29, 0x39, {0x32, 0x10, 0x1, 0x1f, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x28}, @rand_addr=' \x01\x00', @private2={0xfc, 0x2, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev={0xfe, 0x80, '\x00', 0x12}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x85b}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0x38}}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x3}}, @flowinfo={{0x14, 0x29, 0xb, 0x270edc5}}, @tclass={{0x14, 0x29, 0x43, 0x4}}, @hopopts_2292={{0x30, 0x29, 0x36, {0x3b, 0x2, '\x00', [@generic={0x8, 0x12, "6bbdf77128d240020178c5e8303095855fdb"}]}}}, @hopopts={{0x8, 0x29, 0x36, {0x3c, 0x0, '\x00', [@generic={0x59}, @pad1]}}}, @rthdrdstopts={{0xc0, 0x29, 0x37, {0xff, 0x14, '\x00', [@hao={0xc9, 0x0, @private1={0xfc, 0x1, '\x00', 0x21}}, @ra={0x5, 0x2, 0x540}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}]}}}], 0x230}, 0xc064) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000001700)=""/4099, 0xffffff3e, 0xcd04, 0x0, 0xfffffffffffffed7) 04:20:15 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 344.991919] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: special inode unallocated [ 345.017731] EXT4-fs (loop5): get root inode failed [ 345.018354] EXT4-fs (loop5): mount failed 04:20:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:20:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:20:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b7", 0x5e, 0x4200}], 0x0, &(0x7f0000013a00)) 04:20:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80000001) [ 345.139320] loop5: detected capacity change from 0 to 262144 [ 345.260881] EXT4-fs error (device loop5): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.5: invalid block 04:20:15 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 345.272102] EXT4-fs (loop5): get root inode failed [ 345.273174] EXT4-fs (loop5): mount failed 04:20:15 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 345.468925] loop4: detected capacity change from 0 to 135266304 04:20:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b7", 0x5e, 0x4200}], 0x0, &(0x7f0000013a00)) 04:20:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80000001) [ 345.655921] loop5: detected capacity change from 0 to 262144 [ 345.679008] loop6: detected capacity change from 0 to 135266304 [ 345.722485] EXT4-fs error (device loop5): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.5: invalid block [ 345.728048] EXT4-fs (loop5): get root inode failed [ 345.728941] EXT4-fs (loop5): mount failed [ 345.747368] loop4: detected capacity change from 0 to 135266304 04:20:16 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) r2 = fork() kcmp(0x0, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:20:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80000001) 04:20:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b7", 0x5e, 0x4200}], 0x0, &(0x7f0000013a00)) [ 345.976233] loop5: detected capacity change from 0 to 262144 04:20:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 345.992172] EXT4-fs error (device loop5): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.5: invalid block 04:20:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 345.995458] EXT4-fs (loop5): get root inode failed [ 345.996138] EXT4-fs (loop5): mount failed 04:20:16 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) r2 = fork() kcmp(0x0, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:20:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:20:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b7", 0x5e, 0x4200}], 0x0, &(0x7f0000013a00)) 04:20:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:20:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:20:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:20:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a6e0a6a7f2cee1ff00df594", 0x8d, 0x4200}], 0x0, &(0x7f0000013a00)) [ 360.612048] loop5: detected capacity change from 0 to 262144 04:20:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:20:31 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) r2 = fork() kcmp(0x0, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 360.621977] loop3: detected capacity change from 0 to 262144 [ 360.641952] loop6: detected capacity change from 0 to 135266304 [ 360.656082] loop4: detected capacity change from 0 to 135266304 [ 360.664562] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extra_isize 27255 (inode size 512) [ 360.673417] EXT4-fs (loop5): get root inode failed [ 360.674603] EXT4-fs (loop5): mount failed [ 360.720160] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.3: invalid block [ 360.725434] EXT4-fs (loop3): get root inode failed [ 360.726702] EXT4-fs (loop3): mount failed 04:20:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:20:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77f", 0x5f, 0x4200}], 0x0, &(0x7f0000013a00)) [ 360.938227] loop5: detected capacity change from 0 to 262144 04:20:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b7", 0x5e, 0x4200}], 0x0, &(0x7f0000013a00)) [ 360.981633] EXT4-fs error (device loop5): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.5: invalid block [ 360.994888] EXT4-fs (loop5): get root inode failed [ 360.995544] EXT4-fs (loop5): mount failed [ 361.041017] loop3: detected capacity change from 0 to 262144 04:20:31 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:20:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77f", 0x5f, 0x4200}], 0x0, &(0x7f0000013a00)) 04:20:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 361.148522] loop5: detected capacity change from 0 to 262144 [ 361.169783] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.3: invalid block [ 361.176570] EXT4-fs (loop3): get root inode failed [ 361.177186] EXT4-fs (loop3): mount failed 04:20:31 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 361.351546] EXT4-fs error (device loop5): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.5: invalid block [ 361.353121] EXT4-fs (loop5): get root inode failed [ 361.353748] EXT4-fs (loop5): mount failed 04:20:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77f", 0x5f, 0x4200}], 0x0, &(0x7f0000013a00)) [ 361.557625] loop5: detected capacity change from 0 to 262144 [ 361.613233] EXT4-fs error (device loop5): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.5: invalid block [ 361.615757] EXT4-fs (loop5): get root inode failed [ 361.616350] EXT4-fs (loop5): mount failed 04:20:44 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:20:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:20:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b7", 0x5e, 0x4200}], 0x0, &(0x7f0000013a00)) 04:20:44 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/devices\x00', 0x0, 0x0) pread64(r2, &(0x7f00000020c0)=""/4088, 0xff8, 0x0) r3 = perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x6, 0x2, 0x5, 0x1, 0x0, 0x0, 0xc5021, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x5, 0xffffffff}, 0x88, 0x5, 0x6, 0x4, 0x7, 0x6, 0x2, 0x0, 0x100, 0x0, 0x7f}, 0x0, 0x0, r0, 0x3) r4 = dup2(r3, r0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f0000000140)={0x2, "3ee5a0"}, 0x6) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x18) write$P9_RLOPEN(r5, &(0x7f00000000c0)={0x18, 0xd, 0x2, {{0x2, 0x0, 0x8}, 0x6a}}, 0x18) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fstat(r6, &(0x7f0000000380)) r7 = eventfd2(0x5, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r7, 0x8008f513, &(0x7f0000000180)) r8 = fsmount(r2, 0x1, 0x1) sendfile(0xffffffffffffffff, r8, &(0x7f0000000000)=0x9, 0x10000) 04:20:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:20:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/mcfilter\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000100)=""/115, 0x73}], 0x1, 0x0, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x94, 0x0, 0x800, 0x70bd27, 0x25dfdbfd, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x80, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xd}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x94}, 0x20) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={0x30, r1, 0x1, 0x0, 0x0, {0x8}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_EEE_MODES_OURS={0x10, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x8, 0x3, 0x0, 0x1, [{0x4, 0x2}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x30}}, 0x0) 04:20:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a", 0x76, 0x4200}], 0x0, &(0x7f0000013a00)) 04:20:44 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 374.505001] loop4: detected capacity change from 0 to 135266304 [ 374.535295] loop6: detected capacity change from 0 to 135266304 [ 374.544449] loop3: detected capacity change from 0 to 262144 [ 374.550950] loop5: detected capacity change from 0 to 262144 04:20:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:20:45 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:20:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_uring_setup(0x201168, &(0x7f00000009c0)={0x0, 0x4332, 0x4}) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x7f, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r4, 0x107, 0x1, &(0x7f0000000000)="19a72258db8799f3840d9debc2e602cb", 0x10) dup2(r0, r4) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 374.817995] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.3: invalid block [ 374.819957] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extended attribute block 2266917008 [ 374.823793] EXT4-fs (loop3): get root inode failed [ 374.824447] EXT4-fs (loop3): mount failed [ 374.827867] EXT4-fs (loop5): get root inode failed [ 374.828497] EXT4-fs (loop5): mount failed 04:20:45 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b7", 0x5e, 0x4200}], 0x0, &(0x7f0000013a00)) 04:20:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a", 0x76, 0x4200}], 0x0, &(0x7f0000013a00)) 04:20:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 374.977287] loop3: detected capacity change from 0 to 262144 [ 375.048613] loop5: detected capacity change from 0 to 262144 04:20:45 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b7", 0x5e, 0x4200}], 0x0, &(0x7f0000013a00)) 04:20:45 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 375.136957] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extended attribute block 2266917008 [ 375.142932] EXT4-fs (loop5): get root inode failed [ 375.144264] EXT4-fs (loop5): mount failed [ 375.262905] loop3: detected capacity change from 0 to 262144 04:20:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:20:59 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b7", 0x5e, 0x4200}], 0x0, &(0x7f0000013a00)) 04:20:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 389.472093] loop3: detected capacity change from 0 to 262144 04:20:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a", 0x76, 0x4200}], 0x0, &(0x7f0000013a00)) 04:20:59 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a", 0x76, 0x4200}], 0x0, &(0x7f0000013a00)) 04:20:59 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:20:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:20:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b7", 0x5e, 0x4200}], 0x0, &(0x7f0000013a00)) 04:20:59 executing program 0: ftruncate(0xffffffffffffffff, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, 0x1) open_tree(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x8101) r0 = socket$inet(0x2, 0x4, 0x8) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x3) statx(0xffffffffffffffff, 0x0, 0x0, 0x8, &(0x7f00000001c0)) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r1, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)={0x34, r2, 0x1, 0x0, 0x0, {0x8}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_EEE_MODES_OURS={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}]}]}, 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2, 0xa2, 0x7, 0x3, 0x10, @mcast1, @rand_addr=' \x01\x00', 0x700, 0x700, 0x1, 0x6}}) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000680)=ANY=[@ANYBLOB="00beb57c22d984f8091b5c9e95c8867157513fbc34d201cfa687ba3192150cc958fcdb8fe6cf96d3beb02195a1758ca4dba2bcffbeef386df9984d497ca4b450af7a983447e25e95e517efed4154e7914d0408319f38f85b1a263e79afcdc436f2028086e240212bd37323599ea70dd0cfd77f2fe57fca34a45698e9e2bef684e923ade08b5d65331d57bb841c385cc64e7bcd6f05907216b4e03ba0c2531e28b70bcc07766927a104cecde3963fb4c4aee14fad1db602906c11a17f0a08f7680e855fe788bc42538f6f4375659dc912069af4855f955bcdc409740d50332d6950b3a6", @ANYRESOCT, @ANYBLOB="008014000200626f6e645a8a4a6d71a4fc3c6f0024ea5c300000", @ANYRES32=r3, @ANYBLOB="07001900", @ANYRES32=r4, @ANYBLOB="0804030001000000d0cb258c06d820db7827e4e1574fbecb77736af1e834b60586df567c84dd0cf8053ebf25e66f7599afbd655c5b3c49f478d80b65d58199b1a30f1fa48f04000000000000003a5b496352511e41131d2149a416f14297e9f5e9250d20b31749b44ed39c69996592431b0feaeb8561a250976c28c1e0bf7a5b90fd07d816d4b0de797701ecbf5161ab2e97677a2d71bf07d88bbf8fdc03424bd5be6f59806ebcad8d1207ab427e1f956210a630f595784319f840d894fb54784e6246c060bdc77c5c7035949a375612f3e3fb4d7b2c35f6eb2cf54e79610e682114bee89c6ad0c41e3dd066d92fafcfd42ca7c74805970f13e5bd23ab0a587bc85c90c4b4820e9b481c27baa163cdeb4c693eec619bccf93959255173eb77a639e8b5c176817bc3a4b2578b329ab78cb4239502e4b14f0831792c929c210a2a21e281369e0c48c5a03c00d4cc1638006d622f5efacfcc8356cc9f2c"], 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x801) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5, 0x400, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000900)={0x224, 0x1c, 0xc21, 0x0, 0x0, {0x1d, 0x0, 0x2}, [@typed={0x14, 0xc, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x93, 0x0, 0x0, @uid}, @nested={0x1f3, 0x4b, 0x0, 0x1, [@typed={0x4, 0x96}, @typed={0xf, 0x72, 0x0, 0x0, @binary="368c52baad1cdc77fb890f"}, @generic="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", @typed={0x5, 0x70, 0x0, 0x0, @str='\x00'}, @generic="2440dc57755901b052209881f5e9f8370abd348168fbf7c87a2f482d990fdd7fb7810b8ee61c1687edf9562fa2e2f5c67a78dcb837943fb70a4203c33d62a33d254883c551a0ac9dd5342a097db0f1e51159792dd57978c0a0c0e440d37a4bbbbbce8437d50b88640deb0c2b3e3bb62897f14b9a88d6e96bdbcf532d3af634997bc72b21c914a9137636fd1157645d2bbca3776c0ed2d042dd6908a3c804c215e1d480b88f0a79432c609077c780db7647dd6c3bbd9bedfc2cb10851b5e2f539677cde2c4d642712a85eafb30846efc842a0fad3babd"]}]}, 0x224}}, 0x0) [ 389.539634] loop4: detected capacity change from 0 to 135266304 [ 389.561432] loop5: detected capacity change from 0 to 262144 [ 389.588760] loop7: detected capacity change from 0 to 262144 [ 389.611295] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extended attribute block 2266917008 [ 389.615361] EXT4-fs (loop5): get root inode failed [ 389.616604] EXT4-fs (loop5): mount failed [ 389.617808] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 2266917008 04:21:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b7", 0x5e, 0x4200}], 0x0, &(0x7f0000013a00)) [ 389.628493] EXT4-fs (loop7): get root inode failed [ 389.629148] EXT4-fs (loop7): mount failed 04:21:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a", 0x76, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:00 executing program 0: ftruncate(0xffffffffffffffff, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, 0x1) open_tree(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x8101) r0 = socket$inet(0x2, 0x4, 0x8) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x3) statx(0xffffffffffffffff, 0x0, 0x0, 0x8, &(0x7f00000001c0)) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r1, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)={0x34, r2, 0x1, 0x0, 0x0, {0x8}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_EEE_MODES_OURS={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}]}]}, 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2, 0xa2, 0x7, 0x3, 0x10, @mcast1, @rand_addr=' \x01\x00', 0x700, 0x700, 0x1, 0x6}}) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000680)=ANY=[@ANYBLOB="00beb57c22d984f8091b5c9e95c8867157513fbc34d201cfa687ba3192150cc958fcdb8fe6cf96d3beb02195a1758ca4dba2bcffbeef386df9984d497ca4b450af7a983447e25e95e517efed4154e7914d0408319f38f85b1a263e79afcdc436f2028086e240212bd37323599ea70dd0cfd77f2fe57fca34a45698e9e2bef684e923ade08b5d65331d57bb841c385cc64e7bcd6f05907216b4e03ba0c2531e28b70bcc07766927a104cecde3963fb4c4aee14fad1db602906c11a17f0a08f7680e855fe788bc42538f6f4375659dc912069af4855f955bcdc409740d50332d6950b3a6", @ANYRESOCT, @ANYBLOB="008014000200626f6e645a8a4a6d71a4fc3c6f0024ea5c300000", @ANYRES32=r3, @ANYBLOB="07001900", @ANYRES32=r4, @ANYBLOB="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"], 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x801) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5, 0x400, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000900)={0x224, 0x1c, 0xc21, 0x0, 0x0, {0x1d, 0x0, 0x2}, [@typed={0x14, 0xc, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x93, 0x0, 0x0, @uid}, @nested={0x1f3, 0x4b, 0x0, 0x1, [@typed={0x4, 0x96}, @typed={0xf, 0x72, 0x0, 0x0, @binary="368c52baad1cdc77fb890f"}, @generic="a2a4ed72809869262723c669300318d009a1ab8dde3becaa849deea9e11ae14a7a8f398d8facfa216c5e3aafae2bf688e44a679790aedaade3a8a1cf536846b9fedb60bd3f09a12854d0bb755d24df88415a0b77628561e1f98c2c63aa9a649c1d31d7337c894292f3118a824465fe6f3592e09b711bbcb54297def611f7185c00aa15330c05e6783a06874343b7493fc1c2856fce470c3b39ec36e1cf8f42d5a75acde6ce565577aeb6125061aa7d4cfa42bfbd03959b17c6b74c320ce0e2f7a07051603ac4decfe656fb17dd6e323cda3d5febb34506d0e5e3e9b82dd58d049cd7b17f8e4002d8c2f4bae409bf30e698aff74c75b55ac50139c4cb0c", @typed={0x5, 0x70, 0x0, 0x0, @str='\x00'}, @generic="2440dc57755901b052209881f5e9f8370abd348168fbf7c87a2f482d990fdd7fb7810b8ee61c1687edf9562fa2e2f5c67a78dcb837943fb70a4203c33d62a33d254883c551a0ac9dd5342a097db0f1e51159792dd57978c0a0c0e440d37a4bbbbbce8437d50b88640deb0c2b3e3bb62897f14b9a88d6e96bdbcf532d3af634997bc72b21c914a9137636fd1157645d2bbca3776c0ed2d042dd6908a3c804c215e1d480b88f0a79432c609077c780db7647dd6c3bbd9bedfc2cb10851b5e2f539677cde2c4d642712a85eafb30846efc842a0fad3babd"]}]}, 0x224}}, 0x0) 04:21:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b7", 0x5e, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 389.810828] loop7: detected capacity change from 0 to 262144 [ 389.829625] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 2266917008 [ 389.841241] EXT4-fs (loop7): get root inode failed [ 389.841861] EXT4-fs (loop7): mount failed 04:21:00 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:21:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b7", 0x5e, 0x4200}], 0x0, &(0x7f0000013a00)) [ 389.918092] loop5: detected capacity change from 0 to 262144 [ 389.989372] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extra_isize 27255 (inode size 512) [ 389.993056] EXT4-fs (loop5): get root inode failed [ 389.993721] EXT4-fs (loop5): mount failed [ 390.000815] loop3: detected capacity change from 0 to 33792 [ 390.018377] EXT4-fs (loop3): bad geometry: block count 64 exceeds size of device (8 blocks) 04:21:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:21:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a", 0x76, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a50", 0x77, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:15 executing program 0: syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/mcfilter\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/115, 0x73}], 0x1, 0x0, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x88100) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000600)={0x12a8, 0x36, 0x300, 0x70bd2d, 0x25dfdbfb, {0x1c}, [@typed={0x8, 0x7a, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x9, 0x7d, 0x0, 0x0, @str='\\&\\\'\x00'}, @typed={0xf3, 0x7f, 0x0, 0x0, @binary="8aa6c2c435d66f17d79d7be1e30aa1c7c08f94d4b60ae310c4197cc810f419f6a2e3a3d2f6f0074fc92f30f8ac8a6d963ce739eda7431c8592e55ab81376b5bc1c81dc62e58ca13efa46292e09a572b7d80d7e10179e6e7270290714b5342882faf851cb7329f583a3f8efd41b70236d99bf9c3937f537a2c768ce1f86eefc9385c44db82a251d61b2f0d6f316e5193e75280ea1472c7b72021f7386e33245f3b74f1e44c7ee43f721799edc4041dd99d8f2b220a53599cb84074cfd87d41af77753b7d7925c02e60823a126eb83b59cacc77f8bd9ad647734e31fe1e03007d9a017060125153212e97689003da1ff"}, @typed={0xa, 0x8b, 0x0, 0x0, @str=',^*\'/\x00'}, @nested={0x27, 0x92, 0x0, 0x1, [@typed={0x9, 0xc, 0x0, 0x0, @str='SEG6\x00'}, @typed={0x8, 0x11, 0x0, 0x0, @u32=0xd4}, @generic="77e0a8", @typed={0xc, 0x8e, 0x0, 0x0, @u64=0x9}]}, @nested={0x114a, 0x7, 0x0, 0x1, [@typed={0x8, 0x6c, 0x0, 0x0, @fd}, @generic="b6da90f8a3711ab093818bda8162f818cf98479386dcc344a09dcbb34a0d31325cbc5721bbc3e1594c07363f760be3d56f27933043e67de468d19188275cce5dedde7499bd79b6cc732a26c180fcdf462ca83385757300f31f866a47e43cc891f81cb354b43f44b96930177c9f9fbcab4ae3853d0e707568b4e0bfbfc64aa62bac2696fd145588cb540421a55bfe2cc17cd3f030fd1c3e0d6811196fd5525b5aae18eec7c5961c41ec2404e9e116b0f05158b54324a6f2f44213b85bdcfc42c12ebfdcdfdf37f5f70c81facdca5d5d1f20d239ea93e8a9", @typed={0x8, 0x95, 0x0, 0x0, @fd=r1}, @typed={0x8, 0x26, 0x0, 0x0, @u32=0xbcf9}, @generic="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", @typed={0xc, 0x7e, 0x0, 0x0, @u64=0x3}, @generic="b66cfb724fadfc67eea3a7a8c3720e9196e903e8b248394eeb9498513a4fbcce5923d29e23fb767a3790f40cccdcb65bac3cdff44475b3667409e31c534bc24814f662d2a7e164029f4167"]}, @typed={0x9, 0x75, 0x0, 0x0, @str='(&]%\x00'}]}, 0x12a8}, 0x1, 0x0, 0x0, 0x840}, 0x48844) 04:21:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b7", 0x5e, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:15 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:21:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:21:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 405.152711] loop3: detected capacity change from 0 to 33792 [ 405.186089] EXT4-fs (loop3): bad geometry: block count 64 exceeds size of device (8 blocks) [ 405.193698] loop7: detected capacity change from 0 to 262144 [ 405.209865] loop5: detected capacity change from 0 to 262144 [ 405.229556] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 2266917008 [ 405.232547] EXT4-fs (loop7): get root inode failed [ 405.233622] EXT4-fs (loop7): mount failed [ 405.233766] loop4: detected capacity change from 0 to 135266304 [ 405.282668] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extended attribute block 2266917008 [ 405.285941] EXT4-fs (loop5): get root inode failed [ 405.287126] EXT4-fs (loop5): mount failed 04:21:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:21:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b7", 0x5e, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a50", 0x77, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a", 0x76, 0x4200}], 0x0, &(0x7f0000013a00)) [ 405.569765] loop3: detected capacity change from 0 to 33792 04:21:16 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 405.676671] loop7: detected capacity change from 0 to 262144 [ 405.685301] loop5: detected capacity change from 0 to 262144 [ 405.695034] EXT4-fs (loop3): bad geometry: block count 64 exceeds size of device (8 blocks) [ 405.972682] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extended attribute block 2266917008 [ 405.977192] EXT4-fs (loop5): get root inode failed [ 405.977826] EXT4-fs (loop5): mount failed 04:21:16 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a", 0x76, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013a00)) 04:21:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a50", 0x77, 0x4200}], 0x0, &(0x7f0000013a00)) [ 406.136890] loop5: detected capacity change from 0 to 262144 [ 406.164529] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extended attribute block 2266917008 [ 406.166334] EXT4-fs (loop5): get root inode failed [ 406.166948] EXT4-fs (loop5): mount failed 04:21:30 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:21:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:21:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:21:30 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a", 0x76, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013a00)) 04:21:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:21:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b8325", 0x7d, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:21:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013a00)) [ 420.542553] loop7: detected capacity change from 0 to 262144 [ 420.555314] loop4: detected capacity change from 0 to 135266304 [ 420.560840] loop5: detected capacity change from 0 to 262144 [ 420.579451] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extended attribute block 2266917008 [ 420.582472] EXT4-fs (loop5): get root inode failed [ 420.583129] EXT4-fs (loop5): mount failed 04:21:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a", 0x76, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b8325", 0x7d, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}], 0x0, &(0x7f0000013a00)) 04:21:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a", 0x76, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:31 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 420.859805] loop5: detected capacity change from 0 to 262144 [ 420.935328] loop3: detected capacity change from 0 to 262144 [ 420.941060] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 420.943050] EXT4-fs (loop3): get root inode failed [ 420.943824] EXT4-fs (loop3): mount failed [ 420.962852] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extended attribute block 2266917008 [ 420.966038] EXT4-fs (loop5): get root inode failed [ 420.966911] EXT4-fs (loop5): mount failed 04:21:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}], 0x0, &(0x7f0000013a00)) [ 421.085349] loop7: detected capacity change from 0 to 262144 04:21:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b8325", 0x7d, 0x4200}], 0x0, &(0x7f0000013a00)) [ 421.234832] loop3: detected capacity change from 0 to 262144 [ 421.308568] loop5: detected capacity change from 0 to 262144 [ 421.320121] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 421.320654] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extended attribute block 2266917008 [ 421.321973] EXT4-fs (loop3): get root inode failed [ 421.323956] EXT4-fs (loop3): mount failed [ 421.325957] EXT4-fs (loop5): get root inode failed [ 421.326722] EXT4-fs (loop5): mount failed 04:21:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:21:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:21:46 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:21:46 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:21:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a", 0x76, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}], 0x0, &(0x7f0000013a00)) 04:21:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887", 0x80, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:46 executing program 4: open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 436.017024] loop5: detected capacity change from 0 to 262144 [ 436.042208] loop3: detected capacity change from 0 to 262144 [ 436.064088] loop7: detected capacity change from 0 to 262144 [ 436.068353] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extended attribute block 2266917008 [ 436.070984] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 436.073359] EXT4-fs (loop5): get root inode failed [ 436.074167] EXT4-fs (loop5): mount failed [ 436.075092] EXT4-fs (loop3): get root inode failed [ 436.075836] EXT4-fs (loop3): mount failed 04:21:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a", 0x76, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:46 executing program 2: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) r2 = fork() kcmp(r0, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:21:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {0x0, 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887", 0x80, 0x4200}], 0x0, &(0x7f0000013a00)) [ 436.540536] loop7: detected capacity change from 0 to 33792 [ 436.574964] EXT4-fs (loop7): bad geometry: block count 64 exceeds size of device (8 blocks) [ 436.674391] loop3: detected capacity change from 0 to 262144 04:21:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a", 0x76, 0x4200}], 0x0, &(0x7f0000013a00)) [ 436.682929] loop5: detected capacity change from 0 to 262144 [ 436.763500] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extended attribute block 2266917008 [ 436.765951] EXT4-fs (loop5): get root inode failed [ 436.766695] EXT4-fs (loop5): mount failed [ 436.767440] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 436.769375] EXT4-fs (loop3): get root inode failed [ 436.770099] EXT4-fs (loop3): mount failed 04:21:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {0x0, 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) [ 436.846025] loop7: detected capacity change from 0 to 33792 04:21:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887", 0x80, 0x4200}], 0x0, &(0x7f0000013a00)) 04:21:47 executing program 2: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) r2 = fork() kcmp(r0, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 437.087274] EXT4-fs (loop7): bad geometry: block count 64 exceeds size of device (8 blocks) [ 437.106412] loop3: detected capacity change from 0 to 262144 [ 437.123358] loop5: detected capacity change from 0 to 262144 [ 437.159184] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extended attribute block 2266917008 [ 437.160948] EXT4-fs (loop5): get root inode failed [ 437.161524] EXT4-fs (loop5): mount failed [ 437.212642] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 437.228121] EXT4-fs (loop3): get root inode failed [ 437.229406] EXT4-fs (loop3): mount failed 04:22:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:22:00 executing program 2: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) r2 = fork() kcmp(r0, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:22:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {0x0, 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) 04:22:00 executing program 4: open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:22:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a", 0x76, 0x4200}], 0x0, &(0x7f0000013a00)) 04:22:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:22:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a288777", 0x81, 0x4200}], 0x0, &(0x7f0000013a00)) 04:22:00 executing program 0: ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000009c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) clock_gettime(0x0, &(0x7f0000004b80)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000004a80)=[{{0x0, 0x0, &(0x7f0000002e80), 0x0, &(0x7f0000002f40)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}], 0x120}}, {{0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000003080)=""/135, 0x87}], 0x1}}, {{&(0x7f0000003180)=@abs, 0x6e, &(0x7f0000004780)=[{&(0x7f0000003200)=""/126, 0x7e}, {&(0x7f0000003280)=""/187, 0xbb}, {&(0x7f0000003340)=""/31, 0x1f}, {&(0x7f0000003380)=""/163, 0xa3}, {&(0x7f00000008c0)=""/230, 0xe6}, {&(0x7f0000003540)=""/170, 0xaa}, {&(0x7f0000003600)=""/49, 0x31}, {&(0x7f0000003640)=""/119, 0x77}, {&(0x7f00000036c0)=""/4096, 0x1000}, {&(0x7f00000046c0)=""/163, 0xa3}], 0xa, &(0x7f0000000e00)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000002000000d3aaf2088cfd3be906898b4213bfa2edf44501a3c4404c928135b4201eb88c8b728be23e0c89d80b8004ab246083c73325d4b67115d38c17846da60e5cf959e31b3a9795cc06e92d8404f1fe4d517dbe34e8162960dcac310029a6718c09448614fac16ccab4e80c27a98b638ee24ebdd21e20a68e6436c9be520f498322a43d582982c2dc3b66518e0a28a87ca385ea64c548ef8aab709178d2b19347235fe44cfb9b41124074", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x118}}, {{&(0x7f0000000b00)=@abs, 0x6e, &(0x7f0000004a40)=[{&(0x7f0000004a00)=""/7, 0x7}], 0x1}}], 0x4, 0x0, &(0x7f0000000cc0)={r1, r2+60000000}) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000004c00)={{{@in=@private, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000ac0)=0xe8) syz_mount_image$nfs4(&(0x7f0000000100), &(0x7f00000001c0)='./file0\x00', 0x3, 0x8, &(0x7f0000000800)=[{&(0x7f0000000200)="dd6cf568646898fb9d4763322bc0af09cdf7132f8deecff753f7b94110904d97f1caff57d556e2a17e9fe6f837471b453d9f1d811b", 0x35, 0x145}, {&(0x7f0000000240)="3857d2427445bffea18c1578994b0d3198ecdef122b6a7ac7936d5466a0e54a340505f4b9423d5bc203d55bf01a5435affb01f36832ec4ea1391fc5e810fe8cbb1f37ea64513e5566af64f14999823605eedefc88d4630aa8268b21b55a4f4a69a1cf3be16679de09bd9b771fd309ca7e0e7a97b69b0ec466e540924461e90e92675a0b3c5683bcbca0f76bc96d9e22823526686d12d39b919a986e038db7d34a49ca1bd92733246cadad1ab5080654488952c0fb2166c5cec", 0xb9, 0x8fb}, {&(0x7f0000000300)="5f609e37b1ef875fe786933fcf672d57342c1b4c89dc97b8e51a410b0b86d753a08231e75e7b0318a9aff6bfc7084bd541878e9ecd32e2b5f3969bd56d28be94d7d26fd69eb1afae725c091d6b3577adbd3f843935b44060794e60e3723a4448d8d3af69ffe79e9ac7d258946d23603343d6c2658e79a78a187cb7309be42452d14b33cc8ae71b4d4aae439bb80ae246b8fb7d6551dd3fce71320143a6a5436c5e51d8715ddab6bf7776d929c52a0e8e5020a78f0882f279f448e708a252375678d09e8fee17", 0xc6, 0x6}, {&(0x7f0000000400)="0f28e8ed1353d0641b4ac579653305fbc17662fc4c64c9ad267662969488b91499e11771f9e73c2ae62e1c6e98955ba65b3c0e73b4b6aec45c70503c5dc12ae45a1071353affccc563b8390ca0d66b8df3389cbacea41281d1b1823a221640eef494d3b45f939d307dba34b6575f49f09b398cf50a8bc5ceb72a538a350f4f87438e5ba1320a67b799e1205754703ffad82be01225d77fd77d17738c3afe6ab16a4e73d5c6a3a7bcf6a0e0aa5720ef853823b8099ab863e32e60a0c26098fd6e3a02a56d37a99139e841861127677bf38b4d578b77f91ef16755d8197f649a2f8497662206fe52a7332120ce", 0xec, 0x5}, {&(0x7f0000000500)="b125ddc7cd5e42f31f38a3e6b9c288bb853dbab120eb75998b1ba3666d6bb66efcd36abdc7b32fe45d9dc592f3ea8a03a92df7e7325f41cb078b3a23d60758f77e0fd98315e1572b4d0b40754250d7a5be5ffb2402cd81b76fcd46e7a0840ed5d97105c9dc3b204e13efc9fabef4790ac9f387bdbc08b2ea5eb757bbdd8fb22646e6a55d7701290ab41b9ce8df1cabeba3626678347f5b74299aaf7f9ad409edbb3f69", 0xa3, 0x3}, {&(0x7f00000005c0)="9340a6272f5f0c2d71615c6f35fc8dcd4609f089bdeef607ae0222bf0e4a8fa116e7f7d10d643f98388695c6e354365e3506252dced978dd0d4843e996b4e21b44d3b16b380a960fb12fd231c7cf277a63d7d474cc6f3ad26ffd3945cde8f22660873ddb58b879738b6c4175e85b70d6693ecbdd145906b90945993c38bf48ceb75c7150b16e697938bb9b0681a1165ee06b383757e954819e55c2e81eb942e0b4004de596a817269ee206075b4c743413e2c77aa74f765cefea3b1a49b48f244733f6c86dfbe82c416ae4270199b447f5c4bb345676562ebd35e4326b497ee6716b55bea7231f2e22cf44", 0xeb, 0x3}, {&(0x7f00000006c0)="431b2a1fa059102ad4a5d097d1eac594daaa463e27bb0c2f1f0f7905697d572133dfc4e92eb140f3320df16f1fa40e34fe845d724d89a4de7fddf3c4a2eeea0683305e", 0x43, 0x7}, {&(0x7f0000000740)="196e8a45adbd49b4886f0c8245c5e12409ee08535a3facdc4b4b306e8f88aceaa4530925e4154223e8a236de792bf3da2578401216e6bf6193625332d76e9aa215abbb09d4d778cd838191b04a432edbc249e6b04aaae7bea73ce662982922f0df9b207bf80ff0cf9d7aef53d34588e309ed855cfa2f25c28947cef5ee6b4048fb7a84171acda550352c8c310e10d5b0b4d5cf338ab49ead3669ce53ea091d140b5e367ad9e8af4538ffa44e15f09425fe72d4b9094773adb52632f9b137b19c", 0xc0, 0x7}], 0x840000, &(0x7f0000000a00)={[{'/%}'}, {'k'}], [{@dont_appraise}, {@subj_type={'subj_type', 0x3d, '$}#,{\''}}, {@uid_lt}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@permit_directio}, {@appraise_type}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', r4}}, {@smackfsroot={'smackfsroot', 0x3d, 'vfat\x00'}}]}) chdir(&(0x7f0000000040)='./file0\x00') r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r5, 0x4) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r5, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) r8 = socket$packet(0x11, 0x2, 0x300) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$packet_buf(r8, 0x107, 0x1, &(0x7f0000000000)="19a72258db8799f3840d9debc2e602cb", 0x10) ioctl$SIOCGSTAMPNS(r8, 0x8907, &(0x7f0000000d00)) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) syz_io_uring_submit(r6, r7, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) [ 450.266208] loop7: detected capacity change from 0 to 33792 [ 450.281070] EXT4-fs (loop7): bad geometry: block count 64 exceeds size of device (8 blocks) [ 450.344988] loop3: detected capacity change from 0 to 262144 [ 450.359295] loop5: detected capacity change from 0 to 262144 04:22:00 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000500)={0x0, 0x25d52415, 0x3}) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe25b}, 0x0, 0x0, 0x0, 0x0, 0x10000000000081, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000004c0)) [ 450.458084] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extra_isize 119 (inode size 512) 04:22:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013a00)) [ 450.460185] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 450.463544] EXT4-fs (loop5): get root inode failed [ 450.464417] EXT4-fs (loop5): mount failed [ 450.465267] EXT4-fs (loop3): get root inode failed [ 450.466506] EXT4-fs (loop3): mount failed 04:22:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a288777", 0x81, 0x4200}], 0x0, &(0x7f0000013a00)) 04:22:01 executing program 2: r0 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:22:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0), 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) 04:22:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013a00)) [ 450.780972] loop5: detected capacity change from 0 to 262144 04:22:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a288777", 0x81, 0x4200}], 0x0, &(0x7f0000013a00)) 04:22:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000013a00)) [ 450.845135] loop3: detected capacity change from 0 to 262144 [ 450.848679] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extra_isize 119 (inode size 512) [ 450.851546] EXT4-fs (loop5): get root inode failed [ 450.852593] EXT4-fs (loop5): mount failed [ 450.985123] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 450.987263] EXT4-fs (loop3): get root inode failed [ 450.988060] EXT4-fs (loop3): mount failed 04:22:16 executing program 4: open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:22:16 executing program 2: r0 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:22:16 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f00000000c0)='rpc_pipefs\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/mcfilter\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/115, 0x73}], 0x1, 0x0, 0x0) openat(r1, &(0x7f0000000000)='./file1\x00', 0x44c100, 0x40) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r0, 0x0, 0x8c) r3 = fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x2000000, &(0x7f0000000780)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@uname={'uname', 0x3d, 'trans=fd,'}}, {@version_L}, {@version_9p2000}, {@privport}, {@version_9p2000}, {@access_uid}], [{@smackfshat={'smackfshat', 0x3d, 'wfdno'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@dont_hash}, {@pcr={'pcr', 0x3d, 0x3f}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@obj_role}, {@euid_lt}, {@dont_measure}]}}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x121000, 0x0) getgroups(0x2, &(0x7f0000000200)=[0x0, 0xffffffffffffffff]) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000180), 0x10000, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@nodevmap}, {@dfltgid={'dfltgid', 0x3d, r5}}, {@cache_mmap}, {@cache_mmap}, {@aname={'aname', 0x3d, 'uname'}}, {@fscache}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@access_client}, {@noextend}, {@cache_none}], [{@smackfshat={'smackfshat', 0x3d, '\x92+\\-\''}}, {@smackfsfloor}]}}) 04:22:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x107140, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000000)="19a72258db8799f3840d9debc2e602cb", 0x10) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f00000001c0)={{0x80000001, 0x1ff}, 0x100, './file1\x00'}) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000001800)=ANY=[@ANYBLOB="0200000001000000000000000100000000000000100000000000000020"], 0x24, 0x0) 04:22:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a288777", 0x81, 0x4200}], 0x0, &(0x7f0000013a00)) 04:22:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}], 0x0, &(0x7f0000013a00)) 04:22:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:22:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0), 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) [ 466.109399] SELinux: duplicate or incompatible mount options [ 466.131189] loop3: detected capacity change from 0 to 262144 [ 466.160373] SELinux: duplicate or incompatible mount options [ 466.162745] loop7: detected capacity change from 0 to 262144 04:22:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x80641, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0xb}, 0x580, 0x0, 0x0, 0xb9998546a837ad48, 0x0, 0x5, 0xfffd}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4a20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000040)={0x0, 0xea60}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x6, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000001c0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, 0x0, 0x0, &(0x7f0000000400)=""/104, 0x68}, 0x40000000) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x31, &(0x7f0000000540)=[{&(0x7f0000000100)=':\x00', 0xfffffdef}], 0x1}, 0x10044001) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000280), 0x10) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$getown(r1, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') readv(r2, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0x7}, 0x7) fallocate(r1, 0x20, 0x0, 0x8000) [ 466.173883] loop5: detected capacity change from 0 to 262144 [ 466.198071] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 466.200268] EXT4-fs (loop7): get root inode failed [ 466.201187] EXT4-fs (loop7): mount failed [ 466.203504] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 466.206095] EXT4-fs (loop3): get root inode failed [ 466.206989] EXT4-fs (loop3): mount failed [ 466.222905] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extra_isize 119 (inode size 512) [ 466.225158] EXT4-fs (loop5): get root inode failed [ 466.226024] EXT4-fs (loop5): mount failed 04:22:16 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fremovexattr(r0, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)={0xa4, 0x20, 0x101, 0x0, 0x0, {}, [@typed={0x90, 0x63, 0x0, 0x0, @binary="a0eab51f24f4074cfbfbbb07324cc62f701d9f2905855dd18b1f0d5ce7f3493090af5beef11c281fbcc10f4675223ffc29811a6d82c0c17acd7a40480a51d57b2b3cc217bf3558b4d61924aa0922349a895d495ac12b16cb2b0cb00a0c3d1fb5b695cfebd4ad94d1a5642d3ec010c0792e9f8a9bff9bc38d6a5f4c42eb9238b7bc3a2be2cefbfd2d17065093"}]}, 0xa4}, 0x1, 0x0, 0x0, 0xb0}, 0x8044) syz_io_uring_setup(0x22, &(0x7f0000000240)={0x0, 0x813d, 0x0, 0x0, 0x12d}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, 0x0, &(0x7f0000002a40)) gettid() syz_io_uring_submit(0x0, 0x0, 0x0, 0x9) getpid() r2 = fork() ptrace$setopts(0x4206, r2, 0x10001, 0x10002d) ptrace(0x10, r2) ptrace$cont(0x7, r2, 0x8, 0x8) ptrace(0x4207, r2) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[], 0x308}, 0x1, 0x0, 0x0, 0x2000800}, 0x4008040) 04:22:16 executing program 2: r0 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:22:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0), 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) 04:22:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}], 0x0, &(0x7f0000013a00)) 04:22:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82}], 0x0, &(0x7f0000013a00)) [ 466.516208] loop7: detected capacity change from 0 to 262144 [ 466.535993] loop3: detected capacity change from 0 to 262144 04:22:17 executing program 0: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "f31a0000434ef9bab774bdcab95c000d00", 0x0, 0x8}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = socket$inet(0x2, 0xa, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$tun(r0, &(0x7f0000000140)={@val={0x0, 0x4}, @val={0x1, 0x0, 0x401, 0x9, 0x93f9}, @ipv6=@generic={0x5, 0x6, "49b799", 0xa5, 0x1d, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, @mcast1, {[@srh={0x3b, 0x2, 0x4, 0x1, 0x4, 0x50, 0x400, [@private2]}, @routing={0x3b, 0x8, 0x0, 0x7, 0x0, [@local, @dev={0xfe, 0x80, '\x00', 0x33}, @loopback, @private2]}], "5b5cb70e3ef68ea33401becf6db209a7bce5d1c952f4d259e1ac1cca0b08ac7c562bf68c5c0b8dad553dc267a85bcae263ab60844d34366d3e59d0fae61f62221a3a927a66"}}}, 0xdb) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x9, 0x0, 0x4, 0x3, 0x0, 0x839, 0x2000, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x9, 0x6}, 0x80, 0x9, 0x1, 0x1, 0x40, 0x3, 0x1, 0x0, 0xadcd, 0x0, 0x51a3}, 0x0, 0xa, r2, 0x8) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, 0x0) r5 = dup(r4) setns(r5, 0x2020000) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r7, 0x107, 0x2, &(0x7f0000000000)="19a72258db8799f3840d9debc2e602cb", 0x10) r8 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r8, 0x107, 0x1, &(0x7f0000000000)="19a72258db8799f3840d9debc2e602cb", 0x10) sendmsg$nl_generic(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000003740)=ANY=[@ANYRES64=r8], 0x14}}, 0x0) ftruncate(r6, 0x3f) 04:22:17 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 466.647206] loop5: detected capacity change from 0 to 262144 [ 466.669324] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: special inode unallocated [ 466.674917] EXT4-fs (loop5): get root inode failed [ 466.676111] EXT4-fs (loop5): mount failed [ 466.683636] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 466.686107] EXT4-fs (loop3): get root inode failed [ 466.686998] EXT4-fs (loop3): mount failed [ 466.696690] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 466.714662] EXT4-fs (loop7): get root inode failed [ 466.715847] EXT4-fs (loop7): mount failed [ 466.788967] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) 04:22:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb2", 0x2f, 0x4200}], 0x0, &(0x7f0000013a00)) 04:22:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}], 0x0, &(0x7f0000013a00)) 04:22:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82}], 0x0, &(0x7f0000013a00)) 04:22:32 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r1, 0x330f, 0x3) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup2(r2, r1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000013c0)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in=@local}}, &(0x7f0000001200)=0x4b) r6 = syz_open_dev$mouse(&(0x7f0000000180), 0x5, 0x40000) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001340)={&(0x7f0000001e00)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="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", @ANYRESOCT, @ANYRES32=r4], 0x13dc}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001780)=ANY=[@ANYBLOB="d6e9935ebc6058d898bb4dc77cf658f708cd8d121af4384519d5321b7e23a4c63b72450bb232fc021e1b", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\t./file0\x00']) openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x24000, 0x50) syz_io_uring_setup(0x1433, &(0x7f0000000080)={0x0, 0x7fb1, 0x0, 0x0, 0x111}, &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f00000011c0)=0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000004, 0x4010, r6, 0x8000000) syz_io_uring_submit(r8, r7, &(0x7f0000000240)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000200), 0x1, 0x1}, 0x40) 04:22:32 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:22:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) [ 482.434100] loop4: detected capacity change from 0 to 135266304 r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:22:32 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:22:32 executing program 0: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = fork() ptrace(0x10, r1) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x48, r0, 0x8, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4000009) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000140)={&(0x7f0000001280)=""/4096, 0x1000}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan1\x00', 0x0}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/mcfilter\x00') preadv(r4, &(0x7f0000000000)=[{&(0x7f0000000100)=""/115, 0x73}], 0x1, 0x0, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x3c, r0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2000c000}, 0x4000000) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x14) [ 482.449676] loop3: detected capacity change from 0 to 262144 [ 482.464090] loop5: detected capacity change from 0 to 262144 [ 482.482513] loop7: detected capacity change from 0 to 262144 [ 482.531043] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: special inode unallocated [ 482.538125] EXT4-fs (loop5): get root inode failed [ 482.539277] EXT4-fs (loop5): mount failed [ 482.571503] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 482.574889] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.3: invalid block [ 482.579732] EXT4-fs (loop3): get root inode failed [ 482.580889] EXT4-fs (loop3): mount failed [ 482.583724] EXT4-fs (loop7): get root inode failed [ 482.585011] EXT4-fs (loop7): mount failed 04:22:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82}], 0x0, &(0x7f0000013a00)) [ 482.895411] loop5: detected capacity change from 0 to 262144 [ 482.940112] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: special inode unallocated [ 482.949918] EXT4-fs (loop5): get root inode failed [ 482.950896] EXT4-fs (loop5): mount failed 04:22:48 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:22:48 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:22:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:22:48 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {0x0, 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) 04:22:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:22:48 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000000)="19a72258db8799f3840d9debc2e602cb", 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:22:48 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f0000000000)="19a72258db8799f3840d9debc2e602cb", 0x10) preadv2(r1, &(0x7f0000000140)=[{&(0x7f0000000100)=""/7, 0x7}], 0x1, 0xffff, 0x4ee, 0x2) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001940)=ANY=[@ANYBLOB="4000000001040500000000000000000000000000080004400000000008000540000000000a000200000000000600000005000100010000000800034000006415"], 0x40}}, 0x0) preadv2(0xffffffffffffffff, 0x0, 0x0, 0xffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2, 0x0, 0x8}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004801) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) 04:22:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0), 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) [ 498.202337] loop3: detected capacity change from 0 to 262144 [ 498.211357] loop4: detected capacity change from 0 to 135266304 [ 498.223727] loop5: detected capacity change from 0 to 262144 [ 498.251893] loop7: detected capacity change from 0 to 262144 [ 498.284867] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 498.287483] EXT4-fs (loop5): group descriptors corrupted! [ 498.307859] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 498.310705] EXT4-fs (loop7): get root inode failed [ 498.311795] EXT4-fs (loop7): mount failed [ 498.314153] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 498.325388] EXT4-fs (loop3): get root inode failed [ 498.326494] EXT4-fs (loop3): mount failed 04:22:48 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r1, &(0x7f00000035c0)=[{{&(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10, 0x0}}, {{&(0x7f0000001140)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f00000015c0)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @multicast1, @local}}}], 0x20}}], 0x2, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x10800, 0x2) clock_gettime(0x0, &(0x7f0000003580)={0x0, 0x0}) recvmmsg$unix(r2, &(0x7f0000008a00)=[{{&(0x7f00000002c0), 0x6e, &(0x7f0000000600)=[{&(0x7f00000001c0)=""/2, 0x2}, {&(0x7f0000000340)=""/76, 0x4c}, {&(0x7f00000003c0)=""/99, 0x63}, {&(0x7f0000000440)=""/122, 0x7a}, {&(0x7f0000000500)=""/94, 0x5e}, {&(0x7f0000000580)=""/112, 0x70}], 0x6, &(0x7f0000000240)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000000680), 0x6e, &(0x7f0000000e40)=[{&(0x7f0000000700)=""/55, 0x37}, {&(0x7f0000000740)=""/151, 0x97}, {&(0x7f0000000800)=""/225, 0xe1}, {&(0x7f0000000900)=""/5, 0x5}, {&(0x7f0000000940)=""/214, 0xd6}, {&(0x7f0000000a40)=""/221, 0xdd}, {&(0x7f0000000b40)=""/241, 0xf1}, {&(0x7f0000000c40)=""/162, 0xa2}, {&(0x7f0000000d00)=""/58, 0x3a}, {&(0x7f0000000d40)=""/244, 0xf4}], 0xa, &(0x7f0000000f00)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000000f80)=@abs, 0x6e, &(0x7f0000001280)=[{&(0x7f0000001000)=""/220, 0xdc}, {&(0x7f0000001100)=""/56, 0x38}, {&(0x7f0000003640)=""/4096, 0x1000}, {&(0x7f0000001180)=""/6, 0x6}, {&(0x7f00000011c0)=""/46, 0x2e}, {&(0x7f0000001200)=""/109, 0x6d}], 0x6, &(0x7f0000001300)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000001340)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f00000013c0)=""/86, 0x56}], 0x1, &(0x7f0000008d00)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f7000000677061c2d156dc5a5a2c355b178542c16b392627b4260a9b898bb8c4ba8bd84191431310be314c685f769fa3eae3c508be46998c806de9e470b602eb3f1cf19912046e626dcf9f00000000"], 0xa0}}, {{&(0x7f0000001540), 0x6e, &(0x7f00000016c0)=[{&(0x7f0000001600)=""/59, 0x3b}, {&(0x7f0000001640)=""/7, 0x7}, {&(0x7f0000001680)}], 0x3, &(0x7f0000008c40)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000020000100000002000000b87bd8bc259dc6bddb098cbba4931ff6b202fd52365692a2c455c2df95b76328f343afec08480470bee1f7de295047199c2ee1d79b4516796a0d45aa82a75dae4a2ccc7e9cbf68b3548c4b3b", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x58}}, {{&(0x7f0000001780), 0x6e, &(0x7f0000001c40)=[{&(0x7f0000001800)=""/212, 0xd4}, {&(0x7f0000001900)=""/61, 0x3d}, {&(0x7f0000001940)=""/240, 0xf0}, {&(0x7f0000001a40)=""/142, 0x8e}, {&(0x7f0000004640)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/118, 0x76}, {&(0x7f0000001b80)=""/185, 0xb9}], 0x7, &(0x7f0000001cc0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}}, {{0x0, 0x0, &(0x7f00000030c0)=[{&(0x7f0000005640)=""/4096, 0x1000}, {&(0x7f0000002e40)=""/31, 0x1f}, {&(0x7f0000002e80)=""/127, 0x7f}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000002f00)}, {&(0x7f0000002f40)=""/80, 0x50}, {&(0x7f0000002fc0)=""/115, 0x73}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000003040)=""/118, 0x76}], 0x9}}, {{&(0x7f0000003180), 0x6e, &(0x7f00000088c0)=[{&(0x7f0000003200)=""/78, 0x4e}, {&(0x7f0000003280)=""/100, 0x64}, {&(0x7f0000003300)=""/50, 0x32}, {&(0x7f0000003340)=""/254, 0xfe}, {&(0x7f0000003440)=""/209, 0xd1}, {&(0x7f0000008640)=""/182, 0xb6}, {&(0x7f0000008700)=""/247, 0xf7}, {&(0x7f0000008800)=""/154, 0x9a}, {&(0x7f0000003540)=""/58, 0x3a}], 0x9, &(0x7f0000008980)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}], 0x8, 0x180, &(0x7f0000008c00)={r3, r4+60000000}) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='net/vlan/vlan0\x00') ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x9, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') readv(r5, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r6, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r6, {0xffffffb6}}, './file2\x00'}) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40086607, &(0x7f0000000080)) openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r7, 0x29, 0x37, &(0x7f0000000040)=ANY=[], 0x10) getsockopt$inet6_opts(r7, 0x29, 0x37, &(0x7f0000000040)=""/69, &(0x7f00000000c0)=0x45) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000140)={{0x1, 0x1, 0x18, r7, {0x8001}}, './file1\x00'}) 04:22:48 executing program 0: ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8000, 0x7ff}, {0xa43, 0xffff}, {0x551, 0xcd77}]}) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000ec0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)={[{@mode}, {@size}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x440200, 0x102) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x2710}, {0x0, 0xea60}}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x101, 0x5, 0x0, 0x1}]}) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x1ff}}, './file0\x00'}) [ 498.569553] tmpfs: Bad value for 'size' [ 498.584249] tmpfs: Bad value for 'size' 04:23:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:23:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0), 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) 04:23:02 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {0x0, 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) 04:23:02 executing program 0: r0 = perf_event_open(&(0x7f0000001880)={0x3, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2, 0x100}, 0x0, 0x0, 0x0, 0x4, 0x6, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000001780)=""/251, 0xfb}, {&(0x7f0000001500)=""/102, 0x66}, {&(0x7f0000001900)=""/130, 0x82}, {&(0x7f00000019c0)=""/95, 0x5f}], 0x4) readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) readv(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000001640)=""/79, 0x4f}, {&(0x7f0000000200)=""/58, 0x3a}, {&(0x7f00000016c0)=""/100, 0x64}], 0x3) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r2, 0x6801, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000001a40)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r3, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file1\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x1f381d, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) fsetxattr$security_selinux(r4, &(0x7f0000000240), &(0x7f00000002c0)='system_u:object_r:dlm_control_device_t:s0\x00', 0x2a, 0x6a4e5309ea842515) write$P9_RXATTRCREATE(r2, &(0x7f0000000340)={0x7, 0x21, 0x2}, 0x7) openat$bsg(0xffffffffffffff9c, &(0x7f00000014c0), 0x103, 0x0) mkdir(&(0x7f0000000300)='./file0/../file0\x00', 0x13d) unshare(0x48020200) 04:23:02 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:23:02 executing program 6: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_delete(0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_gettime(0x0, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000080)) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) lseek(r0, 0x0, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@local}}, {{@in6=@private2}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0xe8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0xc8182300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/mcfilter\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/115, 0x73}], 0x1, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/mcfilter\x00') preadv(r4, &(0x7f0000000000)=[{&(0x7f0000000100)=""/115, 0x73}], 0x1, 0x0, 0x0) mq_timedsend(r4, &(0x7f0000001e00)="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", 0x1098, 0x5, &(0x7f00000000c0)={r2, r3+60000000}) 04:23:02 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:23:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 512.263331] loop3: detected capacity change from 0 to 262144 [ 512.300180] loop5: detected capacity change from 0 to 262144 [ 512.313907] perf: interrupt took too long (3177 > 3150), lowering kernel.perf_event_max_sample_rate to 62000 [ 512.321442] perf: interrupt took too long (5069 > 4990), lowering kernel.perf_event_max_sample_rate to 39000 [ 512.326161] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 512.328165] EXT4-fs (loop3): get root inode failed [ 512.328990] EXT4-fs (loop3): mount failed [ 512.332995] loop4: detected capacity change from 0 to 135266304 [ 512.339148] loop7: detected capacity change from 0 to 262144 [ 512.345951] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 512.346972] EXT4-fs (loop5): group descriptors corrupted! [ 512.378757] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 512.383543] perf: interrupt took too long (8084 > 8021), lowering kernel.perf_event_max_sample_rate to 24000 [ 512.389047] EXT4-fs (loop7): get root inode failed [ 512.390089] EXT4-fs (loop7): mount failed 04:23:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:23:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0), 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) [ 512.416229] perf: interrupt took too long (10200 > 10105), lowering kernel.perf_event_max_sample_rate to 19000 04:23:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 512.504399] perf: interrupt took too long (12758 > 12750), lowering kernel.perf_event_max_sample_rate to 15000 04:23:02 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {0x0, 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) [ 512.522081] loop5: detected capacity change from 0 to 262144 [ 512.589326] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 512.591453] EXT4-fs (loop5): group descriptors corrupted! 04:23:03 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:23:03 executing program 6: r0 = epoll_create(0x5) r1 = dup2(0xffffffffffffffff, r0) fcntl$getown(r1, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x103, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00']) [ 512.682225] loop7: detected capacity change from 0 to 262144 [ 512.713339] perf: interrupt took too long (16011 > 15947), lowering kernel.perf_event_max_sample_rate to 12000 04:23:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb7", 0x18, 0x4200}], 0x0, &(0x7f0000013a00)) 04:23:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 512.795449] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 512.807547] EXT4-fs (loop7): get root inode failed [ 512.808383] EXT4-fs (loop7): mount failed [ 512.822364] loop5: detected capacity change from 0 to 262144 04:23:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 512.879416] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 512.881781] EXT4-fs (loop5): group descriptors corrupted! 04:23:03 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/mcfilter\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/115, 0x73}], 0x1, 0x0, 0x0) connect$unix(r0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x84}, 0x0) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0) r1 = syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r4, 0x0}, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RUNLINKAT(r7, &(0x7f0000000040)={0x7}, 0x7) fallocate(r7, 0x20, 0x0, 0x8000) fallocate(r6, 0x0, 0x0, 0x2) fallocate(r5, 0x20, 0x2000, 0x8000) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000580)={0x2d8, 0x1e, 0x230, 0x70bd2b, 0x25dfdbfc, {0x7}, [@typed={0x4, 0x6c}, @generic="d8d0a6214abc10e5fe9806e79deebb63973414c47574464b600d9ebd12a4f95392f35f5781d7325455499c7b3291e10b9fc3677213772a7b5a471539a340afc2992dff5a5c790e4a37d6ed47680f487f75380300ff50f73be6a1dd247c96050a0bfe7ee8875f921552ad4b447559f58dfe5d98abed5121748ccabe8e0999eed2bc5a18f72954074ecff9153b740c85100b80f9de2e5cda732058de596dd8a464", @typed={0x4, 0x83}, @nested={0x97, 0x20, 0x0, 0x1, [@generic="3b4a8b5875bc5b73e0aea5784e796b4d1621d9d747c267c30bd016203b51598924bef306a0de6c5f5e4e18b216789d12623234e270cad07e17f12b4c64d2d55ec2e9a7cbf3f6048f59fc683ff240130e6fe2d248690db1ead084e90ad50f5424b64d48f5ddf0e7f5cc838dbdb84b66d24b3b37", @typed={0x14, 0x4, 0x0, 0x0, @ipv6=@mcast2}, @typed={0xc, 0x1a, 0x0, 0x0, @u64=0x7fff}]}, @generic="43647e3a7bf8629f31d1d1c7b331614d4c0b28e818dcbd25dfce9d471ec02bd81cb3a00a7a2df5c0f4b37e59b749359f15185da69c1697f8debe62f622e606294bd2465b79b8fc172948a363e03acd8803535178b4f49775902088067f5032051652b534f4e4c7a7e9317aa8a56f762c38f6f05ed1de6258de6d904fa6b6f68e7b45bc5f3feb048d67600b20c0db0365c017083b193517c16e09f26160a2197d6285f184a9c8e2f7", @nested={0xd6, 0x4e, 0x0, 0x1, [@typed={0x14, 0x7c, 0x0, 0x0, @ipv6=@loopback}, @generic="374d64aff4a7533d0078deefb252a255572cd176eae55c064fc6da7af2240dfe9b2436e489e3c18b2a86ceaf48141d6b7ac22b0275370195d6ef65395b30e23a6b4af461200db0f68f9c3b6fd4d9baae2b016df5df9097b3f546450dff926eec091dcce16c6eb0853750757a7315747598e632eb86cdb82867c7f58432a37db44ebc9d565eafc5f7381bdc056d1ddc16923a56a4f92d351b2a48f45a1b206e6527d0e77ebeff96f479a8e79894a2e0505ac80f2982e3253f951ecbc91afb"]}, @typed={0x4, 0x44}]}, 0x2d8}, 0x1, 0x0, 0x0, 0x400}, 0x20000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) [ 512.908722] loop6: detected capacity change from 0 to 8192 [ 512.916519] EXT4-fs (loop6): unsupported inode size: 41610 [ 512.917225] EXT4-fs (loop6): blocksize: 4096 [ 512.937129] loop3: detected capacity change from 0 to 262144 [ 512.950472] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated 04:23:03 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0), 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) [ 512.957886] EXT4-fs (loop3): get root inode failed [ 512.958466] EXT4-fs (loop3): mount failed 04:23:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb7", 0x18, 0x4200}], 0x0, &(0x7f0000013a00)) 04:23:03 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 513.112617] loop7: detected capacity change from 0 to 262144 [ 513.119165] loop3: detected capacity change from 0 to 262144 [ 513.140518] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 513.143063] EXT4-fs (loop7): get root inode failed [ 513.143657] EXT4-fs (loop7): mount failed [ 513.147729] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 513.149425] EXT4-fs (loop3): get root inode failed [ 513.150034] EXT4-fs (loop3): mount failed [ 526.690069] loop7: detected capacity change from 0 to 262144 04:23:17 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff7f, 0x5}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x5, 0x0, 0x0, 0x241808, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='configfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x14, r2, 0x1, 0x70bd27}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) open$dir(&(0x7f00000001c0)='./file0\x00', 0x204080, 0x120) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(0x0, 0xffffffffffffffff) 04:23:17 executing program 6: clock_adjtime(0x3, &(0x7f0000000100)={0x8733, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x200000000000000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}) clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xffffffffffffffc0, 0x4, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x2, 0x8, 0x101, 0x7, 0x4, 0x20, 0x227}, 0x1c) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000000)="19a72258db8799f3840d9debc2e602cb", 0x10) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000300)="c213ee22323889bfc5538ab3dcb2e7e26cfa705d32280f5e762e230159e12a7991c46cb85bbc9db727335e12a30420f4905f6d4984b9d19324aa7b3081b3b8c410ddd752d806c051d5c20ecbc61ffd85e2a27183a32215ac4683bacad95a38abdde3ef5a3b3536216ea893bf1979b91b739ca4c5d4a056a550fc2a99b17cb922964bf368ac6664", 0x87}, {&(0x7f00000003c0)="35ee0a4ebe9a7f02ba4e79adf39ec0db16d0f7fc1694ce14961b000694010161517137ecf2b82b2fe1a9a6798b6997255851df7950e54db0e257ef1e5313bc4478a94548c67c51de666171da7785f29fc8bebc55ced3cf10d3bd6936538c4d0691995a4923f2189da03fe7d451bd956f77f5724a4200076d4cdcdab6bd8a9a63f5f7feec8e8ac5d5253c0921cf136a71ec8663011fea754dfe9d3b88cbb157fb861298b4c48eee94a7a5ae65f06b210f35ee9b4603c77b84706891b38125621c56f7fe7a2ad75b", 0xc7}, {&(0x7f00000004c0)="398c5fee8b544ce82a47570f78313e3d2ec93e9b03721a32c829522f10736cb813b2a4a0f148c23d418c29bfe66a9368a139d068c9f9a38d694ecd04a1cc55befe5c8d708a93adfd895edce326f6bd316431bcf11158c69f72133dbe1d902edaad11d9eb71a81e0efba47edfad30d9b890d5b1d3dd5de14221a45a83a94687c88804ed365deaaab19d9186cca760d51c0dacb8fef9d95d6d36922c74d0", 0x9d}, {&(0x7f0000000580)="a5911d6cac35d45ed66976f45bc4f519f5de19d0cc01d1b79657077ae2166f594eb44bc1ccb9fe7927e2d4a1df9eaa57e8c1251e43f30d9cbd0428aaef2e4659fce2aeb4fd39d11075034a03978719b0a0e090ef5e8b48cb603f069b938a6c3c259f33682b93d90a38df01edea4a4980d5c34c25421507299a1229c409e88e70663e28b5c926747314f3", 0x8a}, {&(0x7f0000000640)="7d2bc774b06accd34f5b65416181ba1e53b3182172cdf512452924412213dde1791e2dc4bfad6232985f731d87e3be85987a61537ade0275cc239ff9aabe1ba20cea6a0fe433489305673888b5bff17c51f5ad59e67b02d008f793bfdac6f0cf9dae342eecf3eafe92d8b4005b2b06cf62af4ec9014b79da10a954694d26fa8967e1819139931fcefda70b4ac921a1243d6d9c938047b1f52453b130e73d542ac56d5f77a2c70806446344c2ee5f267f45ff1c315f4618bd0cb1caf18bd8f8bac3ecb0904f6efcba8ed32c5a98f562a138c60084f29d265fd680ba16a23f0d09e06746f2e22acdcb208bd8f7c76ac7c20f8653", 0xf3}, {&(0x7f0000000740)="b7962e9c6b2bbafd9f120885caf932f07fb050380d28d88191789b22da2c641c8cdb083df7ac4529fd3f8fbc44cba3983011693c289f6cf96f042f1657ba24ae39b77f8189ba75975cefc4d6a92a9215e1758fffebc94cd9cf8e0ec4fe1cb48424905543a9c4b274a55c10ba96e72a4f45fb739660e18cdf68bd245bad90bb5d7d7eab906213dd3e52fd8d93138085f25cd2a0af1c68a70b448bb8418e936a2505c8ec0ca2b0c8a8ced1fdf6fd724554250ed76774558a6be79ab28df56364d825f2b0f600d549bb078754620dc8e95d40f11b7ae85c", 0xd6}], 0x6, 0x1c5, 0x3ff) 04:23:17 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:23:17 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0), 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) 04:23:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:23:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:23:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb7", 0x18, 0x4200}], 0x0, &(0x7f0000013a00)) 04:23:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 526.747263] loop5: detected capacity change from 0 to 262144 [ 526.764381] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 526.773097] EXT4-fs (loop7): get root inode failed [ 526.774341] EXT4-fs (loop7): mount failed [ 526.778814] loop3: detected capacity change from 0 to 262144 [ 526.783527] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 526.785658] EXT4-fs (loop5): group descriptors corrupted! [ 526.792305] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 526.799417] EXT4-fs (loop3): get root inode failed [ 526.800632] EXT4-fs (loop3): mount failed [ 526.811283] loop4: detected capacity change from 0 to 135266304 04:23:21 executing program 6: clock_adjtime(0x3, &(0x7f0000000100)={0x8733, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x200000000000000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}) clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xffffffffffffffc0, 0x4, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x2, 0x8, 0x101, 0x7, 0x4, 0x20, 0x227}, 0x1c) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000000)="19a72258db8799f3840d9debc2e602cb", 0x10) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000300)="c213ee22323889bfc5538ab3dcb2e7e26cfa705d32280f5e762e230159e12a7991c46cb85bbc9db727335e12a30420f4905f6d4984b9d19324aa7b3081b3b8c410ddd752d806c051d5c20ecbc61ffd85e2a27183a32215ac4683bacad95a38abdde3ef5a3b3536216ea893bf1979b91b739ca4c5d4a056a550fc2a99b17cb922964bf368ac6664", 0x87}, {&(0x7f00000003c0)="35ee0a4ebe9a7f02ba4e79adf39ec0db16d0f7fc1694ce14961b000694010161517137ecf2b82b2fe1a9a6798b6997255851df7950e54db0e257ef1e5313bc4478a94548c67c51de666171da7785f29fc8bebc55ced3cf10d3bd6936538c4d0691995a4923f2189da03fe7d451bd956f77f5724a4200076d4cdcdab6bd8a9a63f5f7feec8e8ac5d5253c0921cf136a71ec8663011fea754dfe9d3b88cbb157fb861298b4c48eee94a7a5ae65f06b210f35ee9b4603c77b84706891b38125621c56f7fe7a2ad75b", 0xc7}, {&(0x7f00000004c0)="398c5fee8b544ce82a47570f78313e3d2ec93e9b03721a32c829522f10736cb813b2a4a0f148c23d418c29bfe66a9368a139d068c9f9a38d694ecd04a1cc55befe5c8d708a93adfd895edce326f6bd316431bcf11158c69f72133dbe1d902edaad11d9eb71a81e0efba47edfad30d9b890d5b1d3dd5de14221a45a83a94687c88804ed365deaaab19d9186cca760d51c0dacb8fef9d95d6d36922c74d0", 0x9d}, {&(0x7f0000000580)="a5911d6cac35d45ed66976f45bc4f519f5de19d0cc01d1b79657077ae2166f594eb44bc1ccb9fe7927e2d4a1df9eaa57e8c1251e43f30d9cbd0428aaef2e4659fce2aeb4fd39d11075034a03978719b0a0e090ef5e8b48cb603f069b938a6c3c259f33682b93d90a38df01edea4a4980d5c34c25421507299a1229c409e88e70663e28b5c926747314f3", 0x8a}, {&(0x7f0000000640)="7d2bc774b06accd34f5b65416181ba1e53b3182172cdf512452924412213dde1791e2dc4bfad6232985f731d87e3be85987a61537ade0275cc239ff9aabe1ba20cea6a0fe433489305673888b5bff17c51f5ad59e67b02d008f793bfdac6f0cf9dae342eecf3eafe92d8b4005b2b06cf62af4ec9014b79da10a954694d26fa8967e1819139931fcefda70b4ac921a1243d6d9c938047b1f52453b130e73d542ac56d5f77a2c70806446344c2ee5f267f45ff1c315f4618bd0cb1caf18bd8f8bac3ecb0904f6efcba8ed32c5a98f562a138c60084f29d265fd680ba16a23f0d09e06746f2e22acdcb208bd8f7c76ac7c20f8653", 0xf3}, {&(0x7f0000000740)="b7962e9c6b2bbafd9f120885caf932f07fb050380d28d88191789b22da2c641c8cdb083df7ac4529fd3f8fbc44cba3983011693c289f6cf96f042f1657ba24ae39b77f8189ba75975cefc4d6a92a9215e1758fffebc94cd9cf8e0ec4fe1cb48424905543a9c4b274a55c10ba96e72a4f45fb739660e18cdf68bd245bad90bb5d7d7eab906213dd3e52fd8d93138085f25cd2a0af1c68a70b448bb8418e936a2505c8ec0ca2b0c8a8ced1fdf6fd724554250ed76774558a6be79ab28df56364d825f2b0f600d549bb078754620dc8e95d40f11b7ae85c", 0xd6}], 0x6, 0x1c5, 0x3ff) 04:23:21 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0), 0x0, 0x4200}], 0x0, &(0x7f0000013a00)) 04:23:21 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316da", 0x3b, 0x4200}], 0x0, &(0x7f0000013a00)) 04:23:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:23:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447c", 0x24, 0x4200}], 0x0, &(0x7f0000013a00)) 04:23:23 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x2, 0xffffffffffffffff, 0x5) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r0], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) bind(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x2, @broadcast, 'bridge_slave_1\x00'}}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x240e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, @perf_config_ext, 0x90200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000280)={r1, 0x10001, 0xc4, 0x20}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300), r1) sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r5, 0x400, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x1, @link='syz1\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8080}, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2800002, 0x810, r3, 0x6) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x81, 0x9, 0x3f, 0x0, 0x5, 0x4004, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000040), 0xf}, 0x0, 0x1, 0xd112, 0x6, 0x2, 0x0, 0x4, 0x0, 0x9, 0x0, 0x80}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000580)={'tunl0\x00', &(0x7f0000000480)={'syztnl0\x00', 0x0, 0x8000, 0x7800, 0xb017, 0x1f, {{0x33, 0x4, 0x1, 0x1f, 0xcc, 0x67, 0x0, 0x8, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@end, @timestamp={0x44, 0x10, 0x8b, 0x0, 0x3, [0x80000001, 0x7, 0x5]}, @lsrr={0x83, 0xf, 0xdb, [@remote, @rand_addr=0x64010101, @remote]}, @generic={0x89, 0xe, "4c0c97305792e130395e9514"}, @ssrr={0x89, 0xb, 0x6d, [@dev={0xac, 0x14, 0x14, 0x28}, @empty]}, @lsrr={0x83, 0xb, 0xab, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1]}, @timestamp_prespec={0x44, 0x2c, 0x85, 0x3, 0x1, [{@rand_addr=0x64010100, 0x9}, {@rand_addr=0x64010101, 0x1c0000}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x8}, {@remote, 0x17}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x12}]}, @cipso={0x86, 0x14, 0x1, [{0x7, 0x6, "fc3fb62d"}, {0x5, 0x8, "89c337212780"}]}, @timestamp_prespec={0x44, 0x34, 0x76, 0x3, 0xa, [{@private=0xa010100, 0x7ff}, {@remote, 0x1}, {@broadcast, 0xff}, {@multicast2, 0x8}, {@loopback, 0x40}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffffffc}]}]}}}}}) getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00'}) unshare(0x48020200) [ 527.058127] loop5: detected capacity change from 0 to 262144 04:23:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:23:23 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316da", 0x3b, 0x4200}], 0x0, &(0x7f0000013a00)) [ 527.106898] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 527.109089] EXT4-fs (loop5): group descriptors corrupted! [ 527.157522] loop7: detected capacity change from 0 to 262144 [ 527.194537] loop3: detected capacity change from 0 to 262144 [ 527.225724] EXT4-fs error (device loop7): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.7: invalid block [ 527.228564] EXT4-fs (loop7): get root inode failed [ 527.229812] EXT4-fs (loop7): mount failed [ 527.269425] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 527.274061] EXT4-fs (loop3): warning: mounting fs with errors, running e2fsck is recommended [ 527.277498] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=e842c01c, mo2=0002] [ 527.284034] System zones: 0-7 [ 527.332119] EXT4-fs (loop3): Errors on filesystem, clearing orphan list. [ 527.332119] [ 527.334007] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 527.383791] Zero length message leads to an empty skb 04:23:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:23:39 executing program 6: clock_adjtime(0x3, &(0x7f0000000100)={0x8733, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x200000000000000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}) clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xffffffffffffffc0, 0x4, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x2, 0x8, 0x101, 0x7, 0x4, 0x20, 0x227}, 0x1c) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000000)="19a72258db8799f3840d9debc2e602cb", 0x10) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000300)="c213ee22323889bfc5538ab3dcb2e7e26cfa705d32280f5e762e230159e12a7991c46cb85bbc9db727335e12a30420f4905f6d4984b9d19324aa7b3081b3b8c410ddd752d806c051d5c20ecbc61ffd85e2a27183a32215ac4683bacad95a38abdde3ef5a3b3536216ea893bf1979b91b739ca4c5d4a056a550fc2a99b17cb922964bf368ac6664", 0x87}, {&(0x7f00000003c0)="35ee0a4ebe9a7f02ba4e79adf39ec0db16d0f7fc1694ce14961b000694010161517137ecf2b82b2fe1a9a6798b6997255851df7950e54db0e257ef1e5313bc4478a94548c67c51de666171da7785f29fc8bebc55ced3cf10d3bd6936538c4d0691995a4923f2189da03fe7d451bd956f77f5724a4200076d4cdcdab6bd8a9a63f5f7feec8e8ac5d5253c0921cf136a71ec8663011fea754dfe9d3b88cbb157fb861298b4c48eee94a7a5ae65f06b210f35ee9b4603c77b84706891b38125621c56f7fe7a2ad75b", 0xc7}, {&(0x7f00000004c0)="398c5fee8b544ce82a47570f78313e3d2ec93e9b03721a32c829522f10736cb813b2a4a0f148c23d418c29bfe66a9368a139d068c9f9a38d694ecd04a1cc55befe5c8d708a93adfd895edce326f6bd316431bcf11158c69f72133dbe1d902edaad11d9eb71a81e0efba47edfad30d9b890d5b1d3dd5de14221a45a83a94687c88804ed365deaaab19d9186cca760d51c0dacb8fef9d95d6d36922c74d0", 0x9d}, {&(0x7f0000000580)="a5911d6cac35d45ed66976f45bc4f519f5de19d0cc01d1b79657077ae2166f594eb44bc1ccb9fe7927e2d4a1df9eaa57e8c1251e43f30d9cbd0428aaef2e4659fce2aeb4fd39d11075034a03978719b0a0e090ef5e8b48cb603f069b938a6c3c259f33682b93d90a38df01edea4a4980d5c34c25421507299a1229c409e88e70663e28b5c926747314f3", 0x8a}, {&(0x7f0000000640)="7d2bc774b06accd34f5b65416181ba1e53b3182172cdf512452924412213dde1791e2dc4bfad6232985f731d87e3be85987a61537ade0275cc239ff9aabe1ba20cea6a0fe433489305673888b5bff17c51f5ad59e67b02d008f793bfdac6f0cf9dae342eecf3eafe92d8b4005b2b06cf62af4ec9014b79da10a954694d26fa8967e1819139931fcefda70b4ac921a1243d6d9c938047b1f52453b130e73d542ac56d5f77a2c70806446344c2ee5f267f45ff1c315f4618bd0cb1caf18bd8f8bac3ecb0904f6efcba8ed32c5a98f562a138c60084f29d265fd680ba16a23f0d09e06746f2e22acdcb208bd8f7c76ac7c20f8653", 0xf3}, {&(0x7f0000000740)="b7962e9c6b2bbafd9f120885caf932f07fb050380d28d88191789b22da2c641c8cdb083df7ac4529fd3f8fbc44cba3983011693c289f6cf96f042f1657ba24ae39b77f8189ba75975cefc4d6a92a9215e1758fffebc94cd9cf8e0ec4fe1cb48424905543a9c4b274a55c10ba96e72a4f45fb739660e18cdf68bd245bad90bb5d7d7eab906213dd3e52fd8d93138085f25cd2a0af1c68a70b448bb8418e936a2505c8ec0ca2b0c8a8ced1fdf6fd724554250ed76774558a6be79ab28df56364d825f2b0f600d549bb078754620dc8e95d40f11b7ae85c", 0xd6}], 0x6, 0x1c5, 0x3ff) 04:23:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 543.249012] loop4: detected capacity change from 0 to 135266304 04:23:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447c", 0x24, 0x4200}], 0x0, &(0x7f0000013a00)) 04:23:39 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316da", 0x3b, 0x4200}], 0x0, &(0x7f0000013a00)) 04:23:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:23:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447c", 0x24, 0x4200}], 0x0, &(0x7f0000013a00)) 04:23:39 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 543.281808] loop5: detected capacity change from 0 to 262144 [ 543.290144] loop7: detected capacity change from 0 to 262144 [ 543.303089] loop3: detected capacity change from 0 to 262144 04:23:41 executing program 6: clock_adjtime(0x3, &(0x7f0000000100)={0x8733, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x200000000000000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}) clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xffffffffffffffc0, 0x4, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x2, 0x8, 0x101, 0x7, 0x4, 0x20, 0x227}, 0x1c) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000000)="19a72258db8799f3840d9debc2e602cb", 0x10) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000300)="c213ee22323889bfc5538ab3dcb2e7e26cfa705d32280f5e762e230159e12a7991c46cb85bbc9db727335e12a30420f4905f6d4984b9d19324aa7b3081b3b8c410ddd752d806c051d5c20ecbc61ffd85e2a27183a32215ac4683bacad95a38abdde3ef5a3b3536216ea893bf1979b91b739ca4c5d4a056a550fc2a99b17cb922964bf368ac6664", 0x87}, {&(0x7f00000003c0)="35ee0a4ebe9a7f02ba4e79adf39ec0db16d0f7fc1694ce14961b000694010161517137ecf2b82b2fe1a9a6798b6997255851df7950e54db0e257ef1e5313bc4478a94548c67c51de666171da7785f29fc8bebc55ced3cf10d3bd6936538c4d0691995a4923f2189da03fe7d451bd956f77f5724a4200076d4cdcdab6bd8a9a63f5f7feec8e8ac5d5253c0921cf136a71ec8663011fea754dfe9d3b88cbb157fb861298b4c48eee94a7a5ae65f06b210f35ee9b4603c77b84706891b38125621c56f7fe7a2ad75b", 0xc7}, {&(0x7f00000004c0)="398c5fee8b544ce82a47570f78313e3d2ec93e9b03721a32c829522f10736cb813b2a4a0f148c23d418c29bfe66a9368a139d068c9f9a38d694ecd04a1cc55befe5c8d708a93adfd895edce326f6bd316431bcf11158c69f72133dbe1d902edaad11d9eb71a81e0efba47edfad30d9b890d5b1d3dd5de14221a45a83a94687c88804ed365deaaab19d9186cca760d51c0dacb8fef9d95d6d36922c74d0", 0x9d}, {&(0x7f0000000580)="a5911d6cac35d45ed66976f45bc4f519f5de19d0cc01d1b79657077ae2166f594eb44bc1ccb9fe7927e2d4a1df9eaa57e8c1251e43f30d9cbd0428aaef2e4659fce2aeb4fd39d11075034a03978719b0a0e090ef5e8b48cb603f069b938a6c3c259f33682b93d90a38df01edea4a4980d5c34c25421507299a1229c409e88e70663e28b5c926747314f3", 0x8a}, {&(0x7f0000000640)="7d2bc774b06accd34f5b65416181ba1e53b3182172cdf512452924412213dde1791e2dc4bfad6232985f731d87e3be85987a61537ade0275cc239ff9aabe1ba20cea6a0fe433489305673888b5bff17c51f5ad59e67b02d008f793bfdac6f0cf9dae342eecf3eafe92d8b4005b2b06cf62af4ec9014b79da10a954694d26fa8967e1819139931fcefda70b4ac921a1243d6d9c938047b1f52453b130e73d542ac56d5f77a2c70806446344c2ee5f267f45ff1c315f4618bd0cb1caf18bd8f8bac3ecb0904f6efcba8ed32c5a98f562a138c60084f29d265fd680ba16a23f0d09e06746f2e22acdcb208bd8f7c76ac7c20f8653", 0xf3}, {&(0x7f0000000740)="b7962e9c6b2bbafd9f120885caf932f07fb050380d28d88191789b22da2c641c8cdb083df7ac4529fd3f8fbc44cba3983011693c289f6cf96f042f1657ba24ae39b77f8189ba75975cefc4d6a92a9215e1758fffebc94cd9cf8e0ec4fe1cb48424905543a9c4b274a55c10ba96e72a4f45fb739660e18cdf68bd245bad90bb5d7d7eab906213dd3e52fd8d93138085f25cd2a0af1c68a70b448bb8418e936a2505c8ec0ca2b0c8a8ced1fdf6fd724554250ed76774558a6be79ab28df56364d825f2b0f600d549bb078754620dc8e95d40f11b7ae85c", 0xd6}], 0x6, 0x1c5, 0x3ff) [ 543.334715] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 543.337288] EXT4-fs (loop5): group descriptors corrupted! 04:23:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000080)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='.\x00', &(0x7f00000000c0), &(0x7f0000000280)={0x0, 0xfb, 0xff, 0x4, 0xc8, "01d90f961897909207f35b5326306c7c", "673b5b3e7337f14781aef92a3ff17c8bf17f40573181df62632311ce5c5c9b2fe4c1dd9abeb8fa80c078faf4ab7d7b32ae65f45b7900b188428225b545d71d0dfcbdc5f321f8d3a19c1680f4dfb296500052402013df5c5ffc22a882468013817ac243dd0adeb0b43827acfb73e56518c9b47878bac291c80016634c10b360e3006470076760657a29f7b8cdc2e575ade72192d0dcd4b6ae851b8e8e76974d303edef7b7b058c5c18242df3585b1e6708c52d9660bed1896d858b6d2b0dda7ca2d3f3c83755ff5ced72289b4498a82fff47ff60924c829fce4e4ca46fa3bb9e3b84f466b672681fd2c95"}, 0xff, 0x3) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x1e, 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(0xffffffffffffffff, 0xc058671e, &(0x7f0000000680)={{'\x00', 0x3}, {0x7}, 0x0, 0x0, 0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)="b9213a0ec3022583076b37c01085d3bd9d4e0921bbdbf9f8055465457db5e78615b9c6a0a729afcc48905035ffa7ec3abdf99d7671810c672605bd6512f1328b45918808518de687720ef9e01d541602b2576cec4fcfbe4c30d75d3ff0", 0x5d, 0x0, &(0x7f0000000440)={0x2, 0x128, {0x0, 0xc, 0x7e, "a65d4c51b7f8a86dc10b49a268fa3c4a7bca31b28ebdc60e1f703d1345c0f330b1af3769404bdcb37478dba22a05b105b95713670bbbeba5426ef1741ca8b0ac63cbc33f2c086f23238e914d94d91812ea59d914195d999fd11124ddb0e31913fafe34489b3c3aa053a397d6e49e4059ba0e1eb305bd1cf04a0b12a4e3ac", 0x9d, "7734293e7bf932a2b2ff33674669740f2ed7512b43d95d4f6bd94fe9e5b9178c5c589eb55f91203aeb8c59ac2a0c67a76bd8fd0783837a335225161571c36fe4d7f965ef9d2a1c9c4903a251f23cb24946ca08dd185527808c91891c741b8eb1b22e1002772fa5eb3a4d718aba7b3013f59dfc3a006ded28b8d50cc39672910b9627e82794735f864cf7b60d4ae4372bae1a4099ae97de4c1975bd4f81"}, 0xdc, "00d6bdcdf3486d5b13636da23c0ffeeb48a6480a29bf723746cb2a7f16dce83e945d337b6430159357e5e222657dd6251f0d79b186397cb204d5ba3e64747d134d76e7999041c8751debe7302867731a3b3a7b7b45406f4b22bb2f26d91b2ac4a607dfddbb5bd227cdf3e912bc9b7fb6c9f31bc04c1025a0ed6646c8af608791e3d50e6fcd5dc2dd43cad9e76a46f803812e6c1f63fd5db2292911ceb2d83069b753f8f376b3074e4a661a6afac27e97a237e86675d852df37a9ac8ed3f9f244bb03908763db33e15ab04c5f550d77ed016d9fa1952c662442fecbaf"}, 0x210}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f0000000040)={0x1, 0x3, 0x2}) ioctl$INCFS_IOC_CREATE_FILE(0xffffffffffffffff, 0xc058671e, &(0x7f0000000340)={{}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d9}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_freezer_state(r2, &(0x7f0000000080), 0x2, 0x0) sendfile(r3, r2, 0x0, 0x4000007ffffffc) [ 543.370675] EXT4-fs error (device loop7): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.7: invalid block [ 543.374831] EXT4-fs (loop7): get root inode failed [ 543.375998] EXT4-fs (loop7): mount failed [ 543.377397] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 543.400237] EXT4-fs (loop3): warning: mounting fs with errors, running e2fsck is recommended [ 543.419877] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=e842c01c, mo2=0002] 04:23:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 543.442060] System zones: 0-7 [ 543.467991] EXT4-fs (loop3): Errors on filesystem, clearing orphan list. [ 543.467991] [ 543.470049] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 04:23:44 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 543.596265] loop5: detected capacity change from 0 to 262144 [ 543.628406] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 543.630734] EXT4-fs (loop5): group descriptors corrupted! [ 543.635193] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35144 sclass=netlink_route_socket pid=8681 comm=syz-executor.0 [ 543.656279] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=34247 sclass=netlink_route_socket pid=8681 comm=syz-executor.0 [ 543.671072] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53893 sclass=netlink_route_socket pid=8681 comm=syz-executor.0 [ 543.687102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53481 sclass=netlink_route_socket pid=8681 comm=syz-executor.0 [ 543.789121] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35656 sclass=netlink_route_socket pid=8681 comm=syz-executor.0 [ 543.816046] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8681 comm=syz-executor.0 [ 543.838536] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=33608 sclass=netlink_route_socket pid=8681 comm=syz-executor.0 [ 543.849703] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35140 sclass=netlink_route_socket pid=8681 comm=syz-executor.0 [ 543.894520] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=51 sclass=netlink_route_socket pid=8681 comm=syz-executor.0 [ 543.897285] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=64 sclass=netlink_route_socket pid=8681 comm=syz-executor.0 [ 560.186106] loop7: detected capacity change from 0 to 262144 04:24:00 executing program 6: clock_adjtime(0x3, &(0x7f0000000100)={0x8733, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x200000000000000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}) clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xffffffffffffffc0, 0x4, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x2, 0x8, 0x101, 0x7, 0x4, 0x20, 0x227}, 0x1c) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000000)="19a72258db8799f3840d9debc2e602cb", 0x10) 04:24:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:24:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:24:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447c", 0x24, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:00 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:24:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc0615", 0x59, 0x4200}], 0x0, &(0x7f0000013a00)) [ 560.203127] loop3: detected capacity change from 0 to 262144 04:24:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 560.226214] EXT4-fs error (device loop7): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.7: invalid block [ 560.229342] EXT4-fs (loop7): get root inode failed [ 560.230098] EXT4-fs (loop7): mount failed [ 560.247971] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 560.250864] loop4: detected capacity change from 0 to 135266304 [ 560.252172] EXT4-fs (loop3): warning: mounting fs with errors, running e2fsck is recommended [ 560.261460] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=e842c01c, mo2=0002] [ 560.263815] loop5: detected capacity change from 0 to 262144 [ 560.269206] System zones: 0-7 [ 560.290479] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 560.292030] EXT4-fs (loop5): group descriptors corrupted! 04:24:02 executing program 6: clock_adjtime(0x3, &(0x7f0000000100)={0x8733, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x200000000000000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}) clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xffffffffffffffc0, 0x4, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x2, 0x8, 0x101, 0x7, 0x4, 0x20, 0x227}, 0x1c) socket$packet(0x11, 0x2, 0x300) [ 560.304957] EXT4-fs (loop3): Errors on filesystem, clearing orphan list. [ 560.304957] [ 560.306965] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 04:24:02 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc0615", 0x59, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7", 0x2a, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:04 executing program 0: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000000)="19a72258db8799f3840d9debc2e602cb", 0x10) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)={0x2, 0x1, 0x1, 0x4, 0x1, [{0xc6b5, 0x10001, 0x400, '\x00', 0x1000}]}) [ 560.401246] loop3: detected capacity change from 0 to 262144 04:24:04 executing program 6: clock_adjtime(0x3, &(0x7f0000000100)={0x8733, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x200000000000000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}) clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xffffffffffffffc0, 0x4, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x2, 0x8, 0x101, 0x7, 0x4, 0x20, 0x227}, 0x1c) [ 560.440498] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 51152: comm syz-executor.3: invalid block [ 560.442266] EXT4-fs (loop3): get root inode failed [ 560.442971] EXT4-fs (loop3): mount failed [ 560.453939] loop7: detected capacity change from 0 to 262144 04:24:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300", 0x6, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef", 0x25, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 560.534751] EXT4-fs error (device loop7): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.7: invalid block [ 560.537728] EXT4-fs (loop7): get root inode failed [ 560.538359] EXT4-fs (loop7): mount failed [ 560.548401] loop5: detected capacity change from 0 to 262144 04:24:07 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:24:07 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc0615", 0x59, 0x4200}], 0x0, &(0x7f0000013a00)) [ 560.616631] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 560.618774] EXT4-fs (loop5): group descriptors corrupted! [ 560.624187] loop3: detected capacity change from 0 to 262144 [ 560.651189] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 560.653080] EXT4-fs (loop3): warning: mounting fs with errors, running e2fsck is recommended [ 560.654751] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=e842c01c, mo2=0002] [ 560.655771] System zones: 0-7 [ 560.657827] EXT4-fs (loop3): Errors on filesystem, clearing orphan list. [ 560.657827] [ 560.658861] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 560.725146] loop7: detected capacity change from 0 to 262144 [ 560.784521] EXT4-fs error (device loop7): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.7: invalid block [ 560.796023] EXT4-fs (loop7): get root inode failed [ 560.797619] EXT4-fs (loop7): mount failed 04:24:21 executing program 6: clock_adjtime(0x3, &(0x7f0000000100)={0x8733, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x200000000000000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}) clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xffffffffffffffc0, 0x4, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:24:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:24:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:24:21 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a", 0x68, 0x4200}], 0x0, &(0x7f0000013a00)) [ 575.197398] loop3: detected capacity change from 0 to 262144 [ 575.215154] loop5: detected capacity change from 0 to 262144 [ 575.222685] loop7: detected capacity change from 0 to 262144 04:24:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300", 0x6, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef", 0x25, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:21 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:24:21 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000001540), 0x8000000000000004, 0x109080) ioctl$SG_IO(r0, 0x2285, &(0x7f00000014c0)={0x53, 0xfffffffffffffffc, 0x4b, 0xb, @buffer={0x0, 0x83, &(0x7f0000000380)=""/131}, &(0x7f0000000440)="05e3088c532925aff99123a00ab4476cc0db5869ae43835eacd97f843afc26d673667a9f7fc7dea94abea082350e382750fe8e395d92b71abe4b99859dbf24aee277cf5a83c4f54f47ac6f", &(0x7f00000004c0)=""/4096, 0x0, 0x0, 0x2, &(0x7f0000000240)}) ioctl$SG_IO(r0, 0x2203, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f00000000c0)=""/151, 0x97}, {&(0x7f0000000040)=""/47, 0x2f}, {&(0x7f0000000180)=""/144, 0x90}, {&(0x7f0000000240)}], 0x5) [ 575.230303] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 575.232336] EXT4-fs (loop3): warning: mounting fs with errors, running e2fsck is recommended 04:24:23 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xffffffffffffffc0, 0x4, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) [ 575.233799] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=e842c01c, mo2=0002] [ 575.235406] System zones: 0-7 [ 575.246915] EXT4-fs error (device loop7): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.7: invalid block [ 575.248805] EXT4-fs (loop7): get root inode failed [ 575.249516] EXT4-fs (loop7): mount failed [ 575.256107] EXT4-fs (loop3): Errors on filesystem, clearing orphan list. [ 575.256107] [ 575.257351] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 575.275486] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 575.277665] EXT4-fs (loop5): group descriptors corrupted! [ 575.301804] FAT-fs (loop4): bogus number of reserved sectors [ 575.303477] FAT-fs (loop4): Can't find a valid FAT filesystem 04:24:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef", 0x25, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:25 executing program 0: syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000000140)="ed41000000040000ddf4655fddf443c59692000000000400207467ff993e05f793082a", 0x23, 0x1500}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="001a1213f8b83adede7a79648682f8afe3ea5c2475306b280457466e1f91b82d3be7c42e39001458d831f622b6c786cecca4f863c7c3c732297807669038ad6e5d5b23dd5b193945aea42d058ea8f5fda2671b66bea9d17b82d095e7e4c7c6c3f0f6ac37efa958032fa2d70a4a415e675466b6379169d4c2bd79d5658bb6470307deb6a3deae38417d9dee10b74a606a0276635b33c044d601a5f3e85b14c0792fb75a5ab6587534fff7"]) 04:24:25 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a", 0x68, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:25 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:24:25 executing program 6: clock_adjtime(0x0, 0x0) 04:24:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300", 0x6, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 575.491855] loop7: detected capacity change from 0 to 262144 [ 575.551238] loop5: detected capacity change from 0 to 262144 [ 575.560346] EXT4-fs error (device loop7): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.7: invalid block [ 575.563523] EXT4-fs (loop7): get root inode failed [ 575.564747] EXT4-fs (loop7): mount failed [ 575.602692] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 575.603795] EXT4-fs (loop5): group descriptors corrupted! 04:24:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:24:39 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:24:39 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$sock(r0, &(0x7f00000070c0)=[{{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f00000001c0)="eef12aa3cdea0e64b0b2d028c15519d9fd7f823df4b269e9b8f79051576c7e724cfea3b32c8bf635f123353ddbf6e9aee4cb42a2f1b21e9f6a7943fbf459b832e8245aa95dc78f6fe6e6e11ff5b0b2095bc3d34948e0285938254ffe1055513de8ecf6", 0x63}, {&(0x7f0000000000)="b92e4ac428f455ad37ad062e0b320532ff715fd9a643f208c72f9c6cba74583a5f4a9f32723e97a1bc3474b5", 0x2c}, {&(0x7f00000003c0)="652dbcc324386c5e9b8325c66da9cba1242b3043d4722aa19e503e09699308d320fe485ac91027b8dc8883d7885c3d6a46ee3546ac572aa919cc023798cd476a4e18bd4ce92ef716d2a506b3c45c77d6165c89b6876267701301b195d879dfd9d347c144c0893f2360d3c2cf42b77cd05df2d56b0d6cd6c937b15ef5129234581456cf40091b7f6b44b3c5b37d03bd3a1a89dc4f32960f1936", 0x99}, {&(0x7f0000000280)="ed80d9c165b246337f5c92d09211a8f97e50e0611561001639d3c6c0eaa9ffdf57ab0700fefbd359a59beacf779d34b207", 0x31}, {&(0x7f00000002c0)="81e19d27e8c9", 0x6}, {&(0x7f0000000480)="a2b2a915420971fe69598e6e149e13a97ceb014ddaf4a86406cee06f5afc43343c2837002206fadffc7af6bd4d84519059f713532f438120e8256ba60e9491d4ccee4ecbc5f039c1b6e35e7ebc3659da9f6596e19b892b8ae78417276d098a809f50b6010164a4fa7e9ba3a3087a0705330547e53dfa4cf9f60ebaee514a5dd47b7669ac3fde486bfd40507c4a525d1c4bf15beedca981b1de9103a228dda5d998652ca30575f6a5c27d8bb21073b580da8f0c2e530fd246250e19a0731ef6cea0e685f75304632e02e5f10fabc5c77390cd20a62180d15cf454e0", 0xdb}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="1fd7291fa540a2ec7f1e17c1b221f9c64dcfa025f593b7f82e829fd122880e0cdf17aaf6edd4bbfed5", 0x29}], 0x8, &(0x7f0000001640)}}, {{&(0x7f0000001680)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x2, 0x1, 0x3}}, 0x80, &(0x7f0000002c40)=[{&(0x7f0000001700)="2f58c382cba2cdf7d9678ed360f85de7cc612b5331a841b358a873742fa57ef4abc5c96e3a8a9cac069e7e169b07dfab0ce9a5ea2fc9adbb80e7e2bf", 0x3c}, {&(0x7f0000001740)="708df2df5be5e69ca8bda7f4ce74ffba10c1c095631b1a3fa66554ac1d0d328fa0f122bf7680cef02bb3b0aaa0451258234424c4af93383fffaceb0d599f56014e665e3f6e719f95d2d93ca93dd98d6bb0449c743036ca0a20255cd752474fa80eec31a98d42ff695879fe4285f44d798506a670668592220cfe", 0x7a}, {&(0x7f00000017c0)="02af0020d63adfb4cca7a502e578a2dffcfa6b6d43aa40cf1fee70c8dda62178d6d287d945eda92f528ac48fb0cf1e4c21a7ab640302da79052fefca1d85e22131db8bf9f05de477c9f80f75653ebb4c8bcea2f8462dbb1a3122de0e9e20bb06db53224efb667e6e3aa9887e84e8522c9f33f00ed02e5610bae1e401531137f9e783450215d89f94007716", 0x8b}, {&(0x7f0000001880)="a1da9f52bebb7b6227205a57f0d90de0138683a4853fe94c38a9750208d1679a46cdc60d9ba8e6e839f4bf64c255fb67d0db53e312c8a461fe0d4e054437f7dd447a56c962325fa1bd20dbe280c2863e63626779f1900f9dbc877499f977e92a3f4237ac0f7c91171e2bc67583553b5d79cad49cf967cf74c63c86ae34c455854d26be0bee29ee12e4d917372c516af4c7082d66c7e9a2bb1248e60165efedcdf9efba6e8421869be765acb1f51bfd920997c87eb4fb93ab8549be98af237e39a79acf7baeb518c786041d099afcf483557dfeacc76945", 0xd7}, {&(0x7f0000001980)="0fc4dad63c20bf8d2964622f2e1311745c0f658653db6a80221a5019074c81878cdd681143e445a7dd5c7cb8a4aec16fc7441c659379cb3be1678eed143ee4f2c3274fc9409bb4737fe18b52a115a06952b6b66079db0f76724401476db056747e5b11c8f37a7e6ce2328e1eb1494b2dd6fcc0c51fda9cc861d03af0253ffda207778a3e6a7a0dd762228ab251a400d7a2b4405ecc95484c74c64d009e518e9ff9b7a03705e6fdbfdc2dbf3d8b94245974c5ade1af62deed7cc05a54882e805678ac0a058d1432a19698170c8617eb4812f1218a4cc41f403e637c715230282964", 0xe1}, {&(0x7f0000001a80)="1a4018fee44203bba104110adbe0a5ad78edc4a94acf9b85eff77b53acc20c8074976252776a1a0a1386e5eccf808db77d5d98965fb03da71cd84264ff219f155672288c28ce7f531be2c586b67ca886962606768268556c1589258a67d6b981a34fc65709845fd51acf581515a136", 0x6f}, {&(0x7f0000001b00)="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", 0xfc}, {&(0x7f0000001c00)="f9ccc404d0", 0x5}, {&(0x7f0000001c40)="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", 0x1000}], 0x9, &(0x7f0000002d00)=[@mark={{0x14, 0x1, 0x24, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}], 0x30}}, {{&(0x7f0000002d40)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002dc0)="a1743acd4e1364529a24aa230fbf4f2c6d8824184a01154d2a315200ea81e814de4d38d7b8028dbbadfc16758a180439e035d7d684033bc930b112cba1514520e2f92eeb9d9934d02595e4a8661dc31d4b83829c7e8701d3c67172aa24160d7f2221449b4d07dcbce2b8ced96f7736ee9fcd7ef03c9a8e1a3bd40bae82e0747ce834166c091346355b0007e9621e685a3eb84374c7482a94e42c84403fa33b4b4ba0b18290a66d8db7e98512cc03b7ad49fed273de189dab59fea9de2185d0427c71", 0xc2}, {&(0x7f0000002ec0)="8d", 0x1}], 0x2}}, {{&(0x7f0000002f40)=@nl=@kern={0x10, 0x0, 0x0, 0x40000000}, 0x80, &(0x7f0000003040)=[{&(0x7f0000002fc0)="a01c67b88e60d1e4014a42216dd905ce468f9f343cba5f1955c17cc2f06c9146327d70a3c1b2b2", 0x27}, {&(0x7f0000003000)="b3fae73548c237c727cc067c13", 0xd}], 0x2, &(0x7f0000003080)=[@txtime={{0x18, 0x1, 0x3d, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x400}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x101}}, @mark={{0x14, 0x1, 0x24, 0xa59300}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x1b}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}], 0xc0}}, {{&(0x7f0000003140)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x3, 0x3}}, 0x80, &(0x7f00000044c0)=[{&(0x7f00000031c0)="e1bb6df408dcc163ad53ab17b0f50e40ec1baff722a512d1c61cc2a3d16817a3cb79d48ea33969076c69dfb490164ec4bd58cd913481fb7dc09f3fd045315a7fcf619457fb282f86d7cd69300443902c895ee19b7b7f06d003bfd495ea268b2c817c9cf03223131f1b09de28c06a7d814a4ab076aece0336b75a866f992edd48973b4cd909db044e41070e364989afd33c3dadd926adb237439f1af2de94b875f2e6bf96cb76713a5d67abcd2dd6e365e19999f2ef4f53094899c1fa4b4ca05eec9d9b712ebb959e23b7a30b5d2ee6f78d9512be08f0bbbfeafee897059ecb3786", 0xe1}, {&(0x7f00000032c0)="fa3497abf53bd5369acbe9bbde21a4ccde9743ecd23158ae39c5ca66186ef09e83d146ffd8eb35c969ff2b341ab8747081c489be7a22dec41bead64418c3a0b232ebd6c3e492be13e8f14a11d2b7176ec3735ffeec14cffc77ad61d2475ad7549308486df06bc356dec4547cc36aaf9b33b80be755b13ce167f3e35eab7a9a7c2996bbdadbb141b509660ebf43ee86af36687f1327046cfd901ba936c5be12f9a042b32fbaf79a29abe4797ef919cbf3479693eed454d412eef7d3ada5af1cc577d106b1e121c0a0c22010", 0xcb}, {&(0x7f00000033c0)="e74ccc3d0dfbffb10d2119602c6ba00939b55aa8ddb4db2c9a0c3c6cba7a63bbe32b1162f84ffd3d0c64881f1e5289d3c78f2fabb16e72181af54bff86007f495edbf3c63a13bf6119b590d47bb56a7bdaa999b16a5238f793282be191205ce6947f093344983e75229536e3c75b09ab80d5f196c4868e5a9fdd0488fbd5", 0x7e}, {&(0x7f0000003440)="04efa6aad9d57234c75c2f959e678b305c178b9b6d48dafe685a55a1b778e4c85b70608f33b837ecada3c5a63638315eb878f51bb93b00c8edd67533d07a5a72bc213c6881f69d55131e210ad939187c29e89f6feb7d06b9fc13dee0668e925047", 0x61}, {&(0x7f00000034c0)="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", 0x1000}], 0x5}}, {{&(0x7f0000004540)=@ax25={{0x3, @bcast, 0x5}, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x80, &(0x7f0000004640)=[{&(0x7f00000045c0)="e9b37b9975d4f1833f01de187165e3a40222aca69c5e7af4b49cbdb776701f81ddb9fb55505b239ae9f7db7ce76291f92398d28aa7c808086ee2b9e4d407447986d95e8c4dc3e5de2ebf84a79d5056ec1d4632aff8a0638a25bc94dfa7086ad8605d", 0x62}], 0x1, &(0x7f0000004680)=[@txtime={{0x18, 0x1, 0x3d, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x36}}], 0x48}}, {{&(0x7f0000004700)=@x25, 0x80, &(0x7f0000006880)=[{&(0x7f0000004780)="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", 0x1000}, {&(0x7f0000005780)="890e11b5e27ba629643a80ae29dffc354409b9b3cae8d189fa22fb19dde7046991e7fd4edd8f1356b786a5a495cf6c2005ad92f2487559f573c0b79ebd8df92005b1946c1b0f13a4bbf9fc514a4599f464400daf50abc6cb6b030592324255989646000754390c43cc1e26972ddc066aea5df6da1ebc1595612e6ca8d169767b5184a6cc7068e7e25fd9d36aad8dec6614b8dd31daccaebd23e931711a80398bfb589a2ae41ad04edc891c17c5297e64782839feadfa2a577480489cf3818396e4fd9979b80955d9521635ffc52e2b4a9402c2ec564ac30fc7932ad8fecd322d1a6e3ef23b", 0xe5}, {&(0x7f0000005880)="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", 0x1000}], 0x3, &(0x7f00000068c0)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x3f}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x7f}}], 0x60}}, {{&(0x7f0000006940)=@hci={0x1f, 0x4, 0x3}, 0x80, &(0x7f0000006fc0)=[{&(0x7f00000069c0)="49742dc3ea6faaeeda98814978a0dc4cc43cadb5afb4b6210c12244f471969ff06bf4f3c7cafd792eebb9ca2845e9873e114d75faeae42e69667ce674a2e34c99bf4e3169549a7edf477c5ab911aa6ed6848fecb66a9ea43bc999dfa1eaec25e5fbee71ad4b15b7855db28fa3efcf0fbcbc1d3f4b081f5aa63d2a6d55cd53fb2185e2c580f623691dc8364ca1eea164ac37e4f973d06ee87d266a19da9bcf2fc91b677d92946ae01f3dee83c7da96d37f276803bdf7e2d96e3a00c8830cf503963fb4f825ec2", 0xc6}, {&(0x7f0000006ac0)="b7bad3646b66100a0f613c9bafd0e4306cb60f7d1f485a4e5c02608f8ccbd6273b361caa8e0cc46971d0e338861d3038ec36df4a8cddc62ec70c960f2d5cc7fcef60cbc857b62d2758f71bb1498c7f466f6fc33b36ea8a83ca349b669629936f508c3f4d66a997f7cabf17ae747da77467ba153e6d055eaa171a30d3f4fd0db2e4f54968d4fa4fdb6ca877cedf13a2ecd7f6e2", 0x93}, {&(0x7f0000006b80)="ad2c8500", 0x4}, {&(0x7f0000006bc0)="289c127f1e0c66e934d66c2c0527f0e70b617eb9aee9d183febbcb7dad396db736ff7fd2b07ce9943de626c44c5fe42870b524b11cc32358e7ce8450875f7b0e6608e07cbb04016d3d637276021be62156b582720cfdb8e076a4988591e2a86986f0c2b71ec3080e112c67d590daae5701d95b7b36b17ab55ca86bc330d58017619937370e3389e2356d7c6d2b76b1a6685e5218fffeb850b0a34f2a723fe1a2db93ea28a5f6c1ddf2842a1c317d34eac6782bd05d899d209e66ba4bb0e6100da95c33f3c34486580f58f245eb25d536ba4ad7cccecbdcbc17250152795b6015b40e8b7ae631d044b46b3f01f143225669c5f1cbc91a62", 0xf7}, {&(0x7f0000006cc0)="c4083092e778ceee3b6d216e82589dc9e9d93baf28cf1935af37ce6625cfe93b95bb6982d6c77afa1c1a5c33476af6e0d0a3dd5ce7b09dcd674d39fbab1e5dd9db09db", 0x43}, {&(0x7f0000006d40)="16652de95daedec9464f17821ced08665222a17d77dab3c3cc9d215a91d7cd419aac90aa6d4bf9a8db42666b7a42649e14eac2688c7b9848c0298a942da03de5e9dd5cbf45559c91001f26ba5b6edc6f9e3400d8d5b7ef7cdec724f44654bd60a75b3c3b547ca82687a21ad06552bd0f38bf33f6b1d6c61216557f7a9e8f4033765a2fe6a3c2f40430a9751b", 0x8c}, {&(0x7f0000006e00)="e1f2d9c9ea034063cfb35db4f5a57ab2a00ce2850de87859e9808196d135b1e27e46ecfbc25a31bead0be3324c9701707f1e66b4529791721915c19cbc24e2dc74f8155dab305ca56de321941e75a146526288863b771cccce67e00555d217f7546fef61d7309aa14dc8a0f8ead3b151e5bd50b25c97a2cfa56d38468480a9c1bc2e023c23cbd9ffe37672d518f635e5310364a2c08a", 0x96}, {&(0x7f0000006ec0)="9939c9268181bfd9a318653f943ecef864a7bf14a5e8f99b9e94bc73e5760fd62fe6eed7f312c9ad9b0d8f798368ae8460846fad19d77c42777eb1bbddd6252ddf513e26102c7613152ace49380c5c1ecb1f28acb20ebb44fffb7652bab9e4d73e7e2b0f554de7410cd1d566981e7751ac9b6ca6f10863f87a2911d71d8d23983c30cbe06c56211aff5ffa850ba1c8098cd0ab08111753bd113015a1b81c0fb13236ff64c9cbec37f74a3712dc34b1107fd00d4ca234ef85d12b0821efb7b4b5c5d5667f444ad7009c3955540653d8e4f368327eb1332dab63fa6a480900df55b907a1ea2ef608bb", 0xe8}], 0x8, &(0x7f0000007040)=[@txtime={{0x18, 0x1, 0x3d, 0x9}}, @mark={{0x14, 0x1, 0x24, 0xc1}}, @mark={{0x14, 0x1, 0x24, 0x94d4}}, @txtime={{0x18, 0x1, 0x3d, 0x94cc}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0x78}}], 0x8, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x52, 0x101}, 0x14}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r5, &(0x7f0000000300)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r3, @ANYRESOCT=r4, @ANYRESDEC, @ANYRES64=r2, @ANYBLOB="ae91e1", @ANYRES64=r3, @ANYBLOB="aaf48e1510ec286e514cdba86a8facb6386aeb5904da20ef7fbfe14ff55470d43147b4eb0ee118f78bd285b51e854d594071f2400878"], 0xfdef) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) 04:24:39 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a", 0x68, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2", 0x28, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:39 executing program 6: clock_adjtime(0x0, 0x0) 04:24:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 588.997388] loop7: detected capacity change from 0 to 262144 [ 589.010793] loop3: detected capacity change from 0 to 262144 [ 589.016593] loop5: detected capacity change from 0 to 262144 [ 589.024011] FAT-fs (loop4): bogus number of reserved sectors [ 589.025609] FAT-fs (loop4): Can't find a valid FAT filesystem 04:24:39 executing program 6: clock_adjtime(0x0, 0x0) [ 589.044287] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 589.046710] EXT4-fs (loop3): warning: mounting fs with errors, running e2fsck is recommended [ 589.049366] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=e842c01c, mo2=0002] [ 589.051517] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extra_isize 27255 (inode size 512) [ 589.054368] System zones: 0-7 [ 589.055121] EXT4-fs (loop5): get root inode failed [ 589.055179] EXT4-fs error (device loop7): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.7: invalid block [ 589.055900] EXT4-fs (loop5): mount failed [ 589.058824] EXT4-fs (loop7): get root inode failed [ 589.060212] EXT4-fs (loop7): mount failed [ 589.079678] EXT4-fs (loop3): Errors on filesystem, clearing orphan list. [ 589.079678] [ 589.080906] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 04:24:39 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca", 0x6f, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a", 0x68, 0x4200}], 0x0, &(0x7f0000013a00)) [ 589.198500] loop7: detected capacity change from 0 to 262144 [ 589.243929] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 2266917008 [ 589.249990] EXT4-fs (loop7): get root inode failed [ 589.251242] EXT4-fs (loop7): mount failed 04:24:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:24:53 executing program 0: unlink(&(0x7f0000000000)='./file0\x00') r0 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000004, 0x4010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r0, &(0x7f00000000c0)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {0xe0}, 0x1}, 0x80000000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) io_uring_setup(0x3a4e, &(0x7f0000000140)={0x0, 0xec72, 0x4, 0x1, 0x220, 0x0, r1}) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 04:24:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:24:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a", 0x68, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:53 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x0, 0xffffffffffffffc0, 0x4, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:24:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2", 0x28, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:53 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:24:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 602.962509] loop5: detected capacity change from 0 to 262144 [ 602.967276] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 602.968656] EXT4-fs (loop5): group descriptors corrupted! [ 602.981897] loop3: detected capacity change from 0 to 262144 04:24:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:53 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x0, 0xffffffffffffffc0, 0x4, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) [ 603.071361] loop7: detected capacity change from 0 to 262144 [ 603.074836] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 603.078891] FAT-fs (loop4): bogus number of reserved sectors [ 603.079831] FAT-fs (loop4): Can't find a valid FAT filesystem [ 603.081067] EXT4-fs (loop3): warning: mounting fs with errors, running e2fsck is recommended [ 603.084287] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=e842c01c, mo2=0002] [ 603.088685] System zones: 0-7 [ 603.088826] loop5: detected capacity change from 0 to 262144 [ 603.101003] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 603.102393] EXT4-fs (loop5): group descriptors corrupted! [ 603.112649] EXT4-fs (loop3): Errors on filesystem, clearing orphan list. [ 603.112649] [ 603.114605] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 603.121912] EXT4-fs error (device loop7): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.7: invalid block 04:24:53 executing program 0: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x80010, 0xffffffffffffffff, 0x0) fork() [ 603.126288] EXT4-fs (loop7): get root inode failed [ 603.127511] EXT4-fs (loop7): mount failed 04:24:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(0xffffffffffffffff, 0x6, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:24:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:24:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a", 0x68, 0x4200}], 0x0, &(0x7f0000013a00)) [ 603.275947] loop7: detected capacity change from 0 to 262144 04:24:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(0xffffffffffffffff, 0x6, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 603.301254] EXT4-fs error (device loop7): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.7: invalid block [ 603.302748] EXT4-fs (loop7): get root inode failed [ 603.303313] EXT4-fs (loop7): mount failed 04:24:53 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:24:53 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x0, 0xffffffffffffffc0, 0x4, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:24:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2", 0x28, 0x4200}], 0x0, &(0x7f0000013a00)) 04:25:09 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 618.578312] loop5: detected capacity change from 0 to 262144 04:25:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:25:09 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x4, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:25:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:25:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(0xffffffffffffffff, 0x6, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:25:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:25:09 executing program 0: listen(0xffffffffffffffff, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000001c0), 0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@abs={0x1}, 0x2) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$netlink(0x10, 0x3, 0x6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000140)=ANY=[@ANYBLOB="010080006e00000018000000", @ANYRES32=r2, @ANYBLOB='\x00'/16]) setsockopt$inet6_int(r1, 0x29, 0x40, &(0x7f0000000100), 0xfe0f) bind(r1, &(0x7f0000000040)=@sco, 0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)={0x48, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@nested={0x14, 0x11, 0x0, 0x1, [@generic="809801a7b0c7dba09475f251c743092f"]}, @nested={0x20, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd=r3}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@remote}]}]}, 0x48}}, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r4, 0x107, 0x1, &(0x7f0000000000)="19a72258db8799f3840d9debc2e602cb", 0x10) getsockopt$IP_VS_SO_GET_VERSION(r4, 0x0, 0x480, &(0x7f00000000c0), &(0x7f0000000180)=0x40) close_range(r1, r1, 0x0) 04:25:09 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a", 0x68, 0x4200}], 0x0, &(0x7f0000013a00)) [ 618.641530] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 618.643628] EXT4-fs (loop5): group descriptors corrupted! [ 618.645739] loop3: detected capacity change from 0 to 262144 [ 618.682189] loop7: detected capacity change from 0 to 262144 [ 618.712960] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 618.717087] EXT4-fs (loop3): get root inode failed [ 618.718398] EXT4-fs (loop3): mount failed [ 618.728267] EXT4-fs error (device loop7): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.7: invalid block [ 618.732149] EXT4-fs (loop7): get root inode failed [ 618.733394] EXT4-fs (loop7): mount failed 04:25:11 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:25:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:25:13 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87", 0x6c, 0x4200}], 0x0, &(0x7f0000013a00)) 04:25:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2", 0x28, 0x4200}], 0x0, &(0x7f0000013a00)) 04:25:13 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) [ 618.959970] loop5: detected capacity change from 0 to 262144 04:25:13 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d41", 0x34, 0xb800}], 0x0, &(0x7f0000000180)) r0 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x81f2, 0x2002) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f00000027c0)={{0xd55, 0xfffffc00}, 0x100, './file0/file0\x00'}) openat(r0, &(0x7f0000002700)='./file0\x00', 0x101000, 0x4) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) r2 = signalfd4(r0, &(0x7f0000002740)={[0x6b418d5f]}, 0x8, 0xc0800) openat(r2, &(0x7f0000002780)='./file0\x00', 0x1, 0x0) [ 618.978270] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 618.980294] EXT4-fs (loop5): group descriptors corrupted! syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x9, &(0x7f0000002540)=[{&(0x7f00000000c0)="aded97ce7fb3098a9f2fb3b287a490e7fecefba1257fc664046ad2c91c6a7fdc1694b3064a033f839930578f", 0x2c, 0x9}, {&(0x7f0000000240)="200558909d3f6bce2a0ca02141a017ec3eab01e64a1ee18cbe0776b44aaf49b7269b849ade04a13d542a6c16a9d393179670a1a586bca02ff97a2d944b3d98e1e4de0aefd13baa75393f2be6c0eaab6a", 0x50, 0x700}, {&(0x7f0000000140)="9556d9cc34cbc4e5b2caaf", 0xb, 0x4}, {&(0x7f00000002c0)="ee11fb977a931b3a45a637cb1e96a8e0c075d4f595695887766e09d07d0635324704ba3a16a7791124286355bbb3337d72cc5cb16a3b9fad97df2c4220332a22a7fac2d5570117f335803058212f93f12bd2766cb9927f04f24af7920b7c02", 0x5f, 0xe043}, {&(0x7f0000000340)="739603e78f08418aae1fcdd1a1c9cc7da069c69a9c56ec28b24c8825aa48fe97faa03fa17e4a5003b2f31c4d178b592294f4ab50a392498df8d35dd230ebbc30aa6f604624cbfde8adc25c1b6ef04ffebc1f8c174561923ba99b3c2b3ea516e29ee8de959c39f70386886d201c2315122fc8beb2f5f06357ab41bf9757af", 0x7e, 0x2}, {&(0x7f00000003c0)="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", 0x1000, 0x1ff}, {&(0x7f00000013c0)="cddf4c3c78b9051a50173386f1cc5506db984ebafac58a7e4dc97c2947b563063f2a6bbca081b62df43cc6b7e2a3ab876fcb2f39561a69bba315a9aa6b2d093de84230bc59eadbfbcb473eb0b9609f8df9ed664ad06dd341bb9a254f17605737dca15c3028330378c6fd85c72ce21bd763", 0x71}, {&(0x7f0000001440)="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", 0x1000, 0x200}, {&(0x7f0000002440)="3890ada82169dcfe55b24cae95ff5f14300abac3644457a99427be6ea89757a73b544217b1e2abf003443bad491d2dd5142a221a09c43b4ee1e02dd21f8ae43cb695e61a98e85b568c5203fdd80be2e650e93f15aa65ad1916a3f4fc079cef340389a8b69b579bb64843aba92e1f99d6c5f230a245ae3c0cdca2529d97c31ccfda9c96098e0644e16e3a85a0018d805d9a0bda7bc1345f73ec38a1ab830cd11b57054b17d5c3682fd84eeb19df4a42f78ebd293733d5a947f31e942379ecde2694d8e1fbcd671b3dfa59fd0c4c12da8ef8499a2afb", 0xd5, 0x6fca2388}], 0x11000, &(0x7f0000002640)={[{@errors_continue}, {@noblock_validity}, {@barrier_val={'barrier', 0x3d, 0x772}}, {@dioread_lock}, {@abort}, {@bsdgroups}], [{@pcr={'pcr', 0x3d, 0x29}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'iso9660\x00'}}, {@fowner_gt={'fowner>', r1}}, {@seclabel}]}) [ 619.038767] loop7: detected capacity change from 0 to 262144 [ 619.043899] loop3: detected capacity change from 0 to 262144 [ 619.091744] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 2266917008 [ 619.095397] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 619.103478] EXT4-fs (loop3): warning: mounting fs with errors, running e2fsck is recommended [ 619.105566] EXT4-fs (loop7): get root inode failed [ 619.106798] EXT4-fs (loop7): mount failed [ 619.113614] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=e842c01c, mo2=0002] 04:25:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 619.140799] System zones: 0-7 04:25:15 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 619.209975] EXT4-fs (loop3): Errors on filesystem, clearing orphan list. [ 619.209975] [ 619.211827] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 04:25:32 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:25:32 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:25:32 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:25:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:25:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:25:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:25:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:25:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2", 0x28, 0x4200}], 0x0, &(0x7f0000013a00)) [ 636.243387] loop7: detected capacity change from 0 to 262144 04:25:36 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) [ 636.272208] loop5: detected capacity change from 0 to 262144 [ 636.282706] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 636.291641] EXT4-fs (loop7): get root inode failed [ 636.292231] EXT4-fs (loop7): mount failed [ 636.293793] loop3: detected capacity change from 0 to 262144 [ 636.297901] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 636.299420] EXT4-fs (loop5): group descriptors corrupted! 04:25:36 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) [ 636.337192] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 636.355180] EXT4-fs (loop3): warning: mounting fs with errors, running e2fsck is recommended [ 636.368599] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=e842c01c, mo2=0002] [ 636.382525] System zones: 0-7 04:25:40 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:25:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:25:40 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:25:40 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737", 0x66, 0x4200}], 0x0, &(0x7f0000013a00)) 04:25:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 636.424107] EXT4-fs (loop3): Errors on filesystem, clearing orphan list. [ 636.424107] [ 636.425589] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 04:25:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2", 0x28, 0x4200}], 0x0, &(0x7f0000013a00)) [ 636.490345] loop5: detected capacity change from 0 to 262144 [ 636.498969] loop7: detected capacity change from 0 to 262144 [ 636.504119] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 636.505313] EXT4-fs (loop5): group descriptors corrupted! 04:25:44 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:25:45 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:25:45 executing program 0: clock_adjtime(0x0, 0x0) [ 636.540467] loop3: detected capacity change from 0 to 262144 [ 636.552637] EXT4-fs error (device loop7): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.7: invalid block [ 636.557518] EXT4-fs (loop7): get root inode failed [ 636.558540] EXT4-fs (loop7): mount failed [ 636.599962] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 636.602604] EXT4-fs (loop3): warning: mounting fs with errors, running e2fsck is recommended [ 636.610709] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=e842c01c, mo2=0002] [ 636.616409] System zones: 0-7 [ 636.630913] EXT4-fs (loop3): Errors on filesystem, clearing orphan list. [ 636.630913] [ 636.632330] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 04:26:02 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:26:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r2, 0x6, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:26:02 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737", 0x66, 0x4200}], 0x0, &(0x7f0000013a00)) 04:26:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:26:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29}], 0x0, &(0x7f0000013a00)) 04:26:02 executing program 0: clock_adjtime(0x0, 0x0) 04:26:02 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) [ 651.785018] loop3: detected capacity change from 0 to 262144 [ 651.792916] loop7: detected capacity change from 0 to 262144 04:26:02 executing program 0: clock_adjtime(0x0, 0x0) 04:26:02 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) [ 651.829805] loop5: detected capacity change from 0 to 262144 [ 651.847018] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 651.850050] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 651.852062] EXT4-fs (loop5): group descriptors corrupted! [ 651.854127] EXT4-fs error (device loop7): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.7: invalid block [ 651.858442] EXT4-fs (loop3): get root inode failed [ 651.859635] EXT4-fs (loop3): mount failed [ 651.860806] EXT4-fs (loop7): get root inode failed [ 651.862019] EXT4-fs (loop7): mount failed 04:26:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r2, 0x6, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:26:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:26:02 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:26:02 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:26:02 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737", 0x66, 0x4200}], 0x0, &(0x7f0000013a00)) 04:26:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29}], 0x0, &(0x7f0000013a00)) [ 652.072857] loop5: detected capacity change from 0 to 262144 [ 652.098751] loop3: detected capacity change from 0 to 262144 [ 652.104233] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 652.106072] EXT4-fs (loop5): group descriptors corrupted! [ 652.115316] loop7: detected capacity change from 0 to 262144 04:26:02 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 652.216571] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 652.219243] EXT4-fs error (device loop7): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.7: invalid block [ 652.221967] EXT4-fs (loop3): get root inode failed [ 652.223168] EXT4-fs (loop3): mount failed [ 652.225835] EXT4-fs (loop7): get root inode failed [ 652.227349] EXT4-fs (loop7): mount failed 04:26:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29}], 0x0, &(0x7f0000013a00)) 04:26:17 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:26:17 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:26:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 666.788760] loop3: detected capacity change from 0 to 262144 04:26:17 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:26:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r2, 0x6, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:26:17 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a", 0x68, 0x4200}], 0x0, &(0x7f0000013a00)) [ 666.798810] loop4: detected capacity change from 0 to 135266304 [ 666.802622] FAT-fs (loop4): bogus number of reserved sectors [ 666.803511] FAT-fs (loop4): Can't find a valid FAT filesystem [ 666.822492] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 666.824560] EXT4-fs (loop3): get root inode failed [ 666.825609] EXT4-fs (loop3): mount failed [ 666.856225] loop7: detected capacity change from 0 to 262144 [ 666.891718] loop5: detected capacity change from 0 to 262144 [ 666.899575] EXT4-fs error (device loop7): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.7: invalid block [ 666.909889] EXT4-fs (loop7): get root inode failed [ 666.911106] EXT4-fs (loop7): mount failed 04:26:17 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xd72, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:26:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:26:17 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) [ 666.952309] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: bad extra_isize 27255 (inode size 512) [ 666.954873] EXT4-fs (loop5): get root inode failed [ 666.956499] EXT4-fs (loop5): mount failed 04:26:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:26:17 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a", 0x68, 0x4200}], 0x0, &(0x7f0000013a00)) [ 667.033535] loop7: detected capacity change from 0 to 262144 [ 667.078742] EXT4-fs error (device loop7): __ext4_iget:4955: inode #2: block 1940834256: comm syz-executor.7: invalid block [ 667.080941] EXT4-fs (loop7): get root inode failed [ 667.081713] EXT4-fs (loop7): mount failed 04:26:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:26:17 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x81, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:26:17 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a", 0x68, 0x4200}], 0x0, &(0x7f0000013a00)) 04:26:17 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) [ 667.223653] loop5: detected capacity change from 0 to 262144 [ 667.228699] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 667.229797] EXT4-fs (loop5): group descriptors corrupted! 04:26:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:26:32 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:26:32 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x36d, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:26:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:26:32 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69}], 0x0, &(0x7f0000013a00)) 04:26:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:26:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:26:34 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) [ 680.241872] loop3: detected capacity change from 0 to 262144 [ 680.252061] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 680.254181] EXT4-fs (loop3): group descriptors corrupted! 04:26:34 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) [ 680.276886] loop7: detected capacity change from 0 to 262144 [ 680.303024] loop5: detected capacity change from 0 to 262144 [ 680.308801] loop4: detected capacity change from 0 to 135266304 [ 680.329311] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 680.330369] EXT4-fs (loop5): group descriptors corrupted! [ 680.332497] FAT-fs (loop4): bogus number of reserved sectors [ 680.333211] FAT-fs (loop4): Can't find a valid FAT filesystem 04:26:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 680.384218] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 680.385953] EXT4-fs (loop7): get root inode failed [ 680.386523] EXT4-fs (loop7): mount failed 04:26:36 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:26:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:26:58 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:26:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:26:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r2 = accept$inet6(r1, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r2, 0x6, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r1, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:26:58 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:58 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69}], 0x0, &(0x7f0000013a00)) 04:26:58 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:27:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 700.332413] loop5: detected capacity change from 0 to 262144 04:27:00 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) [ 700.348501] loop4: detected capacity change from 0 to 135266304 [ 700.355059] FAT-fs (loop4): bogus number of reserved sectors [ 700.356417] FAT-fs (loop4): Can't find a valid FAT filesystem [ 700.374160] loop3: detected capacity change from 0 to 262144 [ 700.387020] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 700.388348] EXT4-fs (loop5): group descriptors corrupted! [ 700.393346] loop7: detected capacity change from 0 to 262144 04:27:00 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) [ 700.401986] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 700.404325] EXT4-fs (loop3): group descriptors corrupted! [ 700.418697] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 700.423462] EXT4-fs (loop7): get root inode failed [ 700.424196] EXT4-fs (loop7): mount failed 04:27:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r2 = accept$inet6(r1, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r2, 0x6, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r1, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:27:00 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:27:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:27:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:27:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000040000", 0xb, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69}], 0x0, &(0x7f0000013a00)) [ 700.592091] loop5: detected capacity change from 0 to 262144 [ 700.613325] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 700.615435] EXT4-fs (loop5): group descriptors corrupted! 04:27:01 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:27:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r2 = accept$inet6(r1, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r2, 0x6, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r1, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:27:01 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 700.715946] loop7: detected capacity change from 0 to 262144 [ 700.751951] loop3: detected capacity change from 0 to 262144 [ 700.763519] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 700.770406] EXT4-fs (loop7): get root inode failed [ 700.771640] EXT4-fs (loop7): mount failed [ 700.787852] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 700.790321] EXT4-fs (loop3): group descriptors corrupted! 04:27:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:27:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:27:18 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:27:18 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:27:18 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:27:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:27:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:27:18 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r2 = accept$inet6(r1, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r2, 0x6, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r1, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 717.823053] loop7: detected capacity change from 0 to 262144 [ 717.862183] loop4: detected capacity change from 0 to 135266304 [ 717.869966] loop5: detected capacity change from 0 to 262144 [ 717.876401] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 717.878511] EXT4-fs (loop7): group descriptors corrupted! [ 717.880701] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 717.882835] EXT4-fs (loop5): group descriptors corrupted! [ 717.892807] loop3: detected capacity change from 0 to 262144 [ 717.901657] FAT-fs (loop4): bogus number of reserved sectors [ 717.903046] FAT-fs (loop4): Can't find a valid FAT filesystem 04:27:18 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x400, 0xb}) 04:27:18 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) [ 717.926884] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 717.929297] EXT4-fs (loop3): group descriptors corrupted! 04:27:18 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0xb}) 04:27:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:27:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 718.085087] loop7: detected capacity change from 0 to 262144 04:27:18 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r2 = accept$inet6(r1, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r2, 0x6, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r1, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 718.142462] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 718.144933] EXT4-fs (loop7): group descriptors corrupted! [ 718.162807] loop5: detected capacity change from 0 to 262144 [ 718.184134] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 718.186286] EXT4-fs (loop5): group descriptors corrupted! 04:27:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:27:33 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:27:33 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r2 = accept$inet6(r1, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r2, 0x6, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r1, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:27:33 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:27:33 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:27:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:27:33 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:27:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 733.202989] loop5: detected capacity change from 0 to 262144 [ 733.223378] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 733.225485] EXT4-fs (loop5): group descriptors corrupted! [ 733.241476] loop3: detected capacity change from 0 to 262144 [ 733.247906] loop4: detected capacity change from 0 to 135266304 [ 733.268234] loop7: detected capacity change from 0 to 262144 [ 733.279652] FAT-fs (loop4): bogus number of reserved sectors [ 733.281020] FAT-fs (loop4): Can't find a valid FAT filesystem [ 733.283723] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 733.285752] EXT4-fs (loop3): group descriptors corrupted! [ 733.291898] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 733.293934] EXT4-fs (loop7): group descriptors corrupted! 04:27:33 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100}) 04:27:33 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:27:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:27:33 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:27:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:27:33 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:27:33 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 733.507024] loop5: detected capacity change from 0 to 262144 [ 733.546390] loop3: detected capacity change from 0 to 262144 [ 733.556295] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 733.558646] EXT4-fs (loop3): group descriptors corrupted! [ 733.568964] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 733.571273] EXT4-fs (loop5): group descriptors corrupted! 04:27:34 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:27:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 733.676008] loop7: detected capacity change from 0 to 262144 [ 733.726711] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 733.728848] EXT4-fs (loop7): group descriptors corrupted! 04:27:34 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 733.779975] loop6: detected capacity change from 0 to 135266304 [ 733.802636] FAT-fs (loop6): bogus number of reserved sectors [ 733.804023] FAT-fs (loop6): Can't find a valid FAT filesystem [ 733.806098] loop3: detected capacity change from 0 to 262144 [ 733.840623] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 733.842889] EXT4-fs (loop3): group descriptors corrupted! 04:27:48 executing program 6: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:27:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:27:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:27:48 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:27:48 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:27:48 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:27:48 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:27:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:27:48 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) [ 748.467929] loop5: detected capacity change from 0 to 262144 [ 748.485972] loop4: detected capacity change from 0 to 135266304 [ 748.495280] loop3: detected capacity change from 0 to 262144 [ 748.505898] loop7: detected capacity change from 0 to 262144 [ 748.513643] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 748.515112] EXT4-fs (loop7): group descriptors corrupted! [ 748.535778] FAT-fs (loop4): bogus number of reserved sectors [ 748.537360] FAT-fs (loop4): Can't find a valid FAT filesystem [ 748.540908] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 748.543099] EXT4-fs (loop3): group descriptors corrupted! [ 748.546151] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 748.548296] EXT4-fs (loop5): group descriptors corrupted! 04:27:49 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100}) (fail_nth: 1) 04:27:49 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8867, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:27:49 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:27:49 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:27:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300", 0x6, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:27:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 748.688170] FAULT_INJECTION: forcing a failure. [ 748.688170] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 748.690938] CPU: 1 PID: 11493 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 748.692560] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 748.694483] Call Trace: [ 748.695096] dump_stack+0x107/0x167 [ 748.695949] should_fail.cold+0x5/0xa [ 748.696835] _copy_from_user+0x2e/0x1b0 [ 748.697757] __do_sys_clock_adjtime+0x88/0x260 [ 748.698800] ? posix_timer_fn+0x3e0/0x3e0 [ 748.699750] ? __mutex_unlock_slowpath+0xe1/0x600 [ 748.700867] ? wait_for_completion_io+0x270/0x270 [ 748.701989] ? rcu_read_lock_any_held+0x75/0xa0 [ 748.703060] ? vfs_write+0x354/0xb10 [ 748.703924] ? fput_many+0x2f/0x1a0 [ 748.704765] ? ksys_write+0x1a9/0x260 [ 748.705642] ? __ia32_sys_read+0xb0/0xb0 [ 748.706583] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 748.707790] ? syscall_enter_from_user_mode+0x1d/0x50 [ 748.708979] ? trace_hardirqs_on+0x5b/0x180 [ 748.709974] do_syscall_64+0x33/0x40 [ 748.710831] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 748.712021] RIP: 0033:0x7fbd2ede0b19 [ 748.712877] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 748.717129] RSP: 002b:00007fbd2c356188 EFLAGS: 00000246 ORIG_RAX: 0000000000000131 [ 748.718888] RAX: ffffffffffffffda RBX: 00007fbd2eef3f60 RCX: 00007fbd2ede0b19 [ 748.719777] loop7: detected capacity change from 0 to 262144 [ 748.720542] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000000 [ 748.720554] RBP: 00007fbd2c3561d0 R08: 0000000000000000 R09: 0000000000000000 [ 748.720565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 748.720576] R13: 00007fff11a4bd1f R14: 00007fbd2c356300 R15: 0000000000022000 [ 748.743057] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 748.744575] EXT4-fs (loop7): group descriptors corrupted! [ 748.771610] loop5: detected capacity change from 0 to 262144 [ 748.784533] loop3: detected capacity change from 0 to 262144 [ 748.817088] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 748.818681] EXT4-fs (loop3): group descriptors corrupted! [ 748.820453] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 748.821932] EXT4-fs (loop5): group descriptors corrupted! 04:28:03 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7fffffff, 0xffffffff, 0x400, 0xb}) 04:28:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:28:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300", 0x6, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:03 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100}) (fail_nth: 2) 04:28:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:28:03 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:28:03 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 763.015034] loop7: detected capacity change from 0 to 262144 [ 763.024255] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 763.025661] EXT4-fs (loop7): group descriptors corrupted! [ 763.029040] FAULT_INJECTION: forcing a failure. [ 763.029040] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 763.031826] CPU: 0 PID: 11517 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 763.033445] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 763.035376] Call Trace: [ 763.035998] dump_stack+0x107/0x167 [ 763.036843] should_fail.cold+0x5/0xa [ 763.037724] ? posix_get_monotonic_ktime+0x10/0x10 [ 763.038862] _copy_to_user+0x2e/0x180 [ 763.039740] ? posix_get_monotonic_ktime+0x10/0x10 [ 763.040878] __do_sys_clock_adjtime+0x1d4/0x260 [ 763.041946] ? posix_timer_fn+0x3e0/0x3e0 [ 763.042939] ? __ia32_sys_read+0xb0/0xb0 [ 763.043905] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 763.045120] ? syscall_enter_from_user_mode+0x1d/0x50 [ 763.046301] ? trace_hardirqs_on+0x5b/0x180 [ 763.047300] do_syscall_64+0x33/0x40 [ 763.048166] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 763.049344] RIP: 0033:0x7fbd2ede0b19 [ 763.050198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 763.054463] RSP: 002b:00007fbd2c356188 EFLAGS: 00000246 ORIG_RAX: 0000000000000131 [ 763.056233] RAX: ffffffffffffffda RBX: 00007fbd2eef3f60 RCX: 00007fbd2ede0b19 [ 763.057873] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000000 [ 763.059506] RBP: 00007fbd2c3561d0 R08: 0000000000000000 R09: 0000000000000000 [ 763.061160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 763.062802] R13: 00007fff11a4bd1f R14: 00007fbd2c356300 R15: 0000000000022000 [ 763.093493] loop5: detected capacity change from 0 to 262144 [ 763.099175] loop3: detected capacity change from 0 to 262144 [ 763.115222] loop4: detected capacity change from 0 to 135266304 04:28:03 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0xffffffff, 0x400, 0xb}) [ 763.127900] FAT-fs (loop4): bogus number of reserved sectors [ 763.129358] FAT-fs (loop4): Can't find a valid FAT filesystem [ 763.132066] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 763.133425] EXT4-fs (loop5): group descriptors corrupted! [ 763.141322] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 763.143602] EXT4-fs (loop3): group descriptors corrupted! 04:28:03 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100}) (fail_nth: 3) 04:28:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300", 0x6, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:28:03 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:28:03 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:03 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x400, 0xb}) 04:28:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 763.275624] loop3: detected capacity change from 0 to 262144 [ 763.284480] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 763.285822] EXT4-fs (loop3): group descriptors corrupted! [ 763.325635] FAULT_INJECTION: forcing a failure. [ 763.325635] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 763.327623] CPU: 1 PID: 11553 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 763.328647] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 763.329859] Call Trace: [ 763.330236] dump_stack+0x107/0x167 [ 763.330768] should_fail.cold+0x5/0xa [ 763.331330] _copy_to_user+0x2e/0x180 [ 763.331892] simple_read_from_buffer+0xcc/0x160 [ 763.332587] proc_fail_nth_read+0x198/0x230 [ 763.333216] ? proc_sessionid_read+0x230/0x230 [ 763.333884] ? security_file_permission+0xb1/0xe0 [ 763.334594] ? proc_sessionid_read+0x230/0x230 [ 763.335263] vfs_read+0x228/0x620 [ 763.335776] ksys_read+0x12d/0x260 [ 763.336302] ? vfs_write+0xb10/0xb10 [ 763.336855] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 763.337622] ? syscall_enter_from_user_mode+0x1d/0x50 [ 763.338379] do_syscall_64+0x33/0x40 [ 763.338926] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 763.339674] RIP: 0033:0x7fbd2ed9369c [ 763.340222] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 763.342915] RSP: 002b:00007fbd2c356170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 763.344026] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007fbd2ed9369c [ 763.345014] RDX: 000000000000000f RSI: 00007fbd2c3561e0 RDI: 0000000000000003 [ 763.346047] RBP: 00007fbd2c3561d0 R08: 0000000000000000 R09: 0000000000000000 [ 763.347087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 763.348087] R13: 00007fff11a4bd1f R14: 00007fbd2c356300 R15: 0000000000022000 04:28:03 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0xb}) [ 763.363229] loop7: detected capacity change from 0 to 262144 [ 763.384007] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 763.386188] EXT4-fs (loop7): group descriptors corrupted! [ 763.401409] loop5: detected capacity change from 0 to 262144 04:28:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 763.490625] loop3: detected capacity change from 0 to 262144 [ 763.496647] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 763.499065] EXT4-fs (loop5): group descriptors corrupted! [ 763.557909] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 763.570966] EXT4-fs (loop3): get root inode failed [ 763.572396] EXT4-fs (loop3): mount failed [ 776.892054] loop4: detected capacity change from 0 to 135266304 [ 776.900832] FAT-fs (loop4): bogus number of reserved sectors [ 776.902481] FAT-fs (loop4): Can't find a valid FAT filesystem [ 776.923543] loop5: detected capacity change from 0 to 262144 [ 776.931179] loop7: detected capacity change from 0 to 262144 04:28:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:28:17 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:17 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100}) 04:28:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:17 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:28:17 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:28:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 776.946480] loop3: detected capacity change from 0 to 262144 [ 776.967791] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 776.969881] EXT4-fs (loop7): group descriptors corrupted! [ 776.971864] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 776.973989] EXT4-fs (loop5): group descriptors corrupted! [ 776.976841] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 776.978904] EXT4-fs (loop3): group descriptors corrupted! 04:28:17 executing program 6: clock_adjtime(0xb, &(0x7f0000000200)={0x100}) 04:28:17 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100}) 04:28:17 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:28:17 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300", 0x6, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(0x0, 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:28:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 777.157447] loop3: detected capacity change from 0 to 262144 [ 777.187342] loop7: detected capacity change from 0 to 262144 [ 777.194260] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 777.196506] EXT4-fs (loop3): group descriptors corrupted! [ 777.203206] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 777.204792] EXT4-fs (loop7): group descriptors corrupted! [ 791.448408] loop4: detected capacity change from 0 to 135266304 [ 791.463595] FAT-fs (loop4): bogus number of reserved sectors [ 791.464967] FAT-fs (loop4): Can't find a valid FAT filesystem 04:28:31 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:28:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:28:31 executing program 6: clock_adjtime(0xd0, &(0x7f0000000200)={0x100}) 04:28:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300", 0x6, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(0x0, 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:28:31 executing program 6: clock_adjtime(0xb00, &(0x7f0000000200)={0x100}) 04:28:31 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100}) (fail_nth: 1) [ 791.498509] loop3: detected capacity change from 0 to 262144 [ 791.503489] loop5: detected capacity change from 0 to 262144 [ 791.505820] FAULT_INJECTION: forcing a failure. [ 791.505820] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 791.507552] CPU: 0 PID: 11836 Comm: syz-executor.0 Not tainted 5.10.236 #1 [ 791.508569] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 791.509785] Call Trace: [ 791.510173] dump_stack+0x107/0x167 [ 791.510707] should_fail.cold+0x5/0xa [ 791.511270] _copy_from_user+0x2e/0x1b0 [ 791.511856] __do_sys_clock_adjtime+0x88/0x260 [ 791.512531] ? posix_timer_fn+0x3e0/0x3e0 [ 791.513139] ? __mutex_unlock_slowpath+0xe1/0x600 [ 791.513849] ? wait_for_completion_io+0x270/0x270 [ 791.514557] ? rcu_read_lock_any_held+0x75/0xa0 [ 791.515236] ? vfs_write+0x354/0xb10 [ 791.515784] ? fput_many+0x2f/0x1a0 [ 791.516324] ? ksys_write+0x1a9/0x260 [ 791.516879] ? __ia32_sys_read+0xb0/0xb0 [ 791.517474] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 791.518240] ? syscall_enter_from_user_mode+0x1d/0x50 [ 791.518991] ? trace_hardirqs_on+0x5b/0x180 [ 791.519623] do_syscall_64+0x33/0x40 [ 791.520169] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 791.520926] RIP: 0033:0x7fbf35f52b19 [ 791.521471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 791.524169] RSP: 002b:00007fbf334c8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000131 [ 791.525288] RAX: ffffffffffffffda RBX: 00007fbf36065f60 RCX: 00007fbf35f52b19 [ 791.526282] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000000 [ 791.527326] RBP: 00007fbf334c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 791.528378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 791.529423] R13: 00007fffbb56a57f R14: 00007fbf334c8300 R15: 0000000000022000 [ 791.535657] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 791.537879] EXT4-fs (loop3): group descriptors corrupted! [ 791.551825] loop7: detected capacity change from 0 to 262144 [ 791.595772] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 791.598009] EXT4-fs (loop5): group descriptors corrupted! [ 791.601069] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 791.602454] EXT4-fs (loop7): group descriptors corrupted! 04:28:32 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100}) (fail_nth: 2) 04:28:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(0x0, 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:28:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300", 0x6, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 791.692326] FAULT_INJECTION: forcing a failure. [ 791.692326] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 791.694087] CPU: 0 PID: 11947 Comm: syz-executor.0 Not tainted 5.10.236 #1 [ 791.695103] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 791.696329] Call Trace: [ 791.696720] dump_stack+0x107/0x167 [ 791.697256] should_fail.cold+0x5/0xa [ 791.697815] ? posix_get_monotonic_ktime+0x10/0x10 [ 791.698533] _copy_to_user+0x2e/0x180 [ 791.699095] ? posix_get_monotonic_ktime+0x10/0x10 [ 791.699813] __do_sys_clock_adjtime+0x1d4/0x260 [ 791.700503] ? posix_timer_fn+0x3e0/0x3e0 [ 791.701135] ? __ia32_sys_read+0xb0/0xb0 [ 791.701734] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 791.702503] ? syscall_enter_from_user_mode+0x1d/0x50 [ 791.703258] ? trace_hardirqs_on+0x5b/0x180 [ 791.703891] do_syscall_64+0x33/0x40 [ 791.704444] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 791.705196] RIP: 0033:0x7fbf35f52b19 [ 791.705738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 791.708445] RSP: 002b:00007fbf334c8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000131 [ 791.709566] RAX: ffffffffffffffda RBX: 00007fbf36065f60 RCX: 00007fbf35f52b19 [ 791.710612] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000000 [ 791.711661] RBP: 00007fbf334c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 791.712714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 791.713761] R13: 00007fffbb56a57f R14: 00007fbf334c8300 R15: 0000000000022000 [ 791.744522] loop7: detected capacity change from 0 to 262144 04:28:32 executing program 6: clock_adjtime(0x4000, &(0x7f0000000200)={0x100}) 04:28:32 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:28:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:32 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100}) (fail_nth: 3) [ 791.849998] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 791.852272] EXT4-fs (loop7): group descriptors corrupted! [ 791.930185] FAULT_INJECTION: forcing a failure. [ 791.930185] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 791.931638] CPU: 0 PID: 11962 Comm: syz-executor.0 Not tainted 5.10.236 #1 [ 791.932478] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 791.933470] Call Trace: [ 791.933779] dump_stack+0x107/0x167 [ 791.934214] should_fail.cold+0x5/0xa [ 791.934666] _copy_to_user+0x2e/0x180 [ 791.935123] simple_read_from_buffer+0xcc/0x160 [ 791.935684] proc_fail_nth_read+0x198/0x230 [ 791.936200] ? proc_sessionid_read+0x230/0x230 [ 791.936749] ? security_file_permission+0xb1/0xe0 [ 791.937325] ? proc_sessionid_read+0x230/0x230 [ 791.937867] vfs_read+0x228/0x620 [ 791.938286] ksys_read+0x12d/0x260 [ 791.938711] ? vfs_write+0xb10/0xb10 [ 791.939157] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 791.939783] ? syscall_enter_from_user_mode+0x1d/0x50 [ 791.940405] do_syscall_64+0x33/0x40 [ 791.940834] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 791.941441] RIP: 0033:0x7fbf35f0569c [ 791.941881] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 791.944052] RSP: 002b:00007fbf334c8170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 791.944961] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007fbf35f0569c [ 791.945808] RDX: 000000000000000f RSI: 00007fbf334c81e0 RDI: 0000000000000003 [ 791.946642] RBP: 00007fbf334c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 791.947454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 791.948301] R13: 00007fffbb56a57f R14: 00007fbf334c8300 R15: 0000000000022000 [ 791.960788] loop3: detected capacity change from 0 to 262144 [ 791.970393] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 791.971643] EXT4-fs (loop3): group descriptors corrupted! 04:28:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:28:45 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:28:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:45 executing program 6: clock_adjtime(0xd000, &(0x7f0000000200)={0x100}) 04:28:45 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100}) 04:28:45 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 805.131926] loop5: detected capacity change from 0 to 262144 [ 805.144459] loop3: detected capacity change from 0 to 262144 [ 805.150857] loop4: detected capacity change from 0 to 135266304 [ 805.155605] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 805.156701] EXT4-fs (loop3): group descriptors corrupted! [ 805.162412] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 805.164551] EXT4-fs (loop5): group descriptors corrupted! [ 805.166255] loop7: detected capacity change from 0 to 262144 04:28:45 executing program 6: clock_adjtime(0xf423f, &(0x7f0000000200)={0x100}) [ 805.185140] FAT-fs (loop4): bogus number of reserved sectors [ 805.186524] FAT-fs (loop4): Can't find a valid FAT filesystem 04:28:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:28:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:28:45 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 805.221813] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 805.250703] EXT4-fs (loop7): get root inode failed [ 805.251987] EXT4-fs (loop7): mount failed 04:28:45 executing program 0: clock_adjtime(0x2, &(0x7f0000000200)={0x100}) 04:28:45 executing program 0: clock_adjtime(0xb, &(0x7f0000000200)={0x100}) [ 805.367181] loop3: detected capacity change from 0 to 262144 [ 805.378357] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 805.380412] EXT4-fs (loop3): group descriptors corrupted! 04:28:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 805.437079] loop5: detected capacity change from 0 to 262144 [ 805.474640] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 805.476730] EXT4-fs (loop5): group descriptors corrupted! [ 820.372017] loop7: detected capacity change from 0 to 262144 04:29:00 executing program 6: clock_adjtime(0x1000000, &(0x7f0000000200)={0x100}) 04:29:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:29:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:29:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:00 executing program 0: clock_adjtime(0xb00, &(0x7f0000000200)={0x100}) 04:29:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:00 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:29:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 820.402472] loop3: detected capacity change from 0 to 262144 04:29:00 executing program 0: clock_adjtime(0x4000, &(0x7f0000000200)={0x100}) [ 820.414117] loop4: detected capacity change from 0 to 135266304 [ 820.420939] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 820.422905] EXT4-fs (loop3): group descriptors corrupted! [ 820.425310] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 820.427262] EXT4-fs (loop7): group descriptors corrupted! [ 820.427710] loop5: detected capacity change from 0 to 262144 [ 820.433679] FAT-fs (loop4): bogus number of reserved sectors [ 820.434539] FAT-fs (loop4): Can't find a valid FAT filesystem [ 820.442401] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 04:29:00 executing program 6: clock_adjtime(0xb000000, &(0x7f0000000200)={0x100}) 04:29:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:29:01 executing program 0: clock_adjtime(0xf423f, &(0x7f0000000200)={0x100}) 04:29:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 820.611903] loop3: detected capacity change from 0 to 262144 04:29:01 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, 0x0, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 820.639773] loop5: detected capacity change from 0 to 262144 [ 820.644199] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 820.646505] EXT4-fs (loop3): group descriptors corrupted! [ 820.656172] loop7: detected capacity change from 0 to 262144 [ 820.700209] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 820.716111] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 820.718264] EXT4-fs (loop7): group descriptors corrupted! 04:29:18 executing program 6: clock_adjtime(0x275cee97, &(0x7f0000000200)={0x100}) [ 837.985918] loop4: detected capacity change from 0 to 135266304 04:29:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:18 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, 0x0, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:29:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:29:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) [ 838.017676] loop7: detected capacity change from 0 to 262144 sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:29:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:18 executing program 0: clock_adjtime(0x1000000, &(0x7f0000000200)={0x100}) [ 838.029656] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 838.031522] EXT4-fs (loop7): group descriptors corrupted! [ 838.033983] loop5: detected capacity change from 0 to 262144 [ 838.037759] FAT-fs (loop4): bogus number of reserved sectors [ 838.039159] FAT-fs (loop4): Can't find a valid FAT filesystem [ 838.040857] loop3: detected capacity change from 0 to 262144 04:29:18 executing program 0: clock_adjtime(0x2000000, &(0x7f0000000200)={0x100}) [ 838.072754] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 838.074906] EXT4-fs (loop3): group descriptors corrupted! [ 838.076315] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 04:29:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:18 executing program 6: clock_adjtime(0x3b9ac9ff, &(0x7f0000000200)={0x100}) [ 838.129468] loop7: detected capacity change from 0 to 262144 [ 838.137098] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 838.138924] EXT4-fs (loop7): group descriptors corrupted! 04:29:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:29:34 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:34 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, 0x0, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:29:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:34 executing program 0: clock_adjtime(0xb000000, &(0x7f0000000200)={0x100}) 04:29:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:29:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:34 executing program 6: clock_adjtime(0x3f420f00, &(0x7f0000000200)={0x100}) [ 853.740019] loop7: detected capacity change from 0 to 262144 [ 853.772033] loop5: detected capacity change from 0 to 262144 [ 853.779930] loop4: detected capacity change from 0 to 135266304 [ 853.785854] loop3: detected capacity change from 0 to 262144 [ 853.799340] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 853.801522] EXT4-fs (loop7): group descriptors corrupted! 04:29:34 executing program 6: clock_adjtime(0x40000000, &(0x7f0000000200)={0x100}) [ 853.811941] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 853.827845] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 853.830693] EXT4-fs (loop3): get root inode failed [ 853.831263] FAT-fs (loop4): invalid media value (0x00) [ 853.831642] EXT4-fs (loop3): mount failed [ 853.832885] FAT-fs (loop4): Can't find a valid FAT filesystem 04:29:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:34 executing program 0: clock_adjtime(0x275cee97, &(0x7f0000000200)={0x100}) 04:29:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:29:34 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 853.994421] loop3: detected capacity change from 0 to 262144 04:29:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:34 executing program 6: clock_adjtime(0x97ee5c27, &(0x7f0000000200)={0x100}) [ 854.017826] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 854.019355] EXT4-fs (loop3): group descriptors corrupted! 04:29:34 executing program 0: clock_adjtime(0x3b9ac9ff, &(0x7f0000000200)={0x100}) [ 854.053834] loop7: detected capacity change from 0 to 262144 [ 854.063826] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 854.065471] EXT4-fs (loop7): group descriptors corrupted! [ 854.151888] loop5: detected capacity change from 0 to 262144 [ 854.156463] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 04:29:49 executing program 6: clock_adjtime(0xd0000000, &(0x7f0000000200)={0x100}) 04:29:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:29:49 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:29:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 869.420335] loop7: detected capacity change from 0 to 262144 04:29:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:49 executing program 0: clock_adjtime(0x3f420f00, &(0x7f0000000200)={0x100}) 04:29:49 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(0x0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 869.440898] loop4: detected capacity change from 0 to 135266304 04:29:49 executing program 6: clock_adjtime(0xffc99a3b, &(0x7f0000000200)={0x100}) 04:29:49 executing program 0: clock_adjtime(0x40000000, &(0x7f0000000200)={0x100}) 04:29:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 869.481993] loop5: detected capacity change from 0 to 262144 [ 869.498776] FAT-fs (loop4): invalid media value (0x00) [ 869.499437] FAT-fs (loop4): Can't find a valid FAT filesystem [ 869.500682] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 869.501837] EXT4-fs (loop7): group descriptors corrupted! [ 869.509537] loop3: detected capacity change from 0 to 262144 [ 869.526656] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 869.528307] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 869.529580] EXT4-fs (loop3): group descriptors corrupted! 04:29:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:50 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:29:50 executing program 0: clock_adjtime(0x97ee5c27, &(0x7f0000000200)={0x100}) 04:29:50 executing program 6: clock_adjtime(0x100000000000000, &(0x7f0000000200)={0x100}) [ 869.681903] loop7: detected capacity change from 0 to 262144 [ 869.739761] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 869.742020] EXT4-fs (loop7): group descriptors corrupted! [ 869.744330] loop3: detected capacity change from 0 to 262144 [ 869.754534] loop5: detected capacity change from 0 to 262144 [ 869.769013] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 869.771247] EXT4-fs (loop3): group descriptors corrupted! [ 869.783915] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 04:30:04 executing program 0: clock_adjtime(0xffc99a3b, &(0x7f0000000200)={0x100}) 04:30:04 executing program 6: clock_adjtime(0xb00000000000000, &(0x7f0000000200)={0x100}) 04:30:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000d52a0c010001000c0000000000000000000085cb08343175fd363b634f46", 0x22, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:04 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(0x0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:30:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:30:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}], 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 884.368942] loop4: detected capacity change from 0 to 135266304 [ 884.381207] FAT-fs (loop4): invalid media value (0x00) [ 884.382425] FAT-fs (loop4): Can't find a valid FAT filesystem [ 884.412272] loop5: detected capacity change from 0 to 262144 [ 884.422638] loop7: detected capacity change from 0 to 262144 04:30:04 executing program 0: clock_adjtime(0x100000000000000, &(0x7f0000000200)={0x100}) [ 884.441746] loop3: detected capacity change from 0 to 262144 04:30:04 executing program 6: clock_adjtime(0x275cee97ffffffff, &(0x7f0000000200)={0x100}) [ 884.451365] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 884.454500] EXT4-fs (loop3): group descriptors corrupted! [ 884.457339] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 884.466696] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 884.468682] EXT4-fs (loop7): group descriptors corrupted! 04:30:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}], 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:30:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:05 executing program 0: clock_adjtime(0x200000000000000, &(0x7f0000000200)={0x100}) 04:30:05 executing program 6: clock_adjtime(0x3f420f0000000000, &(0x7f0000000200)={0x100}) 04:30:05 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(0x0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 884.698516] loop3: detected capacity change from 0 to 262144 [ 884.733404] loop5: detected capacity change from 0 to 262144 [ 884.743366] loop7: detected capacity change from 0 to 262144 [ 884.756868] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 884.758820] EXT4-fs (loop3): group descriptors corrupted! [ 884.781659] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 884.819432] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 884.830095] EXT4-fs (loop7): get root inode failed [ 884.831206] EXT4-fs (loop7): mount failed 04:30:20 executing program 0: clock_adjtime(0xb00000000000000, &(0x7f0000000200)={0x100}) 04:30:20 executing program 6: clock_adjtime(0x4000000000000000, &(0x7f0000000200)={0x100}) 04:30:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:30:20 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', 0x0) setresuid(0x0, 0x0, 0x0) r2 = fork() kcmp(r1, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:30:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}], 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:30:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:20 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 900.561194] loop7: detected capacity change from 0 to 262144 [ 900.577406] loop5: detected capacity change from 0 to 262144 [ 900.585209] loop3: detected capacity change from 0 to 262144 [ 900.598070] loop4: detected capacity change from 0 to 135266304 [ 900.603363] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 900.608488] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 900.610438] EXT4-fs (loop3): group descriptors corrupted! [ 900.617244] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 900.619216] EXT4-fs (loop7): group descriptors corrupted! [ 900.629589] FAT-fs (loop4): invalid media value (0x00) [ 900.630787] FAT-fs (loop4): Can't find a valid FAT filesystem 04:30:21 executing program 0: clock_adjtime(0x275cee97ffffffff, &(0x7f0000000200)={0x100}) 04:30:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:21 executing program 6: clock_adjtime(0xd000000000000000, &(0x7f0000000200)={0x100}) 04:30:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 900.801947] loop3: detected capacity change from 0 to 262144 04:30:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {0x0}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:30:21 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:21 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', 0x0) setresuid(0x0, 0x0, 0x0) r2 = fork() kcmp(r1, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 900.862216] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 900.864843] EXT4-fs (loop3): group descriptors corrupted! [ 900.902136] loop5: detected capacity change from 0 to 262144 04:30:21 executing program 0: clock_adjtime(0x3f420f0000000000, &(0x7f0000000200)={0x100}) 04:30:21 executing program 6: clock_adjtime(0xffc99a3b00000000, &(0x7f0000000200)={0x100}) [ 900.951664] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 900.959165] loop7: detected capacity change from 0 to 262144 [ 900.989770] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 900.992196] EXT4-fs (loop7): group descriptors corrupted! 04:30:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 901.079764] loop3: detected capacity change from 0 to 262144 [ 901.092643] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 901.094770] EXT4-fs (loop3): group descriptors corrupted! 04:30:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:30:38 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', 0x0) setresuid(0x0, 0x0, 0x0) r2 = fork() kcmp(r1, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:30:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {0x0}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:30:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0, 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:38 executing program 6: clock_adjtime(0xffffffff97ee5c27, &(0x7f0000000200)={0x100}) 04:30:38 executing program 0: clock_adjtime(0x4000000000000000, &(0x7f0000000200)={0x100}) [ 918.256455] loop7: detected capacity change from 0 to 262144 [ 918.292415] loop4: detected capacity change from 0 to 135266304 [ 918.299960] loop3: detected capacity change from 0 to 262144 [ 918.307136] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 918.307148] loop5: detected capacity change from 0 to 262144 [ 918.310390] EXT4-fs (loop7): group descriptors corrupted! [ 918.316651] FAT-fs (loop4): invalid media value (0x00) [ 918.317872] FAT-fs (loop4): Can't find a valid FAT filesystem [ 918.322828] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 918.324836] EXT4-fs (loop3): group descriptors corrupted! [ 918.326530] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 04:30:38 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x10b}) 04:30:38 executing program 0: clock_adjtime(0xffc99a3b00000000, &(0x7f0000000200)={0x100}) 04:30:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {0x0}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:30:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:38 executing program 0: clock_adjtime(0xffffffff97ee5c27, &(0x7f0000000200)={0x100}) 04:30:39 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x1d0}) [ 918.540900] loop7: detected capacity change from 0 to 262144 [ 918.579010] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 918.581028] EXT4-fs (loop7): group descriptors corrupted! [ 918.596873] loop3: detected capacity change from 0 to 262144 [ 918.638088] loop5: detected capacity change from 0 to 262144 [ 918.647102] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 918.649188] EXT4-fs (loop3): group descriptors corrupted! [ 918.698434] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: special inode unallocated [ 918.701519] EXT4-fs (loop5): get root inode failed [ 918.702773] EXT4-fs (loop5): mount failed 04:30:54 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x102}) 04:30:54 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:54 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)) setresuid(0x0, 0x0, 0x0) r2 = fork() kcmp(r1, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:30:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:30:54 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x4000}) 04:30:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 934.389917] loop7: detected capacity change from 0 to 262144 [ 934.440970] loop5: detected capacity change from 0 to 262144 [ 934.446392] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 934.447998] EXT4-fs (loop7): group descriptors corrupted! [ 934.467399] loop3: detected capacity change from 0 to 262144 [ 934.481517] loop4: detected capacity change from 0 to 135266304 04:30:54 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x10b}) [ 934.492253] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 934.494460] EXT4-fs (loop3): group descriptors corrupted! [ 934.502338] FAT-fs (loop4): invalid media value (0x00) [ 934.503244] FAT-fs (loop4): Can't find a valid FAT filesystem [ 934.510035] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: special inode unallocated [ 934.512746] EXT4-fs (loop5): get root inode failed [ 934.513620] EXT4-fs (loop5): mount failed 04:30:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:30:55 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xb}) 04:30:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:55 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:55 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x4000}) 04:30:55 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)) setresuid(0x0, 0x0, 0x0) r2 = fork() kcmp(r1, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:30:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:30:55 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xd0}) [ 934.713065] loop3: detected capacity change from 0 to 262144 [ 934.725435] loop5: detected capacity change from 0 to 262144 04:30:55 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x2}) [ 934.762657] EXT4-fs error (device loop5): ext4_fill_super:4967: inode #2: comm syz-executor.5: iget: special inode unallocated [ 934.768142] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 934.769311] EXT4-fs (loop3): group descriptors corrupted! [ 934.775913] EXT4-fs (loop5): get root inode failed [ 934.776480] EXT4-fs (loop5): mount failed 04:30:55 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:30:55 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xb00}) 04:31:09 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:31:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:31:09 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)) setresuid(0x0, 0x0, 0x0) r2 = fork() kcmp(r1, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:31:09 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xb}) 04:31:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507a", 0x42}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:31:09 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x4000}) 04:31:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:31:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 949.226338] loop7: detected capacity change from 0 to 262144 04:31:09 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xb00}) [ 949.279722] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 949.281957] EXT4-fs (loop7): group descriptors corrupted! [ 949.293817] loop4: detected capacity change from 0 to 135266304 [ 949.299925] loop3: detected capacity change from 0 to 262144 [ 949.315923] loop5: detected capacity change from 0 to 262144 [ 949.328160] FAT-fs (loop4): bogus number of FAT sectors [ 949.329442] FAT-fs (loop4): Can't find a valid FAT filesystem [ 949.335216] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 949.335238] EXT4-fs (loop5): invalid first ino: 0 [ 949.335264] EXT4-fs (loop3): group descriptors corrupted! 04:31:09 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xd000}) 04:31:09 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x4000}) 04:31:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:31:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:31:25 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) r2 = fork() kcmp(0x0, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:31:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507a", 0x42}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:31:25 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:31:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:31:25 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xf423f}) 04:31:25 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xf423f}) [ 965.265337] loop4: detected capacity change from 0 to 135266304 [ 965.285603] loop3: detected capacity change from 0 to 262144 [ 965.295590] FAT-fs (loop4): bogus number of FAT sectors [ 965.296480] FAT-fs (loop4): Can't find a valid FAT filesystem [ 965.300407] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 965.301894] EXT4-fs (loop3): group descriptors corrupted! [ 965.321183] loop7: detected capacity change from 0 to 262144 [ 965.343928] loop5: detected capacity change from 0 to 262144 04:31:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507a", 0x42}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:31:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 965.395548] EXT4-fs (loop5): invalid first ino: 0 [ 965.401467] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 965.403685] EXT4-fs (loop7): group descriptors corrupted! [ 965.434345] loop3: detected capacity change from 0 to 262144 [ 965.441096] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 965.442505] EXT4-fs (loop3): group descriptors corrupted! 04:31:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:31:25 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x1000000}) 04:31:40 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x2000000}) 04:31:40 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) r2 = fork() kcmp(0x0, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:31:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:31:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db69", 0x63}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 979.955969] loop4: detected capacity change from 0 to 135266304 04:31:40 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:31:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:31:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:31:40 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x1000000}) [ 979.982304] loop5: detected capacity change from 0 to 262144 [ 979.997106] loop7: detected capacity change from 0 to 262144 [ 980.002054] FAT-fs (loop4): bogus number of FAT sectors [ 980.003269] FAT-fs (loop4): Can't find a valid FAT filesystem [ 980.006352] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 980.007603] EXT4-fs (loop7): group descriptors corrupted! 04:31:40 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xb000000}) 04:31:40 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xb000000}) [ 980.026016] loop3: detected capacity change from 0 to 262144 [ 980.040267] EXT4-fs (loop5): invalid first ino: 0 04:31:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db69", 0x63}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 980.075410] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 980.077370] EXT4-fs (loop3): group descriptors corrupted! 04:31:40 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 980.118219] loop7: detected capacity change from 0 to 262144 04:31:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 980.172794] loop5: detected capacity change from 0 to 262144 [ 980.177958] EXT4-fs (loop5): unsupported inode size: 0 [ 980.178770] EXT4-fs (loop5): blocksize: 4096 [ 980.201645] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 980.203586] EXT4-fs (loop7): group descriptors corrupted! 04:31:40 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x275cee97}) 04:31:40 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x275cee97}) 04:31:40 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) r2 = fork() kcmp(0x0, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:31:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:31:40 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 980.382413] loop5: detected capacity change from 0 to 262144 [ 980.391042] EXT4-fs (loop5): unsupported inode size: 0 [ 980.391721] EXT4-fs (loop5): blocksize: 4096 [ 980.392430] loop7: detected capacity change from 0 to 262144 [ 980.397854] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 980.399071] EXT4-fs (loop7): group descriptors corrupted! 04:31:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:31:56 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) fork() kcmp(r1, 0x0, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:31:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:31:56 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x3b9ac9ff}) 04:31:56 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x3b9ac9ff}) 04:31:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db69", 0x63}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:31:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:31:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 996.336988] loop3: detected capacity change from 0 to 262144 [ 996.348694] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 996.349983] EXT4-fs (loop3): group descriptors corrupted! 04:31:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e", 0x73}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 996.397790] loop4: detected capacity change from 0 to 135266304 04:31:56 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x3f420f00}) [ 996.433228] loop5: detected capacity change from 0 to 262144 [ 996.445880] loop7: detected capacity change from 0 to 262144 04:31:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 996.459106] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 996.460454] EXT4-fs (loop7): group descriptors corrupted! [ 996.461451] EXT4-fs (loop5): unsupported inode size: 0 [ 996.462817] EXT4-fs (loop5): blocksize: 4096 04:31:56 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x3f420f00}) 04:31:57 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x40000000}) 04:31:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 996.572961] loop3: detected capacity change from 0 to 262144 [ 996.579587] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:31:57 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x40000000}) 04:31:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 996.668466] loop5: detected capacity change from 0 to 262144 [ 996.725252] EXT4-fs (loop5): unsupported inode size: 0 [ 996.726600] EXT4-fs (loop5): blocksize: 4096 [ 1010.975320] loop3: detected capacity change from 0 to 262144 [ 1010.984911] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:32:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e", 0x73}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:32:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:11 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x97ee5c27}) 04:32:11 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x97ee5c27}) 04:32:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:32:11 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) fork() kcmp(r1, 0x0, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:32:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:11 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xffc99a3b}) [ 1011.018457] loop4: detected capacity change from 0 to 135266304 [ 1011.055062] loop5: detected capacity change from 0 to 262144 [ 1011.069684] loop7: detected capacity change from 0 to 262144 [ 1011.075870] EXT4-fs (loop5): unsupported inode size: 0 [ 1011.076731] EXT4-fs (loop5): blocksize: 4096 [ 1011.078634] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1011.080156] EXT4-fs (loop7): group descriptors corrupted! 04:32:11 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xd0000000}) 04:32:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:11 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xffc99a3b}) 04:32:11 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x100000000000000}) 04:32:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e", 0x73}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1011.235853] loop3: detected capacity change from 0 to 262144 [ 1011.245616] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1011.259083] loop5: detected capacity change from 0 to 262144 04:32:11 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x100000000000000}) 04:32:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1011.349077] loop7: detected capacity change from 0 to 262144 [ 1011.352749] EXT4-fs (loop5): unsupported inode size: 0 [ 1011.354188] EXT4-fs (loop5): blocksize: 4096 [ 1011.360731] EXT4-fs (loop7): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1011.362071] EXT4-fs (loop7): group descriptors corrupted! 04:32:11 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xb00000000000000}) [ 1011.421365] loop3: detected capacity change from 0 to 262144 [ 1011.424786] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:32:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1011.539165] loop3: detected capacity change from 0 to 262144 [ 1011.548094] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:32:25 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a", 0x7b}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:32:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:32:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:25 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x275cee97ffffffff}) 04:32:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:25 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) fork() kcmp(r1, 0x0, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 04:32:25 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x200000000000000}) [ 1025.128657] loop4: detected capacity change from 0 to 135266304 04:32:25 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xb00000000000000}) 04:32:25 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x3f420f0000000000}) [ 1025.146040] loop5: detected capacity change from 0 to 262144 [ 1025.155035] loop7: detected capacity change from 0 to 262144 [ 1025.172690] EXT4-fs (loop5): unsupported inode size: 0 [ 1025.173453] EXT4-fs (loop5): blocksize: 4096 [ 1025.180336] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1025.182642] EXT4-fs (loop7): group descriptors corrupted! [ 1025.193218] loop3: detected capacity change from 0 to 262144 [ 1025.218710] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:32:40 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x4000000000000000}) 04:32:40 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x275cee97ffffffff}) 04:32:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(0x0, 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:32:40 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 04:32:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a", 0x7b}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:32:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:40 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1040.343131] loop5: detected capacity change from 0 to 262144 [ 1040.349031] loop3: detected capacity change from 0 to 262144 [ 1040.359984] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:32:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a", 0x7b}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1040.409947] loop7: detected capacity change from 0 to 262144 [ 1040.411499] EXT4-fs (loop5): unsupported inode size: 0 [ 1040.412797] EXT4-fs (loop5): blocksize: 4096 [ 1040.419977] loop4: detected capacity change from 0 to 135266304 [ 1040.442509] loop3: detected capacity change from 0 to 262144 [ 1040.464771] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1040.466951] EXT4-fs (loop7): group descriptors corrupted! [ 1040.484620] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:32:40 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xd000000000000000}) 04:32:40 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x3f420f0000000000}) 04:32:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f", 0x7f}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:32:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:41 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:41 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x4000000000000000}) 04:32:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1040.658493] loop5: detected capacity change from 0 to 262144 [ 1040.670350] loop7: detected capacity change from 0 to 262144 [ 1040.690379] EXT4-fs (loop5): unsupported inode size: 0 [ 1040.691949] EXT4-fs (loop5): blocksize: 4096 [ 1040.700250] loop3: detected capacity change from 0 to 262144 [ 1040.707510] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1040.710083] EXT4-fs (loop7): group descriptors corrupted! [ 1040.727595] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:32:55 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xffc99a3b00000000}) 04:32:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(0x0, 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:32:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f", 0x7f}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:32:55 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:55 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 04:32:55 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xffc99a3b00000000}) [ 1054.872915] loop5: detected capacity change from 0 to 262144 04:32:55 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xffffffff97ee5c27}) [ 1054.894442] loop3: detected capacity change from 0 to 262144 04:32:55 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xffffffff97ee5c27}) [ 1054.898966] loop4: detected capacity change from 0 to 135266304 [ 1054.904958] loop7: detected capacity change from 0 to 262144 [ 1054.908685] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1054.909637] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1054.914028] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 04:32:55 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x2}) 04:32:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:55 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:32:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f", 0x7f}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:32:55 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xb}) [ 1055.080935] loop5: detected capacity change from 0 to 262144 04:32:55 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xb}) [ 1055.104186] loop7: detected capacity change from 0 to 262144 [ 1055.126708] loop3: detected capacity change from 0 to 262144 [ 1055.134519] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1055.155859] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1055.162227] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:32:55 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xb00}) 04:33:09 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xd0}) 04:33:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f5431", 0x81}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:33:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:33:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:33:09 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:33:09 executing program 2: r0 = fsopen(&(0x7f00000002c0)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x34, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x800, 0x7}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = clone3(&(0x7f0000004600)={0x10800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/78, 0x4e, &(0x7f0000000300)=""/44, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = fork() kcmp(r1, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 04:33:09 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x4000}) 04:33:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(0x0, 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:33:10 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xf423f}) [ 1069.564702] loop7: detected capacity change from 0 to 262144 04:33:10 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xb00}) [ 1069.583949] loop5: detected capacity change from 0 to 262144 [ 1069.588282] loop3: detected capacity change from 0 to 262144 [ 1069.622984] loop4: detected capacity change from 0 to 135266304 [ 1069.630961] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1069.638923] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1069.660541] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 1069.669023] EXT4-fs (loop3): get root inode failed [ 1069.670298] EXT4-fs (loop3): mount failed 04:33:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f5431", 0x81}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:33:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:33:10 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x1000000}) 04:33:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, 0x0) 04:33:10 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x4000}) 04:33:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1069.957114] loop7: detected capacity change from 0 to 262144 [ 1069.975342] loop3: detected capacity change from 0 to 262144 [ 1070.007502] loop5: detected capacity change from 0 to 262144 [ 1070.015689] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1070.035694] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 1070.052941] EXT4-fs (loop3): get root inode failed [ 1070.054164] EXT4-fs (loop3): mount failed 04:33:27 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x2000000}) 04:33:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:33:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:33:27 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xd000}) [ 1087.040718] loop3: detected capacity change from 0 to 262144 04:33:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(0x0, 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:33:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, 0x0) 04:33:27 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:33:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f5431", 0x81}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1087.052168] loop5: detected capacity change from 0 to 262144 [ 1087.065784] loop4: detected capacity change from 0 to 135266304 [ 1087.088206] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 1087.093894] EXT4-fs (loop3): get root inode failed [ 1087.095273] EXT4-fs (loop3): mount failed [ 1087.098135] loop7: detected capacity change from 0 to 262144 04:33:27 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xb000000}) 04:33:27 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xf423f}) [ 1087.120968] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 04:33:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, 0x0) 04:33:27 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:33:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:33:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e", 0x82}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1087.272787] loop7: detected capacity change from 0 to 262144 [ 1087.297742] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 04:33:27 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x275cee97}) [ 1087.314430] loop5: detected capacity change from 0 to 262144 04:33:27 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x1000000}) [ 1087.363002] loop3: detected capacity change from 0 to 262144 [ 1087.434360] EXT4-fs (loop3): invalid first ino: 0 04:33:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:33:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:33:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:33:44 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x100000000000000}) 04:33:44 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x3b9ac9ff}) 04:33:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(0x0, 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:33:44 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xb000000}) 04:33:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e", 0x82}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1103.664968] loop7: detected capacity change from 0 to 262144 [ 1103.682252] loop4: detected capacity change from 0 to 135266304 [ 1103.695172] loop3: detected capacity change from 0 to 262144 04:33:44 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x275cee97}) 04:33:44 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x3f420f00}) [ 1103.730420] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1103.760855] EXT4-fs (loop3): invalid first ino: 0 04:33:44 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0xb000000}) 04:33:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:33:44 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x40000000}) 04:33:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:33:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e", 0x82}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:33:44 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x3b9ac9ff}) [ 1104.007266] loop3: detected capacity change from 0 to 262144 [ 1104.021019] loop7: detected capacity change from 0 to 262144 [ 1104.064773] EXT4-fs (loop3): invalid first ino: 0 [ 1104.075582] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 04:33:44 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000}) 04:33:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(0x0, 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:34:00 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x97ee5c27}) 04:34:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:34:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:34:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:34:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:34:00 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x3f420f00}) 04:34:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:34:00 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000}) [ 1120.511735] loop3: detected capacity change from 0 to 262144 [ 1120.519678] loop7: detected capacity change from 0 to 262144 [ 1120.532937] loop4: detected capacity change from 0 to 135266304 [ 1120.538774] EXT4-fs (loop3): unsupported inode size: 0 [ 1120.540064] EXT4-fs (loop3): blocksize: 4096 [ 1120.542359] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 04:34:01 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x40000000}) 04:34:01 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xffc99a3b}) 04:34:01 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000}) 04:34:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:34:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:34:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:34:01 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x97ee5c27}) [ 1120.700083] loop3: detected capacity change from 0 to 262144 [ 1120.719657] EXT4-fs (loop3): unsupported inode size: 0 [ 1120.720295] EXT4-fs (loop3): blocksize: 4096 [ 1120.723312] loop7: detected capacity change from 0 to 262144 [ 1120.741180] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 04:34:15 executing program 5: clock_adjtime(0x0, 0x0) 04:34:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 1) 04:34:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:34:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:34:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:34:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:34:15 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xd0000000}) 04:34:15 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x100000000000000}) [ 1134.996996] FAULT_INJECTION: forcing a failure. [ 1134.996996] name failslab, interval 1, probability 0, space 0, times 1 [ 1134.999910] CPU: 1 PID: 15684 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1135.001685] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1135.003804] Call Trace: [ 1135.004497] dump_stack+0x107/0x167 [ 1135.005437] should_fail.cold+0x5/0xa [ 1135.006415] ? __do_sys_memfd_create+0xfb/0x450 [ 1135.007611] should_failslab+0x5/0x20 [ 1135.008591] __kmalloc+0x72/0x390 [ 1135.009490] __do_sys_memfd_create+0xfb/0x450 [ 1135.010640] ? ksys_write+0x1a9/0x260 [ 1135.011617] ? memfd_file_seals_ptr+0x170/0x170 [ 1135.012835] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1135.014177] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1135.015505] do_syscall_64+0x33/0x40 [ 1135.016466] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1135.017780] RIP: 0033:0x7fe0a08fcb19 [ 1135.018739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1135.023094] RSP: 002b:00007fe09de71f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1135.024826] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe0a08fcb19 [ 1135.026442] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007fe0a09560fb [ 1135.028083] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1135.029696] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1135.031318] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 04:34:15 executing program 5: clock_adjtime(0x0, 0x0) [ 1135.049512] loop4: detected capacity change from 0 to 135266304 [ 1135.070001] loop3: detected capacity change from 0 to 262144 04:34:15 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x200000000000000}) [ 1135.078833] loop7: detected capacity change from 0 to 262144 [ 1135.103844] EXT4-fs (loop3): unsupported inode size: 0 [ 1135.105179] EXT4-fs (loop3): blocksize: 4096 [ 1135.114678] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 04:34:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 2) 04:34:15 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xffc99a3b}) 04:34:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:34:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {0x0}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1135.306469] FAULT_INJECTION: forcing a failure. [ 1135.306469] name failslab, interval 1, probability 0, space 0, times 0 [ 1135.308906] CPU: 1 PID: 15705 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1135.310370] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1135.312135] Call Trace: [ 1135.312697] dump_stack+0x107/0x167 [ 1135.313467] should_fail.cold+0x5/0xa [ 1135.314269] ? create_object.isra.0+0x3a/0xa20 [ 1135.315231] should_failslab+0x5/0x20 [ 1135.316040] kmem_cache_alloc+0x5b/0x310 [ 1135.316903] create_object.isra.0+0x3a/0xa20 [ 1135.317826] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1135.318898] __kmalloc+0x16e/0x390 [ 1135.319654] __do_sys_memfd_create+0xfb/0x450 [ 1135.320613] ? ksys_write+0x1a9/0x260 [ 1135.321415] ? memfd_file_seals_ptr+0x170/0x170 [ 1135.322405] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1135.323507] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1135.324601] do_syscall_64+0x33/0x40 [ 1135.325385] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1135.326467] RIP: 0033:0x7fe0a08fcb19 [ 1135.327252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1135.331131] RSP: 002b:00007fe09de71f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1135.332747] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe0a08fcb19 [ 1135.334248] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007fe0a09560fb [ 1135.335752] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1135.337258] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1135.338762] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 04:34:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:34:15 executing program 5: clock_adjtime(0x0, 0x0) [ 1135.368279] loop3: detected capacity change from 0 to 262144 [ 1135.378316] EXT4-fs (loop3): unsupported inode size: 0 [ 1135.379576] EXT4-fs (loop3): blocksize: 4096 [ 1135.418182] loop7: detected capacity change from 0 to 262144 [ 1135.458239] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 04:34:33 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x100000000000000}) 04:34:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:34:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:34:33 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:34:33 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)) 04:34:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {0x0}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1153.056438] FAULT_INJECTION: forcing a failure. [ 1153.056438] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1153.057787] loop3: detected capacity change from 0 to 262144 [ 1153.058968] CPU: 0 PID: 15734 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1153.061225] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1153.062984] Call Trace: 04:34:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 3) 04:34:33 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xb00000000000000}) [ 1153.063550] dump_stack+0x107/0x167 [ 1153.064445] should_fail.cold+0x5/0xa [ 1153.065259] _copy_from_user+0x2e/0x1b0 [ 1153.066103] __do_sys_memfd_create+0x16d/0x450 [ 1153.067065] ? memfd_file_seals_ptr+0x170/0x170 [ 1153.068052] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1153.069164] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1153.070256] do_syscall_64+0x33/0x40 [ 1153.071039] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1153.072113] RIP: 0033:0x7fe0a08fcb19 [ 1153.072904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1153.076782] RSP: 002b:00007fe09de71f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1153.078378] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe0a08fcb19 [ 1153.079869] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007fe0a09560fb [ 1153.081367] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1153.082857] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1153.084360] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 04:34:33 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)) [ 1153.097932] loop4: detected capacity change from 0 to 135266304 [ 1153.100919] loop7: detected capacity change from 0 to 262144 [ 1153.121461] EXT4-fs (loop3): unsupported inode size: 0 [ 1153.122316] EXT4-fs (loop3): blocksize: 4096 [ 1153.134438] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 1153.137819] EXT4-fs (loop7): get root inode failed [ 1153.139055] EXT4-fs (loop7): mount failed 04:34:33 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xb00000000000000}) 04:34:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 4) 04:34:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1153.294368] FAULT_INJECTION: forcing a failure. [ 1153.294368] name failslab, interval 1, probability 0, space 0, times 0 [ 1153.296922] CPU: 0 PID: 15749 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1153.298445] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1153.300279] Call Trace: [ 1153.300864] dump_stack+0x107/0x167 [ 1153.301665] should_fail.cold+0x5/0xa [ 1153.302500] ? shmem_alloc_inode+0x18/0x40 [ 1153.303436] should_failslab+0x5/0x20 [ 1153.304280] kmem_cache_alloc+0x5b/0x310 [ 1153.305194] ? shmem_destroy_inode+0x70/0x70 [ 1153.306161] shmem_alloc_inode+0x18/0x40 [ 1153.307043] ? shmem_destroy_inode+0x70/0x70 [ 1153.308001] alloc_inode+0x63/0x240 [ 1153.308807] new_inode+0x23/0x250 [ 1153.309569] shmem_get_inode+0x15e/0xbc0 [ 1153.310462] __shmem_file_setup+0xb8/0x320 [ 1153.311396] ? _copy_from_user+0xfb/0x1b0 [ 1153.312320] __do_sys_memfd_create+0x275/0x450 [ 1153.313325] ? memfd_file_seals_ptr+0x170/0x170 [ 1153.314351] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1153.315497] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1153.316634] do_syscall_64+0x33/0x40 [ 1153.317453] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1153.318569] RIP: 0033:0x7fe0a08fcb19 [ 1153.319377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1153.323403] RSP: 002b:00007fe09de71f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1153.325067] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe0a08fcb19 [ 1153.326606] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007fe0a09560fb [ 1153.328142] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1153.329687] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1153.331226] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 04:34:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {0x0}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:34:33 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1153.352240] loop3: detected capacity change from 0 to 262144 04:34:33 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)) 04:34:33 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x275cee97ffffffff}) 04:34:33 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x275cee97ffffffff}) [ 1153.380938] EXT4-fs (loop3): unsupported inode size: 0 [ 1153.381617] EXT4-fs (loop3): blocksize: 4096 [ 1153.384050] loop7: detected capacity change from 0 to 262144 [ 1153.417002] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 1153.418770] EXT4-fs (loop7): get root inode failed [ 1153.419357] EXT4-fs (loop7): mount failed 04:34:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:34:49 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:34:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:34:49 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x3f420f0000000000}) 04:34:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 5) 04:34:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:34:49 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000}) (fail_nth: 1) 04:34:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:34:49 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x3f420f0000000000}) [ 1169.056266] FAULT_INJECTION: forcing a failure. [ 1169.056266] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1169.058854] CPU: 1 PID: 15786 Comm: syz-executor.5 Not tainted 5.10.236 #1 [ 1169.060351] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1169.062103] Call Trace: [ 1169.062677] dump_stack+0x107/0x167 [ 1169.063467] should_fail.cold+0x5/0xa [ 1169.064299] _copy_from_user+0x2e/0x1b0 [ 1169.065188] __do_sys_clock_adjtime+0x88/0x260 [ 1169.066173] ? posix_timer_fn+0x3e0/0x3e0 [ 1169.067069] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1169.068112] ? wait_for_completion_io+0x270/0x270 [ 1169.069167] ? rcu_read_lock_any_held+0x75/0xa0 [ 1169.070170] ? vfs_write+0x354/0xb10 [ 1169.070974] ? fput_many+0x2f/0x1a0 [ 1169.071760] ? ksys_write+0x1a9/0x260 [ 1169.072596] ? __ia32_sys_read+0xb0/0xb0 [ 1169.073479] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1169.074612] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1169.075732] ? trace_hardirqs_on+0x5b/0x180 [ 1169.076674] do_syscall_64+0x33/0x40 [ 1169.077479] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1169.078583] RIP: 0033:0x7fd8dafd5b19 [ 1169.079386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1169.083386] RSP: 002b:00007fd8d854b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000131 [ 1169.085042] RAX: ffffffffffffffda RBX: 00007fd8db0e8f60 RCX: 00007fd8dafd5b19 [ 1169.086595] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000000 [ 1169.088136] RBP: 00007fd8d854b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1169.089684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1169.091246] R13: 00007ffcfd0a52ff R14: 00007fd8d854b300 R15: 0000000000022000 [ 1169.095320] FAULT_INJECTION: forcing a failure. [ 1169.095320] name failslab, interval 1, probability 0, space 0, times 0 [ 1169.097904] CPU: 0 PID: 15788 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1169.099403] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1169.101210] Call Trace: [ 1169.101784] dump_stack+0x107/0x167 [ 1169.102578] should_fail.cold+0x5/0xa [ 1169.103403] ? create_object.isra.0+0x3a/0xa20 [ 1169.104402] should_failslab+0x5/0x20 [ 1169.105227] kmem_cache_alloc+0x5b/0x310 [ 1169.106117] create_object.isra.0+0x3a/0xa20 [ 1169.107065] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1169.108169] kmem_cache_alloc+0x159/0x310 [ 1169.109087] ? shmem_destroy_inode+0x70/0x70 [ 1169.110039] shmem_alloc_inode+0x18/0x40 [ 1169.110917] ? shmem_destroy_inode+0x70/0x70 [ 1169.111864] alloc_inode+0x63/0x240 [ 1169.112665] new_inode+0x23/0x250 [ 1169.113421] shmem_get_inode+0x15e/0xbc0 [ 1169.114317] __shmem_file_setup+0xb8/0x320 [ 1169.115232] ? _copy_from_user+0xfb/0x1b0 [ 1169.116139] __do_sys_memfd_create+0x275/0x450 [ 1169.117138] ? memfd_file_seals_ptr+0x170/0x170 [ 1169.118148] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1169.119288] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1169.120415] do_syscall_64+0x33/0x40 [ 1169.121312] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1169.122439] RIP: 0033:0x7fe0a08fcb19 [ 1169.123246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1169.127246] RSP: 002b:00007fe09de71f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1169.128905] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe0a08fcb19 [ 1169.130451] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007fe0a09560fb [ 1169.132000] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1169.133545] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1169.135087] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1169.139262] loop3: detected capacity change from 0 to 262144 04:34:49 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x4000000000000000}) 04:34:49 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x4000000000000000}) [ 1169.187902] loop4: detected capacity change from 0 to 135266304 04:34:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 6) [ 1169.213028] loop7: detected capacity change from 0 to 262144 [ 1169.223678] EXT4-fs (loop3): unsupported inode size: 0 [ 1169.224957] EXT4-fs (loop3): blocksize: 4096 04:34:49 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000}) (fail_nth: 2) [ 1169.283187] FAULT_INJECTION: forcing a failure. [ 1169.283187] name failslab, interval 1, probability 0, space 0, times 0 [ 1169.285641] CPU: 0 PID: 15802 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1169.287095] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1169.288852] Call Trace: [ 1169.289407] dump_stack+0x107/0x167 [ 1169.290172] should_fail.cold+0x5/0xa [ 1169.290981] ? security_inode_alloc+0x34/0x160 [ 1169.291941] should_failslab+0x5/0x20 [ 1169.292754] kmem_cache_alloc+0x5b/0x310 [ 1169.293628] security_inode_alloc+0x34/0x160 [ 1169.294548] inode_init_always+0xa4e/0xd10 [ 1169.295434] ? shmem_destroy_inode+0x70/0x70 [ 1169.296367] alloc_inode+0x84/0x240 [ 1169.297143] new_inode+0x23/0x250 [ 1169.297883] shmem_get_inode+0x15e/0xbc0 [ 1169.298753] __shmem_file_setup+0xb8/0x320 [ 1169.299655] ? _copy_from_user+0xfb/0x1b0 [ 1169.300541] __do_sys_memfd_create+0x275/0x450 [ 1169.301511] ? memfd_file_seals_ptr+0x170/0x170 [ 1169.302496] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1169.303593] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1169.304679] do_syscall_64+0x33/0x40 [ 1169.305457] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1169.306531] RIP: 0033:0x7fe0a08fcb19 [ 1169.307312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1169.311197] RSP: 002b:00007fe09de71f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1169.312816] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe0a08fcb19 [ 1169.314313] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007fe0a09560fb [ 1169.315827] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1169.317324] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1169.318835] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 04:34:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1169.322618] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 1169.329235] EXT4-fs (loop7): get root inode failed [ 1169.331485] EXT4-fs (loop7): mount failed [ 1169.386467] FAULT_INJECTION: forcing a failure. [ 1169.386467] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1169.389459] CPU: 1 PID: 15804 Comm: syz-executor.5 Not tainted 5.10.236 #1 [ 1169.391176] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1169.393244] Call Trace: [ 1169.393900] dump_stack+0x107/0x167 [ 1169.394810] should_fail.cold+0x5/0xa [ 1169.395766] _copy_to_user+0x2e/0x180 [ 1169.396727] simple_read_from_buffer+0xcc/0x160 [ 1169.397896] proc_fail_nth_read+0x198/0x230 [ 1169.398980] ? proc_sessionid_read+0x230/0x230 [ 1169.400118] ? security_file_permission+0xb1/0xe0 [ 1169.401333] ? proc_sessionid_read+0x230/0x230 [ 1169.402465] vfs_read+0x228/0x620 [ 1169.403337] ksys_read+0x12d/0x260 [ 1169.404220] ? vfs_write+0xb10/0xb10 [ 1169.405163] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1169.406465] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1169.407754] do_syscall_64+0x33/0x40 [ 1169.408687] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1169.409969] RIP: 0033:0x7fd8daf8869c [ 1169.410895] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1169.415490] RSP: 002b:00007fd8d854b170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1169.417401] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fd8daf8869c [ 1169.419176] RDX: 000000000000000f RSI: 00007fd8d854b1e0 RDI: 0000000000000003 [ 1169.420953] RBP: 00007fd8d854b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1169.422713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1169.424478] R13: 00007ffcfd0a52ff R14: 00007fd8d854b300 R15: 0000000000022000 04:35:05 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xffc99a3b00000000}) 04:35:05 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xd000000000000000}) 04:35:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 1185.177822] FAULT_INJECTION: forcing a failure. [ 1185.177822] name failslab, interval 1, probability 0, space 0, times 0 [ 1185.179643] CPU: 0 PID: 15823 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1185.180692] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1185.180906] loop7: detected capacity change from 0 to 262144 [ 1185.181940] Call Trace: [ 1185.181962] dump_stack+0x107/0x167 [ 1185.181979] should_fail.cold+0x5/0xa [ 1185.182003] ? create_object.isra.0+0x3a/0xa20 [ 1185.185517] should_failslab+0x5/0x20 [ 1185.186095] kmem_cache_alloc+0x5b/0x310 [ 1185.186708] create_object.isra.0+0x3a/0xa20 [ 1185.187362] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1185.188127] kmem_cache_alloc+0x159/0x310 [ 1185.188770] security_inode_alloc+0x34/0x160 [ 1185.189423] inode_init_always+0xa4e/0xd10 [ 1185.190051] ? shmem_destroy_inode+0x70/0x70 [ 1185.190704] alloc_inode+0x84/0x240 [ 1185.191243] new_inode+0x23/0x250 [ 1185.191759] shmem_get_inode+0x15e/0xbc0 [ 1185.192365] __shmem_file_setup+0xb8/0x320 [ 1185.193003] ? _copy_from_user+0xfb/0x1b0 [ 1185.193616] __do_sys_memfd_create+0x275/0x450 [ 1185.194288] ? memfd_file_seals_ptr+0x170/0x170 [ 1185.194978] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1185.195753] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1185.196522] do_syscall_64+0x33/0x40 [ 1185.197110] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1185.197874] RIP: 0033:0x7fe0a08fcb19 [ 1185.198425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1185.201159] RSP: 002b:00007fe09de71f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1185.202284] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe0a08fcb19 [ 1185.203334] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007fe0a09560fb [ 1185.204385] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1185.205448] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1185.206503] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1185.214184] EXT4-fs (loop7): invalid first ino: 0 [ 1185.215866] loop4: detected capacity change from 0 to 135266304 04:35:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {0x0}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:35:05 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000}) 04:35:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 7) 04:35:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:35:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1185.227160] loop3: detected capacity change from 0 to 262144 04:35:05 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xffffffff97ee5c27}) 04:35:05 executing program 5: clock_adjtime(0xb, &(0x7f0000000200)={0x4000}) 04:35:05 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xffc99a3b00000000}) [ 1185.268679] EXT4-fs (loop3): unsupported inode size: 0 [ 1185.269465] EXT4-fs (loop3): blocksize: 4096 04:35:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1185.374915] loop7: detected capacity change from 0 to 262144 [ 1185.379075] EXT4-fs (loop7): invalid first ino: 0 04:35:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:35:05 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x2}) 04:35:05 executing program 5: clock_adjtime(0xb00, &(0x7f0000000200)={0x4000}) 04:35:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {0x0}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:35:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 8) 04:35:05 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0xffffffff97ee5c27}) [ 1185.496207] loop3: detected capacity change from 0 to 262144 [ 1185.503664] FAULT_INJECTION: forcing a failure. [ 1185.503664] name failslab, interval 1, probability 0, space 0, times 0 [ 1185.505181] CPU: 0 PID: 15851 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1185.506197] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1185.507299] Call Trace: [ 1185.507636] dump_stack+0x107/0x167 [ 1185.508110] should_fail.cold+0x5/0xa [ 1185.508618] ? __d_alloc+0x2a/0x990 [ 1185.509092] should_failslab+0x5/0x20 [ 1185.509588] kmem_cache_alloc+0x5b/0x310 [ 1185.510115] ? trace_hardirqs_on+0x5b/0x180 [ 1185.510674] __d_alloc+0x2a/0x990 [ 1185.511126] d_alloc_pseudo+0x19/0x70 [ 1185.511624] alloc_file_pseudo+0xce/0x250 [ 1185.512157] ? alloc_file+0x5a0/0x5a0 [ 1185.512666] ? shmem_get_inode+0x55c/0xbc0 [ 1185.513218] __shmem_file_setup+0x144/0x320 [ 1185.513782] ? _copy_from_user+0xfb/0x1b0 [ 1185.514320] __do_sys_memfd_create+0x275/0x450 [ 1185.514915] ? memfd_file_seals_ptr+0x170/0x170 [ 1185.515521] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1185.516201] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1185.516883] do_syscall_64+0x33/0x40 [ 1185.517361] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1185.518020] RIP: 0033:0x7fe0a08fcb19 [ 1185.518494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1185.520849] RSP: 002b:00007fe09de71f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1185.521833] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe0a08fcb19 [ 1185.522746] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007fe0a09560fb [ 1185.523623] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1185.524537] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1185.525417] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1185.540747] EXT4-fs (loop3): unsupported inode size: 0 [ 1185.542091] EXT4-fs (loop3): blocksize: 4096 04:35:21 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xb}) 04:35:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:35:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 9) 04:35:21 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xb}) 04:35:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {0x0}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:35:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:35:21 executing program 5: clock_adjtime(0x1000000, &(0x7f0000000200)={0x4000}) 04:35:21 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1200.747270] FAULT_INJECTION: forcing a failure. [ 1200.747270] name failslab, interval 1, probability 0, space 0, times 0 [ 1200.750132] CPU: 1 PID: 15872 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1200.751838] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1200.753909] Call Trace: [ 1200.754565] dump_stack+0x107/0x167 [ 1200.755470] should_fail.cold+0x5/0xa [ 1200.756415] ? create_object.isra.0+0x3a/0xa20 [ 1200.757555] should_failslab+0x5/0x20 [ 1200.758496] kmem_cache_alloc+0x5b/0x310 [ 1200.759508] create_object.isra.0+0x3a/0xa20 [ 1200.760589] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1200.761863] kmem_cache_alloc+0x159/0x310 [ 1200.762890] ? trace_hardirqs_on+0x5b/0x180 [ 1200.763960] __d_alloc+0x2a/0x990 [ 1200.764831] d_alloc_pseudo+0x19/0x70 [ 1200.765760] alloc_file_pseudo+0xce/0x250 [ 1200.766771] ? alloc_file+0x5a0/0x5a0 [ 1200.767710] ? shmem_get_inode+0x55c/0xbc0 [ 1200.768767] __shmem_file_setup+0x144/0x320 [ 1200.769825] ? _copy_from_user+0xfb/0x1b0 [ 1200.770843] __do_sys_memfd_create+0x275/0x450 [ 1200.771962] ? memfd_file_seals_ptr+0x170/0x170 [ 1200.773112] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1200.774396] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1200.775657] do_syscall_64+0x33/0x40 [ 1200.776569] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1200.777830] RIP: 0033:0x7fe0a08fcb19 [ 1200.778737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1200.783234] RSP: 002b:00007fe09de71f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1200.785102] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe0a08fcb19 [ 1200.786844] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007fe0a09560fb [ 1200.788584] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1200.790331] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1200.792056] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1200.802039] loop4: detected capacity change from 0 to 135266304 [ 1200.812261] loop3: detected capacity change from 0 to 262144 [ 1200.821838] loop7: detected capacity change from 0 to 262144 [ 1200.827848] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1200.844815] EXT4-fs (loop7): invalid first ino: 0 04:35:21 executing program 5: clock_adjtime(0xb000000, &(0x7f0000000200)={0x4000}) 04:35:21 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xd0}) 04:35:21 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:35:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1200.981294] loop7: detected capacity change from 0 to 262144 [ 1200.990494] EXT4-fs (loop7): unsupported inode size: 0 04:35:21 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xb00}) [ 1200.991740] EXT4-fs (loop7): blocksize: 4096 04:35:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 10) [ 1201.032547] FAULT_INJECTION: forcing a failure. [ 1201.032547] name failslab, interval 1, probability 0, space 0, times 0 [ 1201.035067] CPU: 1 PID: 15891 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1201.036576] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1201.038396] Call Trace: [ 1201.038979] dump_stack+0x107/0x167 [ 1201.039775] should_fail.cold+0x5/0xa [ 1201.040608] ? __alloc_file+0x21/0x320 [ 1201.041473] should_failslab+0x5/0x20 [ 1201.042298] kmem_cache_alloc+0x5b/0x310 [ 1201.043187] __alloc_file+0x21/0x320 [ 1201.043994] alloc_empty_file+0x6d/0x170 04:35:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1201.044883] alloc_file+0x5e/0x5a0 [ 1201.045816] alloc_file_pseudo+0x16a/0x250 [ 1201.046728] ? alloc_file+0x5a0/0x5a0 [ 1201.047558] ? shmem_get_inode+0x55c/0xbc0 [ 1201.048488] __shmem_file_setup+0x144/0x320 [ 1201.049439] ? _copy_from_user+0xfb/0x1b0 [ 1201.050339] __do_sys_memfd_create+0x275/0x450 [ 1201.051325] ? memfd_file_seals_ptr+0x170/0x170 [ 1201.052332] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1201.053472] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1201.054587] do_syscall_64+0x33/0x40 [ 1201.055392] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1201.056497] RIP: 0033:0x7fe0a08fcb19 [ 1201.057424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1201.062075] RSP: 002b:00007fe09de71f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1201.063968] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe0a08fcb19 [ 1201.065762] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007fe0a09560fb [ 1201.067551] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1201.069342] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1201.071127] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 04:35:21 executing program 5: clock_adjtime(0x100000000000000, &(0x7f0000000200)={0x4000}) [ 1201.110042] loop3: detected capacity change from 0 to 262144 [ 1201.147934] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:35:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:35:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:35:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:35:37 executing program 5: clock_adjtime(0xb00000000000000, &(0x7f0000000200)={0x4000}) 04:35:37 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x4000}) 04:35:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 11) 04:35:37 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xb00}) 04:35:37 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xf423f}) [ 1216.586891] loop3: detected capacity change from 0 to 262144 [ 1216.596276] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:35:37 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1216.615965] loop4: detected capacity change from 0 to 135266304 04:35:37 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x400b}) [ 1216.632617] FAULT_INJECTION: forcing a failure. [ 1216.632617] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.633974] CPU: 0 PID: 15925 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1216.634805] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1216.635797] Call Trace: [ 1216.636122] dump_stack+0x107/0x167 [ 1216.636554] should_fail.cold+0x5/0xa [ 1216.637007] ? create_object.isra.0+0x3a/0xa20 [ 1216.637554] should_failslab+0x5/0x20 [ 1216.638006] kmem_cache_alloc+0x5b/0x310 [ 1216.638491] create_object.isra.0+0x3a/0xa20 [ 1216.638999] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1216.639606] kmem_cache_alloc+0x159/0x310 [ 1216.640102] __alloc_file+0x21/0x320 [ 1216.640543] alloc_empty_file+0x6d/0x170 [ 1216.641031] alloc_file+0x5e/0x5a0 [ 1216.641446] alloc_file_pseudo+0x16a/0x250 [ 1216.641947] ? alloc_file+0x5a0/0x5a0 [ 1216.642391] ? shmem_get_inode+0x55c/0xbc0 [ 1216.642899] __shmem_file_setup+0x144/0x320 [ 1216.643418] ? _copy_from_user+0xfb/0x1b0 [ 1216.643909] __do_sys_memfd_create+0x275/0x450 [ 1216.644449] ? memfd_file_seals_ptr+0x170/0x170 [ 1216.645017] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1216.645640] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1216.646254] do_syscall_64+0x33/0x40 [ 1216.646694] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1216.647298] RIP: 0033:0x7fe0a08fcb19 [ 1216.647730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1216.649915] RSP: 002b:00007fe09de71f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1216.650821] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe0a08fcb19 [ 1216.651669] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007fe0a09560fb [ 1216.652519] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1216.653353] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1216.654187] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1216.674971] loop7: detected capacity change from 0 to 262144 [ 1216.681763] EXT4-fs (loop7): unsupported inode size: 0 [ 1216.682394] EXT4-fs (loop7): blocksize: 4096 04:35:37 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x1000000}) 04:35:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, 0x0) 04:35:37 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x4000}) [ 1216.822082] loop3: detected capacity change from 0 to 262144 04:35:37 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:35:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1216.832095] loop7: detected capacity change from 0 to 262144 [ 1216.835922] EXT4-fs (loop7): unsupported inode size: 0 [ 1216.836572] EXT4-fs (loop7): blocksize: 4096 04:35:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 12) 04:35:37 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1216.887286] loop7: detected capacity change from 0 to 262144 [ 1216.890791] EXT4-fs (loop7): unsupported inode size: 0 [ 1216.891450] EXT4-fs (loop7): blocksize: 4096 [ 1216.939675] FAULT_INJECTION: forcing a failure. [ 1216.939675] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.941019] CPU: 0 PID: 15948 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1216.941833] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1216.942807] Call Trace: [ 1216.943123] dump_stack+0x107/0x167 [ 1216.943548] should_fail.cold+0x5/0xa [ 1216.944000] ? security_file_alloc+0x34/0x170 [ 1216.944527] should_failslab+0x5/0x20 [ 1216.944992] kmem_cache_alloc+0x5b/0x310 [ 1216.945461] security_file_alloc+0x34/0x170 [ 1216.945959] __alloc_file+0xb7/0x320 [ 1216.946395] alloc_empty_file+0x6d/0x170 [ 1216.946862] alloc_file+0x5e/0x5a0 [ 1216.947278] alloc_file_pseudo+0x16a/0x250 [ 1216.947776] ? alloc_file+0x5a0/0x5a0 [ 1216.948219] ? shmem_get_inode+0x55c/0xbc0 [ 1216.948719] __shmem_file_setup+0x144/0x320 [ 1216.949231] ? _copy_from_user+0xfb/0x1b0 [ 1216.949722] __do_sys_memfd_create+0x275/0x450 [ 1216.950255] ? memfd_file_seals_ptr+0x170/0x170 [ 1216.950807] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1216.951418] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1216.952019] do_syscall_64+0x33/0x40 [ 1216.952453] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1216.953053] RIP: 0033:0x7fe0a08fcb19 [ 1216.953484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1216.955596] RSP: 002b:00007fe09de71f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1216.956485] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe0a08fcb19 [ 1216.957308] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007fe0a09560fb [ 1216.958120] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1216.958941] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1216.959750] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 04:35:52 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x2000000}) 04:35:52 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xd000}) 04:35:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:35:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 13) [ 1231.736215] FAULT_INJECTION: forcing a failure. [ 1231.736215] name failslab, interval 1, probability 0, space 0, times 0 [ 1231.738404] CPU: 1 PID: 15958 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1231.739692] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1231.741254] Call Trace: [ 1231.741751] dump_stack+0x107/0x167 [ 1231.742433] should_fail.cold+0x5/0xa [ 1231.743149] ? create_object.isra.0+0x3a/0xa20 [ 1231.744010] should_failslab+0x5/0x20 [ 1231.744740] kmem_cache_alloc+0x5b/0x310 04:35:52 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0xb}) 04:35:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:35:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322", 0x1a}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:35:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, 0x0) [ 1231.745515] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1231.746737] create_object.isra.0+0x3a/0xa20 [ 1231.747596] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1231.748593] kmem_cache_alloc+0x159/0x310 [ 1231.749422] security_file_alloc+0x34/0x170 [ 1231.750274] __alloc_file+0xb7/0x320 [ 1231.751003] alloc_empty_file+0x6d/0x170 [ 1231.751797] alloc_file+0x5e/0x5a0 [ 1231.752493] alloc_file_pseudo+0x16a/0x250 [ 1231.753328] ? alloc_file+0x5a0/0x5a0 [ 1231.754080] ? shmem_get_inode+0x55c/0xbc0 [ 1231.754917] __shmem_file_setup+0x144/0x320 [ 1231.755765] ? _copy_from_user+0xfb/0x1b0 [ 1231.756582] __do_sys_memfd_create+0x275/0x450 [ 1231.757492] ? memfd_file_seals_ptr+0x170/0x170 [ 1231.758409] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1231.759435] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1231.760446] do_syscall_64+0x33/0x40 [ 1231.761186] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1231.762190] RIP: 0033:0x7fe0a08fcb19 [ 1231.762918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1231.766543] RSP: 002b:00007fe09de71f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1231.768052] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe0a08fcb19 [ 1231.769474] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007fe0a09560fb [ 1231.770884] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1231.772290] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1231.773706] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1231.784377] loop4: detected capacity change from 0 to 135266304 [ 1231.790491] loop7: detected capacity change from 0 to 262144 04:35:52 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xf423f}) [ 1231.808699] EXT4-fs (loop7): unsupported inode size: 0 [ 1231.809941] EXT4-fs (loop7): blocksize: 4096 04:35:52 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0xb00}) [ 1231.832922] loop3: detected capacity change from 0 to 262144 04:35:52 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xb000000}) 04:35:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:35:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:35:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, 0x0) 04:35:52 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x1000000}) [ 1231.982396] loop7: detected capacity change from 0 to 262144 [ 1232.013431] loop4: detected capacity change from 0 to 135266304 [ 1232.022146] EXT4-fs (loop7): unsupported inode size: 0 [ 1232.023681] EXT4-fs (loop7): blocksize: 4096 [ 1232.042278] loop3: detected capacity change from 0 to 262144 04:36:06 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x1000000}) 04:36:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 14) 04:36:06 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xb000000}) 04:36:06 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x275cee97}) 04:36:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322", 0x1a}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:36:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:36:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:36:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 1) [ 1246.256407] FAULT_INJECTION: forcing a failure. [ 1246.256407] name failslab, interval 1, probability 0, space 0, times 0 [ 1246.259145] CPU: 0 PID: 16003 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1246.260793] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1246.262417] loop4: detected capacity change from 0 to 135266304 [ 1246.262775] Call Trace: [ 1246.262803] dump_stack+0x107/0x167 [ 1246.262827] should_fail.cold+0x5/0xa [ 1246.265996] ? __do_sys_memfd_create+0xfb/0x450 [ 1246.267109] should_failslab+0x5/0x20 [ 1246.268016] __kmalloc+0x72/0x390 [ 1246.268856] __do_sys_memfd_create+0xfb/0x450 [ 1246.269937] ? ksys_write+0x1a9/0x260 [ 1246.270853] ? memfd_file_seals_ptr+0x170/0x170 [ 1246.271963] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1246.273232] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1246.274469] do_syscall_64+0x33/0x40 [ 1246.275355] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1246.276572] RIP: 0033:0x7f9954f6db19 [ 1246.277466] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1246.281857] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1246.283671] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9954f6db19 [ 1246.285377] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f9954fc70fb [ 1246.287056] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1246.288758] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1246.290462] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 04:36:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 1246.316763] FAULT_INJECTION: forcing a failure. [ 1246.316763] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1246.319879] CPU: 0 PID: 16012 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1246.321517] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1246.323461] Call Trace: 04:36:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 2) [ 1246.324078] dump_stack+0x107/0x167 [ 1246.325062] should_fail.cold+0x5/0xa [ 1246.325988] __alloc_pages_nodemask+0x182/0x600 [ 1246.327077] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1246.328483] ? lock_downgrade+0x6d0/0x6d0 [ 1246.329465] ? lock_acquire+0x197/0x470 [ 1246.330419] alloc_pages_vma+0xbb/0x410 [ 1246.331366] shmem_alloc_page+0x10f/0x1e0 [ 1246.332329] ? shmem_init_inode+0x20/0x20 [ 1246.333339] ? percpu_counter_add_batch+0x8b/0x140 [ 1246.334500] ? __vm_enough_memory+0x184/0x360 [ 1246.335553] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 1246.336813] ? shmem_unuse_inode+0xf60/0xf60 [ 1246.337844] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1246.339044] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1246.340244] shmem_write_begin+0xf7/0x1d0 [ 1246.341240] generic_perform_write+0x20a/0x4f0 [ 1246.342333] ? page_cache_prev_miss+0x310/0x310 [ 1246.343401] ? evict_inodes+0x470/0x470 [ 1246.344314] ? generic_write_checks+0x2ad/0x390 [ 1246.345411] __generic_file_write_iter+0x39d/0x5d0 [ 1246.346558] generic_file_write_iter+0xdb/0x230 [ 1246.347625] ? iov_iter_init+0x3c/0x130 [ 1246.348547] new_sync_write+0x42c/0x660 [ 1246.349471] ? new_sync_read+0x6f0/0x6f0 [ 1246.350408] ? __x64_sys_pwrite64+0x201/0x260 [ 1246.351446] ? lock_release+0x680/0x680 [ 1246.352363] ? selinux_file_permission+0x92/0x520 [ 1246.353487] ? security_file_permission+0xb1/0xe0 [ 1246.354610] vfs_write+0x7c0/0xb10 [ 1246.355438] __x64_sys_pwrite64+0x201/0x260 [ 1246.356438] ? ksys_pwrite64+0x1b0/0x1b0 [ 1246.357392] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1246.358604] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1246.359801] do_syscall_64+0x33/0x40 [ 1246.360663] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1246.361848] RIP: 0033:0x7fe0a08afab7 [ 1246.362712] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1246.366941] RSP: 002b:00007fe09de71f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1246.368696] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afab7 [ 1246.370339] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000004 [ 1246.371995] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1246.373650] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1246.375300] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 04:36:06 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0xb000000}) 04:36:06 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x3b9ac9ff}) [ 1246.378500] loop7: detected capacity change from 0 to 262144 [ 1246.386935] EXT4-fs (loop7): unsupported inode size: 0 [ 1246.387684] EXT4-fs (loop7): blocksize: 4096 04:36:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1246.460712] FAULT_INJECTION: forcing a failure. [ 1246.460712] name failslab, interval 1, probability 0, space 0, times 0 [ 1246.462273] CPU: 1 PID: 16022 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1246.463159] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1246.464217] Call Trace: [ 1246.464560] dump_stack+0x107/0x167 [ 1246.465022] should_fail.cold+0x5/0xa [ 1246.465515] ? create_object.isra.0+0x3a/0xa20 [ 1246.466097] should_failslab+0x5/0x20 [ 1246.466581] kmem_cache_alloc+0x5b/0x310 [ 1246.467090] create_object.isra.0+0x3a/0xa20 [ 1246.467643] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1246.468275] __kmalloc+0x16e/0x390 [ 1246.468721] __do_sys_memfd_create+0xfb/0x450 [ 1246.469287] ? ksys_write+0x1a9/0x260 [ 1246.469763] ? memfd_file_seals_ptr+0x170/0x170 [ 1246.470356] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1246.471009] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1246.471667] do_syscall_64+0x33/0x40 [ 1246.472131] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1246.472772] RIP: 0033:0x7f9954f6db19 [ 1246.473250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1246.475540] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1246.476490] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9954f6db19 [ 1246.477395] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f9954fc70fb [ 1246.478283] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1246.479167] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1246.480057] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 04:36:06 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x275cee97}) [ 1246.489451] loop4: detected capacity change from 0 to 135266304 [ 1246.500241] loop7: detected capacity change from 0 to 262144 [ 1246.509226] EXT4-fs (loop7): unsupported inode size: 0 [ 1246.509916] EXT4-fs (loop7): blocksize: 4096 [ 1246.546422] loop3: detected capacity change from 0 to 262144 [ 1246.565324] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1246.567375] EXT4-fs (loop3): get root inode failed [ 1246.568068] EXT4-fs (loop3): mount failed 04:36:19 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x100000000000000}) 04:36:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 3) 04:36:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:36:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:36:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 15) 04:36:19 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x3f420f00}) 04:36:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322", 0x1a}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:36:19 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x3b9ac9ff}) [ 1259.533643] FAULT_INJECTION: forcing a failure. [ 1259.533643] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1259.535281] CPU: 0 PID: 16046 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1259.536210] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1259.537338] Call Trace: [ 1259.537706] dump_stack+0x107/0x167 [ 1259.538199] should_fail.cold+0x5/0xa [ 1259.538736] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1259.539463] ? shmem_write_begin+0xf7/0x1d0 [ 1259.540044] ? shmem_write_begin+0x100/0x1d0 [ 1259.540654] generic_perform_write+0x279/0x4f0 [ 1259.541276] ? page_cache_prev_miss+0x310/0x310 [ 1259.541919] ? evict_inodes+0x470/0x470 [ 1259.542455] ? generic_write_checks+0x2ad/0x390 [ 1259.542965] loop4: detected capacity change from 0 to 135266304 [ 1259.543089] __generic_file_write_iter+0x39d/0x5d0 [ 1259.545433] generic_file_write_iter+0xdb/0x230 [ 1259.546056] ? iov_iter_init+0x3c/0x130 [ 1259.546597] new_sync_write+0x42c/0x660 [ 1259.547141] ? new_sync_read+0x6f0/0x6f0 [ 1259.547688] ? __x64_sys_pwrite64+0x201/0x260 [ 1259.548302] ? lock_release+0x680/0x680 [ 1259.548837] ? selinux_file_permission+0x92/0x520 [ 1259.549504] ? security_file_permission+0xb1/0xe0 [ 1259.550164] vfs_write+0x7c0/0xb10 [ 1259.550652] __x64_sys_pwrite64+0x201/0x260 [ 1259.551246] ? ksys_pwrite64+0x1b0/0x1b0 [ 1259.551800] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1259.552505] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1259.553200] do_syscall_64+0x33/0x40 [ 1259.553711] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1259.554409] RIP: 0033:0x7fe0a08afab7 [ 1259.554921] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1259.557402] RSP: 002b:00007fe09de71f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1259.558425] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afab7 [ 1259.559385] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000004 [ 1259.560347] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1259.561312] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1259.562275] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1259.575006] FAULT_INJECTION: forcing a failure. [ 1259.575006] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1259.576687] CPU: 0 PID: 16055 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1259.577633] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1259.578739] Call Trace: [ 1259.579095] dump_stack+0x107/0x167 [ 1259.579582] should_fail.cold+0x5/0xa [ 1259.580102] _copy_from_user+0x2e/0x1b0 [ 1259.580636] __do_sys_memfd_create+0x16d/0x450 [ 1259.581248] ? memfd_file_seals_ptr+0x170/0x170 [ 1259.581888] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1259.582589] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1259.583280] do_syscall_64+0x33/0x40 [ 1259.583779] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1259.584469] RIP: 0033:0x7f9954f6db19 [ 1259.584971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1259.587431] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1259.588444] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9954f6db19 [ 1259.589409] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f9954fc70fb [ 1259.590352] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1259.591324] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1259.592280] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 04:36:20 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x40000000}) [ 1259.601092] loop7: detected capacity change from 0 to 262144 04:36:20 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0xb00000000000000}) [ 1259.611011] EXT4-fs (loop7): unsupported inode size: 0 [ 1259.611829] EXT4-fs (loop7): blocksize: 4096 04:36:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:36:20 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x3f420f00}) 04:36:20 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x40000000}) 04:36:20 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0xb}) 04:36:20 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1259.711631] loop4: detected capacity change from 0 to 135266304 04:36:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c", 0x27}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:36:20 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x97ee5c27}) 04:36:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 4) 04:36:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 16) 04:36:20 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0xb00}) 04:36:20 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xffc99a3b}) [ 1259.889784] FAULT_INJECTION: forcing a failure. [ 1259.889784] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1259.891280] CPU: 0 PID: 16079 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1259.892079] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1259.893039] Call Trace: [ 1259.893364] dump_stack+0x107/0x167 [ 1259.893794] should_fail.cold+0x5/0xa [ 1259.894234] __alloc_pages_nodemask+0x182/0x600 [ 1259.894777] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1259.895469] ? lock_downgrade+0x6d0/0x6d0 [ 1259.895949] ? lock_acquire+0x197/0x470 [ 1259.896426] alloc_pages_vma+0xbb/0x410 [ 1259.896890] shmem_alloc_page+0x10f/0x1e0 [ 1259.897375] ? shmem_init_inode+0x20/0x20 [ 1259.897870] ? percpu_counter_add_batch+0x8b/0x140 [ 1259.898435] ? __vm_enough_memory+0x184/0x360 [ 1259.898956] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 1259.899584] ? shmem_unuse_inode+0xf60/0xf60 [ 1259.900095] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1259.900687] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1259.901279] shmem_write_begin+0xf7/0x1d0 [ 1259.901768] generic_perform_write+0x20a/0x4f0 [ 1259.902302] ? page_cache_prev_miss+0x310/0x310 [ 1259.902836] ? evict_inodes+0x470/0x470 [ 1259.903293] ? generic_write_checks+0x2ad/0x390 [ 1259.903830] __generic_file_write_iter+0x39d/0x5d0 [ 1259.904395] generic_file_write_iter+0xdb/0x230 [ 1259.904929] ? iov_iter_init+0x3c/0x130 [ 1259.905403] new_sync_write+0x42c/0x660 [ 1259.905863] ? new_sync_read+0x6f0/0x6f0 [ 1259.906331] ? __x64_sys_pwrite64+0x201/0x260 [ 1259.906843] ? lock_release+0x680/0x680 [ 1259.907298] ? selinux_file_permission+0x92/0x520 [ 1259.907864] ? security_file_permission+0xb1/0xe0 [ 1259.908425] vfs_write+0x7c0/0xb10 [ 1259.908837] __x64_sys_pwrite64+0x201/0x260 [ 1259.909330] ? ksys_pwrite64+0x1b0/0x1b0 [ 1259.909801] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1259.910403] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1259.910998] do_syscall_64+0x33/0x40 [ 1259.911425] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1259.912012] RIP: 0033:0x7fe0a08afab7 [ 1259.912439] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1259.914559] RSP: 002b:00007fe09de71f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1259.915434] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afab7 [ 1259.916250] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1259.917069] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1259.917903] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 1259.918716] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1259.953212] FAULT_INJECTION: forcing a failure. [ 1259.953212] name failslab, interval 1, probability 0, space 0, times 0 [ 1259.954556] CPU: 0 PID: 16085 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1259.955343] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1259.956289] Call Trace: [ 1259.956596] dump_stack+0x107/0x167 [ 1259.957014] should_fail.cold+0x5/0xa [ 1259.957461] ? shmem_alloc_inode+0x18/0x40 [ 1259.957948] should_failslab+0x5/0x20 [ 1259.958385] kmem_cache_alloc+0x5b/0x310 [ 1259.958851] ? shmem_destroy_inode+0x70/0x70 [ 1259.959354] shmem_alloc_inode+0x18/0x40 [ 1259.959814] ? shmem_destroy_inode+0x70/0x70 [ 1259.960317] alloc_inode+0x63/0x240 [ 1259.960732] new_inode+0x23/0x250 [ 1259.961130] shmem_get_inode+0x15e/0xbc0 [ 1259.961606] __shmem_file_setup+0xb8/0x320 [ 1259.962095] ? _copy_from_user+0xfb/0x1b0 [ 1259.962572] __do_sys_memfd_create+0x275/0x450 [ 1259.963096] ? memfd_file_seals_ptr+0x170/0x170 [ 1259.963631] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1259.964228] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1259.964821] do_syscall_64+0x33/0x40 [ 1259.965246] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1259.965835] RIP: 0033:0x7f9954f6db19 [ 1259.966261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1259.968348] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1259.969216] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9954f6db19 [ 1259.970033] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f9954fc70fb [ 1259.970839] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1259.971647] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1259.972457] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 04:36:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 5) 04:36:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:36:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 17) 04:36:34 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:36:34 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x100000000000000}) 04:36:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c", 0x27}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:36:34 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x97ee5c27}) 04:36:34 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x1000000}) [ 1274.285735] loop4: detected capacity change from 0 to 135266304 [ 1274.294435] FAULT_INJECTION: forcing a failure. [ 1274.294435] name failslab, interval 1, probability 0, space 0, times 0 [ 1274.296828] CPU: 0 PID: 16106 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1274.298380] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1274.300074] Call Trace: [ 1274.300631] dump_stack+0x107/0x167 [ 1274.301395] should_fail.cold+0x5/0xa [ 1274.302205] ? create_object.isra.0+0x3a/0xa20 [ 1274.303222] should_failslab+0x5/0x20 [ 1274.304018] kmem_cache_alloc+0x5b/0x310 [ 1274.304868] create_object.isra.0+0x3a/0xa20 [ 1274.305832] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1274.306881] kmem_cache_alloc+0x159/0x310 [ 1274.307731] ? shmem_destroy_inode+0x70/0x70 [ 1274.308646] shmem_alloc_inode+0x18/0x40 [ 1274.309604] ? shmem_destroy_inode+0x70/0x70 [ 1274.310524] alloc_inode+0x63/0x240 [ 1274.311282] new_inode+0x23/0x250 [ 1274.312021] shmem_get_inode+0x15e/0xbc0 [ 1274.312889] __shmem_file_setup+0xb8/0x320 [ 1274.313983] ? _copy_from_user+0xfb/0x1b0 [ 1274.314884] __do_sys_memfd_create+0x275/0x450 [ 1274.315872] ? memfd_file_seals_ptr+0x170/0x170 [ 1274.316890] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1274.318032] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1274.319152] do_syscall_64+0x33/0x40 [ 1274.319935] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1274.321248] RIP: 0033:0x7f9954f6db19 [ 1274.322122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1274.326303] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1274.327937] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9954f6db19 [ 1274.329632] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f9954fc70fb [ 1274.331459] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1274.332934] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1274.334455] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1274.337822] loop7: detected capacity change from 0 to 262144 [ 1274.346552] FAULT_INJECTION: forcing a failure. [ 1274.346552] name failslab, interval 1, probability 0, space 0, times 0 [ 1274.349160] CPU: 0 PID: 16105 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1274.350741] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1274.352518] Call Trace: [ 1274.353099] dump_stack+0x107/0x167 [ 1274.353966] should_fail.cold+0x5/0xa [ 1274.354925] ? xas_alloc+0x336/0x440 [ 1274.355700] should_failslab+0x5/0x20 [ 1274.356500] kmem_cache_alloc+0x5b/0x310 [ 1274.357367] ? __lockdep_reset_lock+0x180/0x180 [ 1274.358351] xas_alloc+0x336/0x440 [ 1274.359101] xas_create+0x60f/0x10d0 [ 1274.359482] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1274.359903] xas_create_range+0x189/0x620 [ 1274.362086] shmem_add_to_page_cache+0x760/0x1130 [ 1274.363221] ? shmem_getattr+0x180/0x180 [ 1274.364117] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 1274.365465] ? shmem_unuse_inode+0xf60/0xf60 [ 1274.366607] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1274.367688] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1274.368775] shmem_write_begin+0xf7/0x1d0 [ 1274.369678] generic_perform_write+0x20a/0x4f0 [ 1274.370634] ? page_cache_prev_miss+0x310/0x310 [ 1274.371589] ? evict_inodes+0x470/0x470 [ 1274.372448] ? generic_write_checks+0x2ad/0x390 [ 1274.373469] __generic_file_write_iter+0x39d/0x5d0 [ 1274.374550] generic_file_write_iter+0xdb/0x230 [ 1274.375574] ? iov_iter_init+0x3c/0x130 [ 1274.376449] new_sync_write+0x42c/0x660 [ 1274.377321] ? new_sync_read+0x6f0/0x6f0 [ 1274.378220] ? __x64_sys_pwrite64+0x201/0x260 [ 1274.379189] ? lock_release+0x680/0x680 [ 1274.380156] ? selinux_file_permission+0x92/0x520 [ 1274.381368] ? security_file_permission+0xb1/0xe0 [ 1274.382567] vfs_write+0x7c0/0xb10 [ 1274.383384] __x64_sys_pwrite64+0x201/0x260 [ 1274.384325] ? ksys_pwrite64+0x1b0/0x1b0 [ 1274.385363] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1274.386554] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1274.387888] do_syscall_64+0x33/0x40 [ 1274.388673] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1274.389779] RIP: 0033:0x7fe0a08afab7 [ 1274.390552] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1274.394426] RSP: 002b:00007fe09de71f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1274.396073] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afab7 [ 1274.397619] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1274.399148] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1274.400701] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 1274.402517] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:36:34 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x200000000000000}) 04:36:34 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xd0000000}) 04:36:34 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0xb000000}) 04:36:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 1274.478827] loop3: detected capacity change from 0 to 262144 04:36:34 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xffc99a3b}) 04:36:34 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x100000000000000}) 04:36:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 18) [ 1274.534402] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block 04:36:35 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xb00000000000000}) [ 1274.541012] EXT4-fs (loop3): get root inode failed [ 1274.542185] EXT4-fs (loop3): mount failed [ 1274.544889] loop4: detected capacity change from 0 to 135266304 [ 1274.598136] FAULT_INJECTION: forcing a failure. [ 1274.598136] name failslab, interval 1, probability 0, space 0, times 0 [ 1274.600581] CPU: 1 PID: 16126 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1274.602039] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1274.603781] Call Trace: [ 1274.604342] dump_stack+0x107/0x167 [ 1274.605097] should_fail.cold+0x5/0xa [ 1274.605891] ? create_object.isra.0+0x3a/0xa20 [ 1274.606844] should_failslab+0x5/0x20 [ 1274.607642] kmem_cache_alloc+0x5b/0x310 [ 1274.608479] create_object.isra.0+0x3a/0xa20 [ 1274.609384] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1274.610464] kmem_cache_alloc+0x159/0x310 [ 1274.611309] ? __lockdep_reset_lock+0x180/0x180 [ 1274.612278] xas_alloc+0x336/0x440 [ 1274.613020] xas_create+0x60f/0x10d0 [ 1274.613811] xas_create_range+0x189/0x620 [ 1274.614688] shmem_add_to_page_cache+0x760/0x1130 [ 1274.615692] ? shmem_getattr+0x180/0x180 [ 1274.616552] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 1274.617689] ? shmem_unuse_inode+0xf60/0xf60 [ 1274.618592] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1274.619650] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1274.620696] shmem_write_begin+0xf7/0x1d0 [ 1274.621572] generic_perform_write+0x20a/0x4f0 [ 1274.622546] ? page_cache_prev_miss+0x310/0x310 [ 1274.623525] ? evict_inodes+0x470/0x470 [ 1274.624375] ? generic_write_checks+0x2ad/0x390 [ 1274.625366] __generic_file_write_iter+0x39d/0x5d0 [ 1274.626423] generic_file_write_iter+0xdb/0x230 [ 1274.627367] ? iov_iter_init+0x3c/0x130 [ 1274.628222] new_sync_write+0x42c/0x660 [ 1274.629058] ? new_sync_read+0x6f0/0x6f0 [ 1274.629912] ? __x64_sys_pwrite64+0x201/0x260 [ 1274.630874] ? lock_release+0x680/0x680 [ 1274.631725] ? selinux_file_permission+0x92/0x520 [ 1274.632716] ? security_file_permission+0xb1/0xe0 [ 1274.633742] vfs_write+0x7c0/0xb10 [ 1274.634479] __x64_sys_pwrite64+0x201/0x260 [ 1274.635371] ? ksys_pwrite64+0x1b0/0x1b0 [ 1274.636223] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1274.637311] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1274.638381] do_syscall_64+0x33/0x40 [ 1274.639146] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1274.640213] RIP: 0033:0x7fe0a08afab7 [ 1274.640970] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1274.644765] RSP: 002b:00007fe09de71f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1274.646339] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afab7 [ 1274.647825] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1274.649303] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1274.650801] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 1274.652280] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:36:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 6) 04:36:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 19) [ 1289.926873] FAULT_INJECTION: forcing a failure. [ 1289.926873] name failslab, interval 1, probability 0, space 0, times 0 [ 1289.929455] CPU: 1 PID: 16136 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1289.930941] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 04:36:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c", 0x27}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1289.932668] Call Trace: [ 1289.933423] dump_stack+0x107/0x167 04:36:50 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x100000000000000}) [ 1289.934203] should_fail.cold+0x5/0xa [ 1289.935152] ? security_inode_alloc+0x34/0x160 [ 1289.936110] should_failslab+0x5/0x20 [ 1289.936909] kmem_cache_alloc+0x5b/0x310 [ 1289.937776] security_inode_alloc+0x34/0x160 [ 1289.938710] inode_init_always+0xa4e/0xd10 [ 1289.939595] ? shmem_destroy_inode+0x70/0x70 [ 1289.940527] alloc_inode+0x84/0x240 [ 1289.941285] new_inode+0x23/0x250 [ 1289.942034] shmem_get_inode+0x15e/0xbc0 [ 1289.942895] __shmem_file_setup+0xb8/0x320 04:36:50 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:36:50 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0xb00000000000000}) [ 1289.943780] ? _copy_from_user+0xfb/0x1b0 [ 1289.944799] __do_sys_memfd_create+0x275/0x450 [ 1289.945773] ? memfd_file_seals_ptr+0x170/0x170 [ 1289.946759] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1289.947856] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1289.948940] do_syscall_64+0x33/0x40 [ 1289.949741] entry_SYSCALL_64_after_hwframe+0x67/0xd1 04:36:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 1289.950828] RIP: 0033:0x7f9954f6db19 04:36:50 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x275cee97ffffffff}) [ 1289.951783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1289.955812] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1289.957424] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9954f6db19 [ 1289.958951] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f9954fc70fb [ 1289.960459] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1289.961982] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1289.963492] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1289.986927] loop4: detected capacity change from 0 to 135266304 [ 1290.005656] FAULT_INJECTION: forcing a failure. [ 1290.005656] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1290.008151] CPU: 1 PID: 16149 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1290.009617] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1290.011384] Call Trace: [ 1290.011945] dump_stack+0x107/0x167 [ 1290.012725] should_fail.cold+0x5/0xa [ 1290.013541] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1290.014691] ? shmem_write_begin+0xf7/0x1d0 [ 1290.015609] ? shmem_write_begin+0x100/0x1d0 [ 1290.016553] generic_perform_write+0x279/0x4f0 [ 1290.017540] ? page_cache_prev_miss+0x310/0x310 [ 1290.018534] ? evict_inodes+0x470/0x470 04:36:50 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0xb}) [ 1290.019380] ? generic_write_checks+0x2ad/0x390 [ 1290.020554] __generic_file_write_iter+0x39d/0x5d0 [ 1290.021609] generic_file_write_iter+0xdb/0x230 [ 1290.022601] ? iov_iter_init+0x3c/0x130 [ 1290.023451] new_sync_write+0x42c/0x660 [ 1290.024296] ? new_sync_read+0x6f0/0x6f0 [ 1290.025162] ? __x64_sys_pwrite64+0x201/0x260 [ 1290.026130] ? lock_release+0x680/0x680 [ 1290.026981] ? selinux_file_permission+0x92/0x520 [ 1290.028011] ? security_file_permission+0xb1/0xe0 [ 1290.029049] vfs_write+0x7c0/0xb10 [ 1290.029828] __x64_sys_pwrite64+0x201/0x260 [ 1290.030748] ? ksys_pwrite64+0x1b0/0x1b0 [ 1290.031622] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1290.032737] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1290.033850] do_syscall_64+0x33/0x40 [ 1290.034642] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1290.035738] RIP: 0033:0x7fe0a08afab7 [ 1290.036528] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1290.040446] RSP: 002b:00007fe09de71f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1290.042070] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afab7 [ 1290.043582] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1290.045096] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1290.046618] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 1290.048135] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1290.056290] loop7: detected capacity change from 0 to 262144 [ 1290.073511] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 04:37:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 20) 04:37:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 1305.826247] FAULT_INJECTION: forcing a failure. [ 1305.826247] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1305.829037] CPU: 1 PID: 16164 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1305.830534] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1305.832245] Call Trace: [ 1305.832803] dump_stack+0x107/0x167 [ 1305.833558] should_fail.cold+0x5/0xa [ 1305.834366] __alloc_pages_nodemask+0x182/0x600 [ 1305.835325] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1305.836559] ? lock_downgrade+0x6d0/0x6d0 [ 1305.837457] ? lock_acquire+0x197/0x470 [ 1305.838296] alloc_pages_vma+0xbb/0x410 [ 1305.839160] shmem_alloc_page+0x10f/0x1e0 [ 1305.840018] ? shmem_init_inode+0x20/0x20 [ 1305.840905] ? percpu_counter_add_batch+0x8b/0x140 [ 1305.841941] ? __vm_enough_memory+0x184/0x360 [ 1305.842865] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 1305.843981] ? shmem_unuse_inode+0xf60/0xf60 [ 1305.844885] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1305.845952] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1305.847004] shmem_write_begin+0xf7/0x1d0 04:37:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332", 0x2d}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:37:06 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x3f420f0000000000}) 04:37:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, 0x0) 04:37:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 7) 04:37:06 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0xb00}) 04:37:06 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xb00000000000000}) [ 1305.848041] generic_perform_write+0x20a/0x4f0 [ 1305.849088] ? page_cache_prev_miss+0x310/0x310 [ 1305.850117] ? evict_inodes+0x470/0x470 [ 1305.851063] ? generic_write_checks+0x2ad/0x390 [ 1305.852028] __generic_file_write_iter+0x39d/0x5d0 [ 1305.853096] generic_file_write_iter+0xdb/0x230 [ 1305.854099] ? iov_iter_init+0x3c/0x130 [ 1305.854982] new_sync_write+0x42c/0x660 [ 1305.855968] ? new_sync_read+0x6f0/0x6f0 [ 1305.856980] loop4: detected capacity change from 0 to 135266304 [ 1305.857025] ? __x64_sys_pwrite64+0x201/0x260 [ 1305.858772] ? lock_release+0x680/0x680 [ 1305.859584] ? selinux_file_permission+0x92/0x520 [ 1305.860594] ? security_file_permission+0xb1/0xe0 [ 1305.861582] vfs_write+0x7c0/0xb10 [ 1305.862330] __x64_sys_pwrite64+0x201/0x260 [ 1305.863225] ? ksys_pwrite64+0x1b0/0x1b0 [ 1305.864072] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1305.865145] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1305.866246] do_syscall_64+0x33/0x40 [ 1305.867013] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1305.868070] RIP: 0033:0x7fe0a08afab7 [ 1305.868846] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1305.872609] RSP: 002b:00007fe09de71f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1305.874186] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afab7 [ 1305.875663] RDX: 0000000000000082 RSI: 00000000200026c0 RDI: 0000000000000004 [ 1305.877117] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1305.878593] R10: 0000000000004200 R11: 0000000000000293 R12: 0000000000000004 [ 1305.880062] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 04:37:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332", 0x2d}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1305.930320] FAULT_INJECTION: forcing a failure. [ 1305.930320] name failslab, interval 1, probability 0, space 0, times 0 [ 1305.933824] CPU: 1 PID: 16177 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1305.935308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1305.937064] Call Trace: [ 1305.937628] dump_stack+0x107/0x167 [ 1305.938405] should_fail.cold+0x5/0xa [ 1305.939212] ? create_object.isra.0+0x3a/0xa20 [ 1305.940180] should_failslab+0x5/0x20 [ 1305.940983] kmem_cache_alloc+0x5b/0x310 [ 1305.941844] create_object.isra.0+0x3a/0xa20 [ 1305.942779] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1305.943852] kmem_cache_alloc+0x159/0x310 [ 1305.944730] security_inode_alloc+0x34/0x160 [ 1305.945657] inode_init_always+0xa4e/0xd10 [ 1305.946554] ? shmem_destroy_inode+0x70/0x70 [ 1305.947483] alloc_inode+0x84/0x240 [ 1305.948252] new_inode+0x23/0x250 04:37:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 21) [ 1305.948994] shmem_get_inode+0x15e/0xbc0 [ 1305.950035] __shmem_file_setup+0xb8/0x320 [ 1305.950925] ? _copy_from_user+0xfb/0x1b0 [ 1305.951794] __do_sys_memfd_create+0x275/0x450 [ 1305.952749] ? memfd_file_seals_ptr+0x170/0x170 [ 1305.953725] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1305.954825] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1305.955891] do_syscall_64+0x33/0x40 [ 1305.956666] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1305.957742] RIP: 0033:0x7f9954f6db19 [ 1305.958522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1305.962368] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1305.963978] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9954f6db19 [ 1305.965470] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f9954fc70fb [ 1305.966963] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1305.968445] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1305.969951] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1305.988175] loop7: detected capacity change from 0 to 262144 [ 1306.009060] FAULT_INJECTION: forcing a failure. [ 1306.009060] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1306.010626] CPU: 0 PID: 16183 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1306.011469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1306.012483] Call Trace: [ 1306.012812] dump_stack+0x107/0x167 [ 1306.013260] should_fail.cold+0x5/0xa [ 1306.013733] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1306.014399] ? shmem_write_begin+0xf7/0x1d0 [ 1306.014931] ? shmem_write_begin+0x100/0x1d0 [ 1306.015468] generic_perform_write+0x279/0x4f0 [ 1306.016027] ? page_cache_prev_miss+0x310/0x310 [ 1306.016591] ? evict_inodes+0x470/0x470 [ 1306.017074] ? generic_write_checks+0x2ad/0x390 [ 1306.017642] __generic_file_write_iter+0x39d/0x5d0 [ 1306.018245] generic_file_write_iter+0xdb/0x230 [ 1306.018804] ? iov_iter_init+0x3c/0x130 [ 1306.019291] new_sync_write+0x42c/0x660 [ 1306.019775] ? new_sync_read+0x6f0/0x6f0 [ 1306.020267] ? __x64_sys_pwrite64+0x201/0x260 [ 1306.020814] ? lock_release+0x680/0x680 [ 1306.021300] ? selinux_file_permission+0x92/0x520 [ 1306.021895] ? security_file_permission+0xb1/0xe0 [ 1306.022486] vfs_write+0x7c0/0xb10 [ 1306.022923] __x64_sys_pwrite64+0x201/0x260 [ 1306.023449] ? ksys_pwrite64+0x1b0/0x1b0 [ 1306.023944] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1306.024578] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1306.025202] do_syscall_64+0x33/0x40 [ 1306.025653] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1306.026280] RIP: 0033:0x7fe0a08afab7 [ 1306.026729] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1306.028939] RSP: 002b:00007fe09de71f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1306.029871] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afab7 [ 1306.030730] RDX: 0000000000000082 RSI: 00000000200026c0 RDI: 0000000000000004 [ 1306.031589] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1306.032442] R10: 0000000000004200 R11: 0000000000000293 R12: 0000000000000004 [ 1306.033294] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 04:37:06 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x4000000000000000}) 04:37:06 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x1000000}) 04:37:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 1306.055366] loop3: detected capacity change from 0 to 262144 04:37:06 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xffc99a3b00000000}) 04:37:06 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x275cee97ffffffff}) [ 1306.094798] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1306.096268] EXT4-fs (loop3): get root inode failed [ 1306.096892] EXT4-fs (loop3): mount failed 04:37:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, 0x0) 04:37:06 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xffffffff97ee5c27}) 04:37:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332", 0x2d}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:37:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 8) 04:37:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 22) 04:37:06 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0xb000000}) [ 1306.196579] loop7: detected capacity change from 0 to 262144 04:37:06 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x100000000000000}) [ 1306.302475] FAULT_INJECTION: forcing a failure. [ 1306.302475] name failslab, interval 1, probability 0, space 0, times 0 [ 1306.305250] CPU: 1 PID: 16212 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1306.306866] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1306.308767] Call Trace: [ 1306.309378] dump_stack+0x107/0x167 [ 1306.310239] should_fail.cold+0x5/0xa [ 1306.311123] ? __d_alloc+0x2a/0x990 [ 1306.311963] should_failslab+0x5/0x20 [ 1306.312838] kmem_cache_alloc+0x5b/0x310 [ 1306.313773] ? trace_hardirqs_on+0x5b/0x180 [ 1306.314779] __d_alloc+0x2a/0x990 [ 1306.315603] d_alloc_pseudo+0x19/0x70 [ 1306.316513] alloc_file_pseudo+0xce/0x250 [ 1306.317500] ? alloc_file+0x5a0/0x5a0 [ 1306.318428] ? shmem_get_inode+0x55c/0xbc0 [ 1306.319454] __shmem_file_setup+0x144/0x320 [ 1306.320500] ? _copy_from_user+0xfb/0x1b0 [ 1306.321504] __do_sys_memfd_create+0x275/0x450 [ 1306.322612] ? memfd_file_seals_ptr+0x170/0x170 [ 1306.323737] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1306.324992] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1306.325774] FAULT_INJECTION: forcing a failure. [ 1306.325774] name failslab, interval 1, probability 0, space 0, times 0 [ 1306.326235] do_syscall_64+0x33/0x40 [ 1306.326258] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1306.329553] RIP: 0033:0x7f9954f6db19 [ 1306.330445] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1306.334825] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1306.336649] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9954f6db19 [ 1306.338332] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f9954fc70fb [ 1306.340014] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1306.341694] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1306.343373] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1306.345083] CPU: 0 PID: 16213 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1306.345842] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1306.346732] Call Trace: [ 1306.347026] dump_stack+0x107/0x167 [ 1306.347420] should_fail.cold+0x5/0xa [ 1306.347860] ? getname_flags.part.0+0x50/0x4f0 [ 1306.348352] should_failslab+0x5/0x20 [ 1306.348799] kmem_cache_alloc+0x5b/0x310 [ 1306.349244] ? new_sync_write+0x499/0x660 [ 1306.349702] getname_flags.part.0+0x50/0x4f0 [ 1306.350181] getname+0x8e/0xd0 [ 1306.350555] do_sys_openat2+0xf9/0x4d0 [ 1306.350976] ? build_open_flags+0x6f0/0x6f0 [ 1306.351462] ? rcu_read_lock_any_held+0x75/0xa0 [ 1306.351965] __x64_sys_openat+0x13f/0x1f0 [ 1306.352408] ? __ia32_sys_open+0x1c0/0x1c0 [ 1306.352906] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1306.353472] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1306.354081] do_syscall_64+0x33/0x40 [ 1306.354484] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1306.355082] RIP: 0033:0x7fe0a08afa04 [ 1306.355483] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1306.357450] RSP: 002b:00007fe09de71ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1306.358273] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afa04 [ 1306.359037] RDX: 0000000000000002 RSI: 00007fe09de72000 RDI: 00000000ffffff9c [ 1306.359803] RBP: 00007fe09de72000 R08: 0000000000000000 R09: ffffffffffffffff [ 1306.360567] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1306.361329] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1327.226280] FAULT_INJECTION: forcing a failure. [ 1327.226280] name failslab, interval 1, probability 0, space 0, times 0 [ 1327.229123] CPU: 0 PID: 16222 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1327.230757] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1327.232695] Call Trace: [ 1327.233319] dump_stack+0x107/0x167 [ 1327.234181] should_fail.cold+0x5/0xa [ 1327.235079] ? create_object.isra.0+0x3a/0xa20 [ 1327.236160] should_failslab+0x5/0x20 [ 1327.237058] kmem_cache_alloc+0x5b/0x310 [ 1327.238010] ? __generic_file_write_iter+0x1a4/0x5d0 04:37:27 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x3f420f0000000000}) 04:37:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 23) 04:37:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7", 0x30}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:37:27 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, 0x0) [ 1327.239231] create_object.isra.0+0x3a/0xa20 [ 1327.240464] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1327.241652] kmem_cache_alloc+0x159/0x310 [ 1327.242640] ? new_sync_write+0x499/0x660 [ 1327.243627] getname_flags.part.0+0x50/0x4f0 [ 1327.244661] getname+0x8e/0xd0 [ 1327.245418] do_sys_openat2+0xf9/0x4d0 [ 1327.246341] ? build_open_flags+0x6f0/0x6f0 [ 1327.247377] ? rcu_read_lock_any_held+0x75/0xa0 [ 1327.248467] __x64_sys_openat+0x13f/0x1f0 [ 1327.249436] ? __ia32_sys_open+0x1c0/0x1c0 [ 1327.250450] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1327.251682] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1327.252890] do_syscall_64+0x33/0x40 [ 1327.253758] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1327.254962] RIP: 0033:0x7fe0a08afa04 [ 1327.255847] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1327.260214] RSP: 002b:00007fe09de71ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1327.262010] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afa04 [ 1327.263699] RDX: 0000000000000002 RSI: 00007fe09de72000 RDI: 00000000ffffff9c [ 1327.264687] FAULT_INJECTION: forcing a failure. 04:37:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:37:27 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x2}) 04:37:27 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0xb00000000000000}) 04:37:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 9) [ 1327.264687] name failslab, interval 1, probability 0, space 0, times 0 [ 1327.265363] RBP: 00007fe09de72000 R08: 0000000000000000 R09: ffffffffffffffff [ 1327.265376] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1327.265387] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1327.270693] CPU: 1 PID: 16225 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1327.271658] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1327.272821] Call Trace: [ 1327.273203] dump_stack+0x107/0x167 [ 1327.273718] should_fail.cold+0x5/0xa [ 1327.274266] ? create_object.isra.0+0x3a/0xa20 [ 1327.274924] should_failslab+0x5/0x20 [ 1327.275460] kmem_cache_alloc+0x5b/0x310 [ 1327.276038] create_object.isra.0+0x3a/0xa20 [ 1327.276656] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1327.277376] kmem_cache_alloc+0x159/0x310 [ 1327.277975] __d_alloc+0x2a/0x990 [ 1327.278472] d_alloc_pseudo+0x19/0x70 [ 1327.279015] alloc_file_pseudo+0xce/0x250 [ 1327.279602] ? alloc_file+0x5a0/0x5a0 [ 1327.280137] ? shmem_get_inode+0x55c/0xbc0 [ 1327.280740] __shmem_file_setup+0x144/0x320 [ 1327.281355] ? _copy_from_user+0xfb/0x1b0 [ 1327.281945] __do_sys_memfd_create+0x275/0x450 [ 1327.282596] ? memfd_file_seals_ptr+0x170/0x170 [ 1327.283257] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1327.283972] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1327.284707] do_syscall_64+0x33/0x40 [ 1327.285229] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1327.285948] RIP: 0033:0x7f9954f6db19 [ 1327.286478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1327.289061] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1327.290142] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9954f6db19 [ 1327.291142] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f9954fc70fb [ 1327.292113] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1327.293107] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1327.294100] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1327.313984] loop4: detected capacity change from 0 to 135266304 04:37:27 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x4000000000000000}) [ 1327.330070] loop7: detected capacity change from 0 to 262144 [ 1327.402013] loop3: detected capacity change from 0 to 262144 [ 1327.428800] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1327.434726] EXT4-fs (loop3): get root inode failed [ 1327.437344] EXT4-fs (loop3): mount failed [ 1342.154966] FAULT_INJECTION: forcing a failure. [ 1342.154966] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.156732] CPU: 1 PID: 16254 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1342.157771] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 04:37:42 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xd000000000000000}) 04:37:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 10) 04:37:42 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 1) 04:37:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7", 0x30}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:37:42 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0xb}) [ 1342.159012] Call Trace: [ 1342.159696] dump_stack+0x107/0x167 [ 1342.160297] should_fail.cold+0x5/0xa [ 1342.160908] ? __alloc_file+0x21/0x320 [ 1342.161536] should_failslab+0x5/0x20 [ 1342.162154] kmem_cache_alloc+0x5b/0x310 [ 1342.162808] __alloc_file+0x21/0x320 [ 1342.163392] alloc_empty_file+0x6d/0x170 [ 1342.164038] alloc_file+0x5e/0x5a0 [ 1342.164594] alloc_file_pseudo+0x16a/0x250 [ 1342.165265] ? alloc_file+0x5a0/0x5a0 [ 1342.165861] ? shmem_get_inode+0x55c/0xbc0 04:37:42 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xb}) [ 1342.166551] __shmem_file_setup+0x144/0x320 [ 1342.167333] ? _copy_from_user+0xfb/0x1b0 [ 1342.168006] __do_sys_memfd_create+0x275/0x450 [ 1342.168745] ? memfd_file_seals_ptr+0x170/0x170 [ 1342.169497] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1342.170363] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1342.171117] FAULT_INJECTION: forcing a failure. [ 1342.171117] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.171183] do_syscall_64+0x33/0x40 [ 1342.171209] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1342.175094] RIP: 0033:0x7f9954f6db19 [ 1342.175805] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1342.179286] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1342.180729] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9954f6db19 [ 1342.182101] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f9954fc70fb [ 1342.183479] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1342.184859] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1342.186206] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1342.187599] CPU: 0 PID: 16257 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1342.189092] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1342.190881] Call Trace: [ 1342.191451] dump_stack+0x107/0x167 [ 1342.192231] should_fail.cold+0x5/0xa [ 1342.193046] ? __do_sys_memfd_create+0xfb/0x450 [ 1342.194044] should_failslab+0x5/0x20 [ 1342.194863] __kmalloc+0x72/0x390 [ 1342.195614] __do_sys_memfd_create+0xfb/0x450 [ 1342.196573] ? ksys_write+0x1a9/0x260 [ 1342.197388] ? memfd_file_seals_ptr+0x170/0x170 [ 1342.198395] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1342.199537] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1342.200665] do_syscall_64+0x33/0x40 [ 1342.201479] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1342.202607] RIP: 0033:0x7f40b893ab19 [ 1342.203416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1342.207434] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1342.209091] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f40b893ab19 [ 1342.210651] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f40b89940fb [ 1342.212208] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1342.213761] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1342.215348] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 04:37:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 04:37:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 24) [ 1342.262329] FAULT_INJECTION: forcing a failure. [ 1342.262329] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1342.264895] loop4: detected capacity change from 0 to 135266304 [ 1342.265122] CPU: 1 PID: 16264 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1342.268013] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1342.269996] Call Trace: [ 1342.270634] dump_stack+0x107/0x167 [ 1342.271506] should_fail.cold+0x5/0xa [ 1342.272429] strncpy_from_user+0x34/0x470 [ 1342.273427] getname_flags.part.0+0x95/0x4f0 [ 1342.274506] getname+0x8e/0xd0 [ 1342.275273] do_sys_openat2+0xf9/0x4d0 [ 1342.276210] ? build_open_flags+0x6f0/0x6f0 [ 1342.277260] ? rcu_read_lock_any_held+0x75/0xa0 [ 1342.278388] __x64_sys_openat+0x13f/0x1f0 [ 1342.279379] ? __ia32_sys_open+0x1c0/0x1c0 [ 1342.280398] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1342.281651] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1342.282892] do_syscall_64+0x33/0x40 [ 1342.283783] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1342.285006] RIP: 0033:0x7fe0a08afa04 [ 1342.285893] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1342.290289] RSP: 002b:00007fe09de71ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1342.292099] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afa04 [ 1342.293799] RDX: 0000000000000002 RSI: 00007fe09de72000 RDI: 00000000ffffff9c [ 1342.295511] RBP: 00007fe09de72000 R08: 0000000000000000 R09: ffffffffffffffff 04:37:42 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xb00}) [ 1342.297214] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1342.299098] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 04:37:42 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xffc99a3b00000000}) 04:37:42 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0xb00}) 04:37:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 11) 04:37:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 04:37:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 25) 04:37:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7", 0x30}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1342.474069] FAULT_INJECTION: forcing a failure. [ 1342.474069] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.476526] CPU: 0 PID: 16274 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1342.477982] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1342.479744] Call Trace: [ 1342.480306] dump_stack+0x107/0x167 [ 1342.481082] should_fail.cold+0x5/0xa [ 1342.481887] ? create_object.isra.0+0x3a/0xa20 [ 1342.482870] should_failslab+0x5/0x20 [ 1342.483676] kmem_cache_alloc+0x5b/0x310 [ 1342.484541] create_object.isra.0+0x3a/0xa20 [ 1342.485471] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1342.486567] kmem_cache_alloc+0x159/0x310 [ 1342.487453] __alloc_file+0x21/0x320 [ 1342.488246] alloc_empty_file+0x6d/0x170 [ 1342.489106] alloc_file+0x5e/0x5a0 [ 1342.489867] alloc_file_pseudo+0x16a/0x250 [ 1342.490772] ? alloc_file+0x5a0/0x5a0 [ 1342.491582] ? shmem_get_inode+0x55c/0xbc0 [ 1342.492494] __shmem_file_setup+0x144/0x320 [ 1342.493408] ? _copy_from_user+0xfb/0x1b0 [ 1342.494297] __do_sys_memfd_create+0x275/0x450 [ 1342.495269] ? memfd_file_seals_ptr+0x170/0x170 [ 1342.496260] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1342.497374] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1342.498479] do_syscall_64+0x33/0x40 [ 1342.499269] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1342.500352] RIP: 0033:0x7f9954f6db19 [ 1342.501139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1342.505056] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1342.506661] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9954f6db19 [ 1342.508162] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f9954fc70fb [ 1342.509668] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1342.511183] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1342.512692] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1342.519019] FAULT_INJECTION: forcing a failure. [ 1342.519019] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.521510] CPU: 1 PID: 16278 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1342.522972] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1342.524712] Call Trace: [ 1342.525279] dump_stack+0x107/0x167 [ 1342.526055] should_fail.cold+0x5/0xa [ 1342.526877] ? create_object.isra.0+0x3a/0xa20 [ 1342.527840] should_failslab+0x5/0x20 [ 1342.528638] kmem_cache_alloc+0x5b/0x310 [ 1342.529498] create_object.isra.0+0x3a/0xa20 [ 1342.530456] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1342.531519] __kmalloc+0x16e/0x390 [ 1342.532265] __do_sys_memfd_create+0xfb/0x450 [ 1342.533183] ? ksys_write+0x1a9/0x260 [ 1342.533993] ? memfd_file_seals_ptr+0x170/0x170 [ 1342.534970] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1342.536056] ? syscall_enter_from_user_mode+0x1d/0x50 04:37:42 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 2) [ 1342.537119] do_syscall_64+0x33/0x40 [ 1342.538058] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1342.539126] RIP: 0033:0x7f40b893ab19 [ 1342.539901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1342.543658] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1342.545224] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f40b893ab19 [ 1342.546685] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f40b89940fb [ 1342.548151] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1342.549608] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1342.551075] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1342.553724] FAULT_INJECTION: forcing a failure. [ 1342.553724] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.556226] CPU: 1 PID: 16279 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1342.557647] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1342.559369] Call Trace: [ 1342.559915] dump_stack+0x107/0x167 [ 1342.560664] should_fail.cold+0x5/0xa [ 1342.561447] ? __alloc_file+0x21/0x320 [ 1342.562273] should_failslab+0x5/0x20 [ 1342.563067] kmem_cache_alloc+0x5b/0x310 [ 1342.563913] __alloc_file+0x21/0x320 [ 1342.564676] alloc_empty_file+0x6d/0x170 [ 1342.565529] path_openat+0xe6/0x2770 [ 1342.566309] ? __lock_acquire+0x1657/0x5b00 [ 1342.567220] ? path_lookupat+0x860/0x860 [ 1342.568076] ? perf_trace_lock+0xac/0x490 [ 1342.568932] ? SOFTIRQ_verbose+0x10/0x10 [ 1342.569768] ? find_held_lock+0x2c/0x110 [ 1342.570620] ? __lockdep_reset_lock+0x180/0x180 [ 1342.571596] do_filp_open+0x190/0x3e0 [ 1342.572377] ? may_open_dev+0xf0/0xf0 [ 1342.573173] ? alloc_fd+0x2e7/0x670 [ 1342.573928] ? lock_downgrade+0x6d0/0x6d0 [ 1342.574789] ? do_raw_spin_lock+0x121/0x260 [ 1342.575681] ? rwlock_bug.part.0+0x90/0x90 [ 1342.576558] ? _raw_spin_unlock+0x1a/0x30 [ 1342.577405] ? alloc_fd+0x2e7/0x670 [ 1342.578172] do_sys_openat2+0x171/0x4d0 [ 1342.579010] ? build_open_flags+0x6f0/0x6f0 [ 1342.579916] ? rcu_read_lock_any_held+0x75/0xa0 [ 1342.580884] __x64_sys_openat+0x13f/0x1f0 [ 1342.581735] ? __ia32_sys_open+0x1c0/0x1c0 [ 1342.582622] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1342.583706] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1342.584774] do_syscall_64+0x33/0x40 [ 1342.585541] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1342.586605] RIP: 0033:0x7fe0a08afa04 [ 1342.587369] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1342.591184] RSP: 002b:00007fe09de71ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1342.592747] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afa04 [ 1342.594212] RDX: 0000000000000002 RSI: 00007fe09de72000 RDI: 00000000ffffff9c [ 1342.595688] RBP: 00007fe09de72000 R08: 0000000000000000 R09: ffffffffffffffff [ 1342.597171] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1342.598640] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 04:37:43 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0xffffffff97ee5c27}) 04:37:43 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x1000000}) 04:37:43 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x4000}) [ 1342.643290] loop3: detected capacity change from 0 to 262144 [ 1342.656707] loop7: detected capacity change from 0 to 262144 04:37:43 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xf423f}) [ 1342.699087] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1342.702050] EXT4-fs (loop3): get root inode failed [ 1342.703211] EXT4-fs (loop3): mount failed 04:37:43 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xb}) [ 1342.707028] loop4: detected capacity change from 0 to 135266304 04:37:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b3", 0x32}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:37:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 26) 04:37:43 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0xb000000}) 04:37:43 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x1000000}) [ 1342.780352] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1342.783392] EXT4-fs (loop7): get root inode failed [ 1342.784590] EXT4-fs (loop7): mount failed 04:37:43 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x2000000}) 04:37:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 12) 04:37:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80000001) [ 1342.889034] FAULT_INJECTION: forcing a failure. [ 1342.889034] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.891616] CPU: 0 PID: 16306 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1342.893082] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1342.894847] Call Trace: [ 1342.895411] dump_stack+0x107/0x167 [ 1342.896187] should_fail.cold+0x5/0xa [ 1342.897003] ? create_object.isra.0+0x3a/0xa20 [ 1342.897973] should_failslab+0x5/0x20 [ 1342.898789] kmem_cache_alloc+0x5b/0x310 [ 1342.899660] create_object.isra.0+0x3a/0xa20 [ 1342.900590] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1342.901666] kmem_cache_alloc+0x159/0x310 [ 1342.902555] __alloc_file+0x21/0x320 [ 1342.903342] alloc_empty_file+0x6d/0x170 [ 1342.904201] path_openat+0xe6/0x2770 [ 1342.904989] ? __lock_acquire+0x1657/0x5b00 [ 1342.905915] ? path_lookupat+0x860/0x860 [ 1342.906787] ? perf_trace_lock+0xac/0x490 [ 1342.907664] ? SOFTIRQ_verbose+0x10/0x10 [ 1342.908526] ? find_held_lock+0x2c/0x110 [ 1342.909391] ? __lockdep_reset_lock+0x180/0x180 [ 1342.910397] do_filp_open+0x190/0x3e0 [ 1342.911200] ? may_open_dev+0xf0/0xf0 [ 1342.912016] ? alloc_fd+0x2e7/0x670 [ 1342.912786] ? lock_downgrade+0x6d0/0x6d0 [ 1342.913663] ? do_raw_spin_lock+0x121/0x260 [ 1342.914582] ? rwlock_bug.part.0+0x90/0x90 [ 1342.915477] ? _raw_spin_unlock+0x1a/0x30 [ 1342.916342] ? alloc_fd+0x2e7/0x670 [ 1342.917125] do_sys_openat2+0x171/0x4d0 [ 1342.917968] ? build_open_flags+0x6f0/0x6f0 [ 1342.918904] ? rcu_read_lock_any_held+0x75/0xa0 [ 1342.919897] __x64_sys_openat+0x13f/0x1f0 [ 1342.920773] ? __ia32_sys_open+0x1c0/0x1c0 [ 1342.921680] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1342.922801] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1342.923900] do_syscall_64+0x33/0x40 [ 1342.924694] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1342.925784] RIP: 0033:0x7fe0a08afa04 [ 1342.926584] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1342.930478] RSP: 002b:00007fe09de71ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1342.932095] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afa04 [ 1342.933604] RDX: 0000000000000002 RSI: 00007fe09de72000 RDI: 00000000ffffff9c [ 1342.934288] FAULT_INJECTION: forcing a failure. [ 1342.934288] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.935118] RBP: 00007fe09de72000 R08: 0000000000000000 R09: ffffffffffffffff [ 1342.935129] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1342.935139] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1342.942231] CPU: 1 PID: 16311 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1342.943672] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1342.945382] Call Trace: [ 1342.945945] dump_stack+0x107/0x167 [ 1342.946709] should_fail.cold+0x5/0xa [ 1342.947500] ? security_file_alloc+0x34/0x170 [ 1342.948427] should_failslab+0x5/0x20 [ 1342.949225] kmem_cache_alloc+0x5b/0x310 [ 1342.950069] security_file_alloc+0x34/0x170 [ 1342.950991] __alloc_file+0xb7/0x320 [ 1342.951753] alloc_empty_file+0x6d/0x170 [ 1342.952597] alloc_file+0x5e/0x5a0 [ 1342.953327] alloc_file_pseudo+0x16a/0x250 [ 1342.954199] ? alloc_file+0x5a0/0x5a0 [ 1342.955000] ? shmem_get_inode+0x55c/0xbc0 [ 1342.955892] __shmem_file_setup+0x144/0x320 [ 1342.956790] ? _copy_from_user+0xfb/0x1b0 [ 1342.957652] __do_sys_memfd_create+0x275/0x450 [ 1342.958616] ? memfd_file_seals_ptr+0x170/0x170 [ 1342.959585] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1342.960669] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1342.961739] do_syscall_64+0x33/0x40 [ 1342.962519] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1342.963584] RIP: 0033:0x7f9954f6db19 [ 1342.964353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1342.968161] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1342.969735] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9954f6db19 [ 1342.971220] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f9954fc70fb [ 1342.972692] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1342.974163] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1342.975675] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1342.975699] loop4: detected capacity change from 0 to 135266304 [ 1357.061830] FAULT_INJECTION: forcing a failure. [ 1357.061830] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1357.064026] CPU: 1 PID: 16327 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1357.065016] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1357.066203] Call Trace: [ 1357.066609] dump_stack+0x107/0x167 [ 1357.067122] should_fail.cold+0x5/0xa [ 1357.067686] _copy_from_user+0x2e/0x1b0 [ 1357.068250] __do_sys_memfd_create+0x16d/0x450 [ 1357.068905] ? memfd_file_seals_ptr+0x170/0x170 [ 1357.069590] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1357.070345] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1357.071091] do_syscall_64+0x33/0x40 [ 1357.071624] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1357.072364] RIP: 0033:0x7f40b893ab19 [ 1357.072890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1357.075484] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1357.076569] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f40b893ab19 [ 1357.077568] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f40b89940fb [ 1357.078604] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1357.079612] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1357.080612] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 04:37:57 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 3) 04:37:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 13) 04:37:57 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xb000000}) 04:37:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 27) 04:37:57 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xd0}) 04:37:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:37:57 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x100000000000000}) 04:37:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b3", 0x32}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1357.086266] FAULT_INJECTION: forcing a failure. [ 1357.086266] name failslab, interval 1, probability 0, space 0, times 0 [ 1357.087896] CPU: 1 PID: 16330 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1357.088887] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1357.090060] Call Trace: [ 1357.090439] dump_stack+0x107/0x167 [ 1357.090962] should_fail.cold+0x5/0xa [ 1357.091506] ? security_file_alloc+0x34/0x170 [ 1357.092141] should_failslab+0x5/0x20 [ 1357.092687] kmem_cache_alloc+0x5b/0x310 [ 1357.093273] security_file_alloc+0x34/0x170 [ 1357.093885] __alloc_file+0xb7/0x320 [ 1357.094389] alloc_empty_file+0x6d/0x170 [ 1357.094969] path_openat+0xe6/0x2770 [ 1357.095486] ? __lock_acquire+0x1657/0x5b00 [ 1357.096107] ? path_lookupat+0x860/0x860 [ 1357.096681] ? perf_trace_lock+0xac/0x490 [ 1357.097250] ? SOFTIRQ_verbose+0x10/0x10 [ 1357.097799] ? find_held_lock+0x2c/0x110 [ 1357.098352] ? __lockdep_reset_lock+0x180/0x180 [ 1357.099006] do_filp_open+0x190/0x3e0 [ 1357.099526] ? may_open_dev+0xf0/0xf0 [ 1357.100057] ? alloc_fd+0x2e7/0x670 [ 1357.100551] ? lock_downgrade+0x6d0/0x6d0 [ 1357.101113] ? do_raw_spin_lock+0x121/0x260 [ 1357.101725] ? rwlock_bug.part.0+0x90/0x90 [ 1357.102310] ? _raw_spin_unlock+0x1a/0x30 [ 1357.102922] ? alloc_fd+0x2e7/0x670 [ 1357.103426] do_sys_openat2+0x171/0x4d0 [ 1357.103993] ? build_open_flags+0x6f0/0x6f0 [ 1357.104593] ? rcu_read_lock_any_held+0x75/0xa0 [ 1357.105251] __x64_sys_openat+0x13f/0x1f0 [ 1357.105814] ? __ia32_sys_open+0x1c0/0x1c0 [ 1357.106427] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1357.107144] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1357.107894] do_syscall_64+0x33/0x40 [ 1357.108402] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1357.109116] RIP: 0033:0x7fe0a08afa04 [ 1357.109624] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1357.112209] RSP: 002b:00007fe09de71ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1357.113246] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afa04 [ 1357.114206] RDX: 0000000000000002 RSI: 00007fe09de72000 RDI: 00000000ffffff9c [ 1357.115185] RBP: 00007fe09de72000 R08: 0000000000000000 R09: ffffffffffffffff [ 1357.116144] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1357.117103] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1357.120502] FAULT_INJECTION: forcing a failure. [ 1357.120502] name failslab, interval 1, probability 0, space 0, times 0 [ 1357.122062] CPU: 1 PID: 16339 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1357.122998] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1357.124116] Call Trace: [ 1357.124180] loop4: detected capacity change from 0 to 135266304 [ 1357.124467] dump_stack+0x107/0x167 [ 1357.124486] should_fail.cold+0x5/0xa [ 1357.126785] ? create_object.isra.0+0x3a/0xa20 [ 1357.127375] should_failslab+0x5/0x20 [ 1357.127860] kmem_cache_alloc+0x5b/0x310 [ 1357.128405] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1357.129149] create_object.isra.0+0x3a/0xa20 [ 1357.129739] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1357.130390] kmem_cache_alloc+0x159/0x310 [ 1357.130968] security_file_alloc+0x34/0x170 [ 1357.131550] __alloc_file+0xb7/0x320 [ 1357.132051] alloc_empty_file+0x6d/0x170 [ 1357.132598] alloc_file+0x5e/0x5a0 [ 1357.133081] alloc_file_pseudo+0x16a/0x250 [ 1357.133658] ? alloc_file+0x5a0/0x5a0 [ 1357.134171] ? shmem_get_inode+0x55c/0xbc0 [ 1357.134765] __shmem_file_setup+0x144/0x320 [ 1357.135353] ? _copy_from_user+0xfb/0x1b0 [ 1357.135912] __do_sys_memfd_create+0x275/0x450 [ 1357.136529] ? memfd_file_seals_ptr+0x170/0x170 [ 1357.137167] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1357.137874] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1357.138583] do_syscall_64+0x33/0x40 [ 1357.139078] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1357.139767] RIP: 0033:0x7f9954f6db19 [ 1357.140268] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1357.142749] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1357.143780] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f9954f6db19 [ 1357.144745] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f9954fc70fb [ 1357.145716] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1357.146691] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1357.147644] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 04:37:57 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:37:57 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x275cee97}) 04:37:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:37:57 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xb00}) 04:37:57 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:37:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b3", 0x32}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1357.289893] loop4: detected capacity change from 0 to 135266304 04:37:57 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x3b9ac9ff}) [ 1357.330007] loop3: detected capacity change from 0 to 262144 04:37:57 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x4000}) 04:37:57 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 4) [ 1357.359236] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1357.360767] EXT4-fs (loop3): get root inode failed [ 1357.361334] EXT4-fs (loop3): mount failed [ 1357.401539] FAULT_INJECTION: forcing a failure. [ 1357.401539] name failslab, interval 1, probability 0, space 0, times 0 [ 1357.404419] CPU: 0 PID: 16361 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1357.405875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1357.407626] Call Trace: [ 1357.408180] dump_stack+0x107/0x167 [ 1357.408948] should_fail.cold+0x5/0xa [ 1357.409760] ? shmem_alloc_inode+0x18/0x40 [ 1357.410652] should_failslab+0x5/0x20 [ 1357.411451] kmem_cache_alloc+0x5b/0x310 [ 1357.412302] ? shmem_destroy_inode+0x70/0x70 [ 1357.413230] shmem_alloc_inode+0x18/0x40 [ 1357.414078] ? shmem_destroy_inode+0x70/0x70 [ 1357.414997] alloc_inode+0x63/0x240 [ 1357.415766] new_inode+0x23/0x250 [ 1357.416499] shmem_get_inode+0x15e/0xbc0 [ 1357.417372] __shmem_file_setup+0xb8/0x320 [ 1357.418267] ? _copy_from_user+0xfb/0x1b0 [ 1357.419164] __do_sys_memfd_create+0x275/0x450 [ 1357.420117] ? memfd_file_seals_ptr+0x170/0x170 [ 1357.421101] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1357.422219] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1357.423315] do_syscall_64+0x33/0x40 [ 1357.424093] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1357.425182] RIP: 0033:0x7f40b893ab19 [ 1357.425965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1357.429834] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1357.431429] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f40b893ab19 [ 1357.432917] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f40b89940fb [ 1357.434422] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1357.435913] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1357.437396] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 04:38:14 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xd000}) 04:38:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:38:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 5) 04:38:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 28) 04:38:14 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x3f420f00}) 04:38:14 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:38:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:38:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 14) [ 1373.735812] FAULT_INJECTION: forcing a failure. [ 1373.735812] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.738330] CPU: 0 PID: 16382 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1373.739837] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1373.741066] FAULT_INJECTION: forcing a failure. [ 1373.741066] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.741604] Call Trace: [ 1373.741635] dump_stack+0x107/0x167 [ 1373.741657] should_fail.cold+0x5/0xa [ 1373.741685] ? create_object.isra.0+0x3a/0xa20 [ 1373.747142] should_failslab+0x5/0x20 [ 1373.747953] kmem_cache_alloc+0x5b/0x310 [ 1373.748812] create_object.isra.0+0x3a/0xa20 [ 1373.749736] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1373.750787] kmem_cache_alloc+0x159/0x310 [ 1373.751646] ? shmem_destroy_inode+0x70/0x70 [ 1373.752549] shmem_alloc_inode+0x18/0x40 [ 1373.753393] ? shmem_destroy_inode+0x70/0x70 [ 1373.754318] alloc_inode+0x63/0x240 [ 1373.755110] new_inode+0x23/0x250 [ 1373.755854] shmem_get_inode+0x15e/0xbc0 [ 1373.756717] __shmem_file_setup+0xb8/0x320 [ 1373.757596] ? _copy_from_user+0xfb/0x1b0 [ 1373.758482] __do_sys_memfd_create+0x275/0x450 [ 1373.759440] ? memfd_file_seals_ptr+0x170/0x170 [ 1373.760408] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1373.761530] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1373.762603] do_syscall_64+0x33/0x40 [ 1373.763390] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1373.764491] RIP: 0033:0x7f40b893ab19 [ 1373.765300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1373.769266] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1373.770904] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f40b893ab19 [ 1373.772435] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f40b89940fb [ 1373.773991] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1373.775531] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1373.777038] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1373.778616] CPU: 1 PID: 16383 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1373.780114] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1373.781908] Call Trace: [ 1373.782498] dump_stack+0x107/0x167 [ 1373.783307] should_fail.cold+0x5/0xa [ 1373.784115] ? create_object.isra.0+0x3a/0xa20 [ 1373.785108] should_failslab+0x5/0x20 [ 1373.785928] kmem_cache_alloc+0x5b/0x310 [ 1373.786818] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1373.788000] create_object.isra.0+0x3a/0xa20 [ 1373.788953] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1373.790040] kmem_cache_alloc+0x159/0x310 [ 1373.790955] security_file_alloc+0x34/0x170 [ 1373.791881] __alloc_file+0xb7/0x320 [ 1373.792692] alloc_empty_file+0x6d/0x170 [ 1373.793570] path_openat+0xe6/0x2770 [ 1373.794381] ? __lock_acquire+0x1657/0x5b00 [ 1373.795338] ? path_lookupat+0x860/0x860 [ 1373.796202] ? perf_trace_lock+0xac/0x490 [ 1373.797098] ? SOFTIRQ_verbose+0x10/0x10 [ 1373.797965] ? find_held_lock+0x2c/0x110 [ 1373.798859] ? __lockdep_reset_lock+0x180/0x180 [ 1373.799863] do_filp_open+0x190/0x3e0 [ 1373.800690] ? may_open_dev+0xf0/0xf0 [ 1373.801523] ? alloc_fd+0x2e7/0x670 [ 1373.802308] ? lock_downgrade+0x6d0/0x6d0 [ 1373.803203] ? do_raw_spin_lock+0x121/0x260 [ 1373.804133] ? rwlock_bug.part.0+0x90/0x90 [ 1373.805058] ? _raw_spin_unlock+0x1a/0x30 [ 1373.805944] ? alloc_fd+0x2e7/0x670 [ 1373.806760] do_sys_openat2+0x171/0x4d0 [ 1373.807618] ? build_open_flags+0x6f0/0x6f0 [ 1373.808571] ? rcu_read_lock_any_held+0x75/0xa0 [ 1373.809568] __x64_sys_openat+0x13f/0x1f0 [ 1373.810457] ? __ia32_sys_open+0x1c0/0x1c0 [ 1373.811387] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1373.812508] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1373.813629] do_syscall_64+0x33/0x40 [ 1373.814430] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1373.815545] RIP: 0033:0x7fe0a08afa04 [ 1373.816348] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1373.820303] RSP: 002b:00007fe09de71ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1373.821938] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afa04 [ 1373.823514] RDX: 0000000000000002 RSI: 00007fe09de72000 RDI: 00000000ffffff9c [ 1373.825033] RBP: 00007fe09de72000 R08: 0000000000000000 R09: ffffffffffffffff [ 1373.826601] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1373.828127] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1373.832377] FAULT_INJECTION: forcing a failure. [ 1373.832377] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1373.835086] CPU: 0 PID: 16380 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1373.836576] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1373.838344] Call Trace: [ 1373.838919] dump_stack+0x107/0x167 [ 1373.839689] should_fail.cold+0x5/0xa [ 1373.840499] __alloc_pages_nodemask+0x182/0x600 [ 1373.841481] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1373.842785] ? lock_downgrade+0x6d0/0x6d0 [ 1373.843673] ? lock_acquire+0x197/0x470 [ 1373.844565] alloc_pages_vma+0xbb/0x410 [ 1373.845427] shmem_alloc_page+0x10f/0x1e0 [ 1373.846325] ? shmem_init_inode+0x20/0x20 [ 1373.847260] ? percpu_counter_add_batch+0x8b/0x140 [ 1373.848297] ? __vm_enough_memory+0x184/0x360 [ 1373.849275] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 1373.850460] ? shmem_unuse_inode+0xf60/0xf60 [ 1373.851417] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1373.852530] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1373.853634] shmem_write_begin+0xf7/0x1d0 [ 1373.854539] generic_perform_write+0x20a/0x4f0 [ 1373.855552] ? page_cache_prev_miss+0x310/0x310 [ 1373.856538] ? evict_inodes+0x470/0x470 [ 1373.857402] ? generic_write_checks+0x2ad/0x390 [ 1373.858417] __generic_file_write_iter+0x39d/0x5d0 [ 1373.859484] generic_file_write_iter+0xdb/0x230 [ 1373.860487] ? iov_iter_init+0x3c/0x130 [ 1373.861344] new_sync_write+0x42c/0x660 [ 1373.862210] ? new_sync_read+0x6f0/0x6f0 [ 1373.863118] ? __x64_sys_pwrite64+0x201/0x260 [ 1373.864081] ? lock_release+0x680/0x680 [ 1373.864943] ? selinux_file_permission+0x92/0x520 [ 1373.865977] ? security_file_permission+0xb1/0xe0 [ 1373.867039] vfs_write+0x7c0/0xb10 [ 1373.867821] __x64_sys_pwrite64+0x201/0x260 [ 1373.868761] ? ksys_pwrite64+0x1b0/0x1b0 [ 1373.869630] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1373.870771] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1373.871870] do_syscall_64+0x33/0x40 [ 1373.872681] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1373.873790] RIP: 0033:0x7f9954f20ab7 [ 1373.874583] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1373.878539] RSP: 002b:00007f99524e2f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1373.880183] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f20ab7 [ 1373.881707] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000004 [ 1373.883271] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1373.884815] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1373.886349] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1373.890995] loop4: detected capacity change from 0 to 135266304 04:38:14 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:38:14 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xf423f}) [ 1373.943335] loop7: detected capacity change from 0 to 262144 [ 1373.950827] loop3: detected capacity change from 0 to 262144 [ 1373.977203] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1374.001695] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1374.012857] EXT4-fs (loop7): get root inode failed [ 1374.014023] EXT4-fs (loop7): mount failed 04:38:30 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 6) 04:38:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, 0x0, 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:38:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1389.712601] FAULT_INJECTION: forcing a failure. [ 1389.712601] name failslab, interval 1, probability 0, space 0, times 0 [ 1389.715086] CPU: 0 PID: 16402 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1389.716256] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1389.717747] Call Trace: [ 1389.718199] dump_stack+0x107/0x167 [ 1389.718828] should_fail.cold+0x5/0xa [ 1389.719489] ? security_inode_alloc+0x34/0x160 [ 1389.720285] should_failslab+0x5/0x20 [ 1389.720981] kmem_cache_alloc+0x5b/0x310 [ 1389.721703] security_inode_alloc+0x34/0x160 [ 1389.722495] inode_init_always+0xa4e/0xd10 [ 1389.723242] ? shmem_destroy_inode+0x70/0x70 [ 1389.724035] alloc_inode+0x84/0x240 [ 1389.724684] new_inode+0x23/0x250 [ 1389.725310] shmem_get_inode+0x15e/0xbc0 [ 1389.726054] __shmem_file_setup+0xb8/0x320 [ 1389.726823] ? _copy_from_user+0xfb/0x1b0 [ 1389.727564] __do_sys_memfd_create+0x275/0x450 [ 1389.728380] ? memfd_file_seals_ptr+0x170/0x170 [ 1389.729220] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1389.730157] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1389.731083] do_syscall_64+0x33/0x40 [ 1389.731750] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1389.732653] RIP: 0033:0x7f40b893ab19 [ 1389.733313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1389.736515] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1389.737840] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f40b893ab19 [ 1389.739090] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f40b89940fb [ 1389.740321] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1389.741562] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1389.742789] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 04:38:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 29) 04:38:30 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x40000000}) 04:38:30 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:38:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 15) 04:38:30 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x1000000}) [ 1389.758421] FAULT_INJECTION: forcing a failure. [ 1389.758421] name failslab, interval 1, probability 0, space 0, times 0 [ 1389.760221] CPU: 1 PID: 16409 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1389.761174] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1389.762303] Call Trace: [ 1389.762668] dump_stack+0x107/0x167 [ 1389.763182] should_fail.cold+0x5/0xa [ 1389.763705] ? __d_alloc+0x2a/0x990 [ 1389.764214] should_failslab+0x5/0x20 [ 1389.764732] kmem_cache_alloc+0x5b/0x310 [ 1389.765292] __d_alloc+0x2a/0x990 [ 1389.765773] d_alloc_parallel+0x111/0x1bc0 [ 1389.766342] ? __d_lookup+0x396/0x760 [ 1389.766867] ? lock_downgrade+0x6d0/0x6d0 [ 1389.767422] ? find_held_lock+0x2c/0x110 [ 1389.767981] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1389.768538] ? __d_lookup+0x3bf/0x760 [ 1389.769067] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1389.769789] lookup_open.isra.0+0x962/0x1270 [ 1389.770395] ? vfs_tmpfile+0x350/0x350 [ 1389.770944] ? __mnt_want_write+0x196/0x280 [ 1389.771537] path_openat+0x972/0x2770 [ 1389.772066] ? path_lookupat+0x860/0x860 [ 1389.772619] ? perf_trace_lock+0xac/0x490 [ 1389.773182] ? SOFTIRQ_verbose+0x10/0x10 [ 1389.773736] ? find_held_lock+0x2c/0x110 [ 1389.774293] ? __lockdep_reset_lock+0x180/0x180 [ 1389.774932] do_filp_open+0x190/0x3e0 [ 1389.775449] ? may_open_dev+0xf0/0xf0 [ 1389.775975] ? do_raw_spin_lock+0x121/0x260 [ 1389.776563] ? rwlock_bug.part.0+0x90/0x90 [ 1389.777147] ? _raw_spin_unlock+0x1a/0x30 [ 1389.777719] ? alloc_fd+0x2e7/0x670 [ 1389.778225] do_sys_openat2+0x171/0x4d0 [ 1389.778777] ? build_open_flags+0x6f0/0x6f0 [ 1389.779371] ? rcu_read_lock_any_held+0x75/0xa0 [ 1389.780005] __x64_sys_openat+0x13f/0x1f0 [ 1389.780572] ? __ia32_sys_open+0x1c0/0x1c0 [ 1389.781144] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1389.781854] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1389.782555] do_syscall_64+0x33/0x40 [ 1389.783058] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1389.783755] RIP: 0033:0x7fe0a08afa04 [ 1389.784260] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1389.786693] RSP: 002b:00007fe09de71ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1389.787708] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afa04 [ 1389.788650] RDX: 0000000000000002 RSI: 00007fe09de72000 RDI: 00000000ffffff9c [ 1389.789589] RBP: 00007fe09de72000 R08: 0000000000000000 R09: ffffffffffffffff [ 1389.790531] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1389.791478] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1389.795463] FAULT_INJECTION: forcing a failure. [ 1389.795463] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1389.797667] CPU: 1 PID: 16410 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1389.798601] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1389.799721] Call Trace: [ 1389.800077] dump_stack+0x107/0x167 [ 1389.800569] should_fail.cold+0x5/0xa [ 1389.801093] __alloc_pages_nodemask+0x182/0x600 [ 1389.801724] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1389.802528] ? lock_downgrade+0x6d0/0x6d0 [ 1389.803095] ? lock_acquire+0x197/0x470 [ 1389.803635] alloc_pages_vma+0xbb/0x410 [ 1389.804179] shmem_alloc_page+0x10f/0x1e0 [ 1389.804739] ? shmem_init_inode+0x20/0x20 [ 1389.805317] ? percpu_counter_add_batch+0x8b/0x140 [ 1389.805974] ? __vm_enough_memory+0x184/0x360 [ 1389.806582] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 1389.807318] ? shmem_unuse_inode+0xf60/0xf60 [ 1389.807912] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1389.808603] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1389.809285] shmem_write_begin+0xf7/0x1d0 [ 1389.809846] generic_perform_write+0x20a/0x4f0 [ 1389.810465] ? page_cache_prev_miss+0x310/0x310 [ 1389.811086] ? evict_inodes+0x470/0x470 [ 1389.811615] ? generic_write_checks+0x2ad/0x390 [ 1389.812411] __generic_file_write_iter+0x39d/0x5d0 [ 1389.813081] generic_file_write_iter+0xdb/0x230 [ 1389.813790] ? iov_iter_init+0x3c/0x130 [ 1389.814451] new_sync_write+0x42c/0x660 [ 1389.815048] ? new_sync_read+0x6f0/0x6f0 [ 1389.815591] ? __x64_sys_pwrite64+0x201/0x260 [ 1389.816193] ? lock_release+0x680/0x680 [ 1389.816858] ? selinux_file_permission+0x92/0x520 [ 1389.817515] ? security_file_permission+0xb1/0xe0 [ 1389.818194] vfs_write+0x7c0/0xb10 [ 1389.818690] __x64_sys_pwrite64+0x201/0x260 [ 1389.819282] ? ksys_pwrite64+0x1b0/0x1b0 [ 1389.819842] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1389.820559] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1389.821257] do_syscall_64+0x33/0x40 [ 1389.821769] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1389.822477] RIP: 0033:0x7f9954f20ab7 [ 1389.822995] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1389.825419] RSP: 002b:00007f99524e2f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1389.826458] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f20ab7 [ 1389.827429] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000004 [ 1389.828394] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1389.829367] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1389.830324] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 1389.833043] loop4: detected capacity change from 0 to 135266304 04:38:30 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:38:30 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xb000000}) 04:38:30 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x97ee5c27}) 04:38:30 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 7) 04:38:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1389.951479] FAULT_INJECTION: forcing a failure. [ 1389.951479] name failslab, interval 1, probability 0, space 0, times 0 [ 1389.952990] CPU: 1 PID: 16426 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1389.953854] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1389.954936] Call Trace: [ 1389.955270] dump_stack+0x107/0x167 [ 1389.955739] should_fail.cold+0x5/0xa [ 1389.956216] ? create_object.isra.0+0x3a/0xa20 [ 1389.956798] should_failslab+0x5/0x20 [ 1389.957267] kmem_cache_alloc+0x5b/0x310 [ 1389.957779] create_object.isra.0+0x3a/0xa20 [ 1389.958357] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1389.958990] kmem_cache_alloc+0x159/0x310 [ 1389.959529] security_inode_alloc+0x34/0x160 [ 1389.960072] inode_init_always+0xa4e/0xd10 [ 1389.960591] ? shmem_destroy_inode+0x70/0x70 [ 1389.961166] alloc_inode+0x84/0x240 [ 1389.961614] new_inode+0x23/0x250 [ 1389.962065] shmem_get_inode+0x15e/0xbc0 [ 1389.962587] __shmem_file_setup+0xb8/0x320 [ 1389.963149] ? _copy_from_user+0xfb/0x1b0 [ 1389.963661] __do_sys_memfd_create+0x275/0x450 [ 1389.964241] ? memfd_file_seals_ptr+0x170/0x170 [ 1389.964817] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1389.965459] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1389.966105] do_syscall_64+0x33/0x40 [ 1389.966588] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1389.967221] RIP: 0033:0x7f40b893ab19 [ 1389.967701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1389.970070] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1389.971072] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f40b893ab19 [ 1389.971998] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f40b89940fb [ 1389.972900] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1389.973783] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1389.974655] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 04:38:30 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x275cee97}) [ 1390.036049] loop3: detected capacity change from 0 to 262144 [ 1390.044897] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1390.067079] loop7: detected capacity change from 0 to 262144 [ 1390.080998] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1390.082665] EXT4-fs (loop7): get root inode failed [ 1390.083279] EXT4-fs (loop7): mount failed [ 1406.516221] FAULT_INJECTION: forcing a failure. [ 1406.516221] name failslab, interval 1, probability 0, space 0, times 0 [ 1406.517914] CPU: 1 PID: 16443 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1406.518886] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1406.520056] Call Trace: [ 1406.520442] dump_stack+0x107/0x167 [ 1406.520951] should_fail.cold+0x5/0xa [ 1406.521489] ? __d_alloc+0x2a/0x990 [ 1406.521997] should_failslab+0x5/0x20 [ 1406.522527] kmem_cache_alloc+0x5b/0x310 [ 1406.523104] ? trace_hardirqs_on+0x5b/0x180 [ 1406.523719] __d_alloc+0x2a/0x990 [ 1406.524210] d_alloc_pseudo+0x19/0x70 [ 1406.524470] FAULT_INJECTION: forcing a failure. [ 1406.524470] name failslab, interval 1, probability 0, space 0, times 0 [ 1406.524736] alloc_file_pseudo+0xce/0x250 [ 1406.524750] ? alloc_file+0x5a0/0x5a0 [ 1406.524776] ? shmem_get_inode+0x55c/0xbc0 [ 1406.527799] __shmem_file_setup+0x144/0x320 [ 1406.528293] ? _copy_from_user+0xfb/0x1b0 [ 1406.528765] __do_sys_memfd_create+0x275/0x450 [ 1406.529286] ? memfd_file_seals_ptr+0x170/0x170 [ 1406.529820] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1406.530414] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1406.531001] do_syscall_64+0x33/0x40 [ 1406.531424] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1406.532001] RIP: 0033:0x7f40b893ab19 [ 1406.532417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1406.534469] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1406.535352] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f40b893ab19 [ 1406.536160] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f40b89940fb [ 1406.536965] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1406.537769] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1406.538570] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1406.539424] CPU: 0 PID: 16445 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1406.541051] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1406.542920] Call Trace: [ 1406.543553] dump_stack+0x107/0x167 [ 1406.544391] should_fail.cold+0x5/0xa [ 1406.545259] ? create_object.isra.0+0x3a/0xa20 [ 1406.546306] should_failslab+0x5/0x20 [ 1406.547181] kmem_cache_alloc+0x5b/0x310 [ 1406.548114] create_object.isra.0+0x3a/0xa20 [ 1406.549101] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1406.550257] kmem_cache_alloc+0x159/0x310 [ 1406.551224] __d_alloc+0x2a/0x990 [ 1406.552021] d_alloc_parallel+0x111/0x1bc0 [ 1406.552988] ? __d_lookup+0x396/0x760 [ 1406.553870] ? lock_downgrade+0x6d0/0x6d0 [ 1406.554819] ? find_held_lock+0x2c/0x110 [ 1406.555763] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1406.556706] ? __d_lookup+0x3bf/0x760 [ 1406.557581] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1406.558771] lookup_open.isra.0+0x962/0x1270 [ 1406.559790] ? vfs_tmpfile+0x350/0x350 [ 1406.560713] ? __mnt_want_write+0x196/0x280 [ 1406.561702] path_openat+0x972/0x2770 [ 1406.562589] ? path_lookupat+0x860/0x860 [ 1406.563525] ? perf_trace_lock+0xac/0x490 [ 1406.564485] ? SOFTIRQ_verbose+0x10/0x10 [ 1406.565410] ? find_held_lock+0x2c/0x110 [ 1406.566338] ? __lockdep_reset_lock+0x180/0x180 [ 1406.567415] do_filp_open+0x190/0x3e0 [ 1406.568278] ? may_open_dev+0xf0/0xf0 [ 1406.569171] ? do_raw_spin_lock+0x121/0x260 [ 1406.570155] ? rwlock_bug.part.0+0x90/0x90 [ 1406.571150] ? _raw_spin_unlock+0x1a/0x30 [ 1406.572106] ? alloc_fd+0x2e7/0x670 [ 1406.572952] do_sys_openat2+0x171/0x4d0 [ 1406.573863] ? build_open_flags+0x6f0/0x6f0 [ 1406.574858] ? rcu_read_lock_any_held+0x75/0xa0 [ 1406.575945] __x64_sys_openat+0x13f/0x1f0 [ 1406.576894] ? __ia32_sys_open+0x1c0/0x1c0 [ 1406.577877] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1406.579079] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1406.580263] do_syscall_64+0x33/0x40 [ 1406.581111] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1406.582284] RIP: 0033:0x7fe0a08afa04 [ 1406.583154] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1406.587295] RSP: 002b:00007fe09de71ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1406.589002] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afa04 [ 1406.590618] RDX: 0000000000000002 RSI: 00007fe09de72000 RDI: 00000000ffffff9c [ 1406.592240] RBP: 00007fe09de72000 R08: 0000000000000000 R09: ffffffffffffffff [ 1406.593859] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1406.595478] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1406.605773] FAULT_INJECTION: forcing a failure. [ 1406.605773] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1406.608490] CPU: 0 PID: 16449 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1406.610049] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1406.611931] Call Trace: [ 1406.612537] dump_stack+0x107/0x167 [ 1406.613556] should_fail.cold+0x5/0xa [ 1406.614427] __alloc_pages_nodemask+0x182/0x600 [ 1406.615499] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1406.616845] ? lock_downgrade+0x6d0/0x6d0 [ 1406.617776] ? lock_acquire+0x197/0x470 [ 1406.618703] alloc_pages_vma+0xbb/0x410 [ 1406.619624] shmem_alloc_page+0x10f/0x1e0 [ 1406.620567] ? shmem_init_inode+0x20/0x20 [ 1406.621544] ? percpu_counter_add_batch+0x8b/0x140 [ 1406.622671] ? __vm_enough_memory+0x184/0x360 [ 1406.623709] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 1406.624955] ? shmem_unuse_inode+0xf60/0xf60 [ 1406.625967] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1406.627153] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1406.628322] shmem_write_begin+0xf7/0x1d0 [ 1406.629277] generic_perform_write+0x20a/0x4f0 [ 1406.630332] ? page_cache_prev_miss+0x310/0x310 [ 1406.631412] ? evict_inodes+0x470/0x470 [ 1406.632316] ? generic_write_checks+0x2ad/0x390 [ 1406.633390] __generic_file_write_iter+0x39d/0x5d0 [ 1406.634508] generic_file_write_iter+0xdb/0x230 [ 1406.635571] ? iov_iter_init+0x3c/0x130 [ 1406.636484] new_sync_write+0x42c/0x660 [ 1406.637389] ? new_sync_read+0x6f0/0x6f0 [ 1406.638317] ? __x64_sys_pwrite64+0x201/0x260 [ 1406.639349] ? lock_release+0x680/0x680 [ 1406.640259] ? selinux_file_permission+0x92/0x520 [ 1406.641352] ? security_file_permission+0xb1/0xe0 [ 1406.642452] vfs_write+0x7c0/0xb10 [ 1406.643285] __x64_sys_pwrite64+0x201/0x260 [ 1406.644277] ? ksys_pwrite64+0x1b0/0x1b0 [ 1406.645212] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1406.646402] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1406.647582] do_syscall_64+0x33/0x40 [ 1406.648434] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1406.649594] RIP: 0033:0x7f9954f20ab7 [ 1406.650449] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1406.654609] RSP: 002b:00007f99524e2f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1406.656341] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f20ab7 [ 1406.657958] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1406.659250] loop4: detected capacity change from 0 to 135266304 [ 1406.659587] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1406.659601] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 1406.659616] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:38:46 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:38:46 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xffc99a3b}) 04:38:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, 0x0, 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:38:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 8) 04:38:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 30) 04:38:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{0x0}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:38:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 16) 04:38:46 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x3b9ac9ff}) 04:38:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 9) 04:38:47 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:38:47 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x100000000000000}) [ 1406.700238] FAULT_INJECTION: forcing a failure. [ 1406.700238] name failslab, interval 1, probability 0, space 0, times 0 [ 1406.701574] CPU: 1 PID: 16463 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1406.702361] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1406.703313] Call Trace: [ 1406.703618] dump_stack+0x107/0x167 [ 1406.704034] should_fail.cold+0x5/0xa [ 1406.704472] ? create_object.isra.0+0x3a/0xa20 [ 1406.704992] should_failslab+0x5/0x20 [ 1406.705428] kmem_cache_alloc+0x5b/0x310 [ 1406.705888] create_object.isra.0+0x3a/0xa20 [ 1406.706381] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1406.706961] kmem_cache_alloc+0x159/0x310 [ 1406.707429] ? trace_hardirqs_on+0x5b/0x180 [ 1406.707919] __d_alloc+0x2a/0x990 [ 1406.708312] d_alloc_pseudo+0x19/0x70 [ 1406.708740] alloc_file_pseudo+0xce/0x250 [ 1406.709206] ? alloc_file+0x5a0/0x5a0 [ 1406.709641] ? shmem_get_inode+0x55c/0xbc0 [ 1406.710129] __shmem_file_setup+0x144/0x320 [ 1406.710620] ? _copy_from_user+0xfb/0x1b0 [ 1406.711101] __do_sys_memfd_create+0x275/0x450 [ 1406.711619] ? memfd_file_seals_ptr+0x170/0x170 [ 1406.712153] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1406.712745] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1406.713331] do_syscall_64+0x33/0x40 [ 1406.713800] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1406.714374] RIP: 0033:0x7f40b893ab19 [ 1406.714794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1406.716871] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1406.717732] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f40b893ab19 [ 1406.718535] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f40b89940fb [ 1406.719347] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1406.720154] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1406.720966] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1406.744978] loop7: detected capacity change from 0 to 262144 [ 1406.759448] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1406.761362] EXT4-fs (loop7): get root inode failed [ 1406.762009] EXT4-fs (loop7): mount failed [ 1406.838443] loop3: detected capacity change from 0 to 262144 [ 1406.843340] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1406.844459] EXT4-fs (loop3): group descriptors corrupted! 04:39:02 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x200000000000000}) 04:39:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, 0x0, 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:39:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 31) 04:39:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{0x0}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:39:02 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x3f420f00}) 04:39:02 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:39:02 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 10) 04:39:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 17) [ 1421.711484] FAULT_INJECTION: forcing a failure. [ 1421.711484] name failslab, interval 1, probability 0, space 0, times 0 [ 1421.713678] FAULT_INJECTION: forcing a failure. [ 1421.713678] name failslab, interval 1, probability 0, space 0, times 0 [ 1421.714109] CPU: 1 PID: 16486 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1421.717490] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1421.719354] Call Trace: [ 1421.719960] dump_stack+0x107/0x167 [ 1421.720784] should_fail.cold+0x5/0xa [ 1421.721644] ? __alloc_file+0x21/0x320 [ 1421.722528] should_failslab+0x5/0x20 [ 1421.723397] kmem_cache_alloc+0x5b/0x310 [ 1421.724324] __alloc_file+0x21/0x320 [ 1421.725175] alloc_empty_file+0x6d/0x170 [ 1421.726085] alloc_file+0x5e/0x5a0 [ 1421.726901] alloc_file_pseudo+0x16a/0x250 [ 1421.727868] ? alloc_file+0x5a0/0x5a0 [ 1421.728749] ? shmem_get_inode+0x55c/0xbc0 [ 1421.729718] __shmem_file_setup+0x144/0x320 [ 1421.730703] ? _copy_from_user+0xfb/0x1b0 [ 1421.731651] __do_sys_memfd_create+0x275/0x450 [ 1421.732684] ? memfd_file_seals_ptr+0x170/0x170 [ 1421.733724] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1421.734904] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1421.736062] do_syscall_64+0x33/0x40 [ 1421.736901] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1421.738036] RIP: 0033:0x7f40b893ab19 [ 1421.738878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1421.742978] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1421.744698] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f40b893ab19 [ 1421.746306] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f40b89940fb [ 1421.747932] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1421.749536] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1421.751148] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1421.752777] CPU: 0 PID: 16487 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1421.754216] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1421.755952] Call Trace: [ 1421.756509] dump_stack+0x107/0x167 [ 1421.757263] should_fail.cold+0x5/0xa [ 1421.758063] ? xas_alloc+0x336/0x440 [ 1421.758839] should_failslab+0x5/0x20 [ 1421.759633] kmem_cache_alloc+0x5b/0x310 [ 1421.760475] ? __lockdep_reset_lock+0x180/0x180 [ 1421.761438] xas_alloc+0x336/0x440 [ 1421.762113] xas_create+0x60f/0x10d0 [ 1421.762900] xas_create_range+0x189/0x620 [ 1421.763698] shmem_add_to_page_cache+0x760/0x1130 [ 1421.764724] ? shmem_getattr+0x180/0x180 [ 1421.765450] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 1421.766388] ? shmem_unuse_inode+0xf60/0xf60 [ 1421.767165] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1421.768046] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1421.768933] shmem_write_begin+0xf7/0x1d0 [ 1421.769655] generic_perform_write+0x20a/0x4f0 [ 1421.770461] ? page_cache_prev_miss+0x310/0x310 [ 1421.771273] ? evict_inodes+0x470/0x470 [ 1421.771961] ? generic_write_checks+0x2ad/0x390 [ 1421.772762] __generic_file_write_iter+0x39d/0x5d0 [ 1421.773785] generic_file_write_iter+0xdb/0x230 [ 1421.774652] ? iov_iter_init+0x3c/0x130 [ 1421.775494] new_sync_write+0x42c/0x660 [ 1421.776194] ? new_sync_read+0x6f0/0x6f0 [ 1421.777033] ? __x64_sys_pwrite64+0x201/0x260 [ 1421.777812] ? lock_release+0x680/0x680 [ 1421.778644] ? selinux_file_permission+0x92/0x520 [ 1421.779518] ? security_file_permission+0xb1/0xe0 [ 1421.780534] vfs_write+0x7c0/0xb10 [ 1421.781164] __x64_sys_pwrite64+0x201/0x260 [ 1421.782076] ? ksys_pwrite64+0x1b0/0x1b0 [ 1421.782778] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1421.783867] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1421.784825] do_syscall_64+0x33/0x40 [ 1421.785594] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1421.786475] RIP: 0033:0x7f9954f20ab7 [ 1421.787251] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1421.790385] RSP: 002b:00007f99524e2f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1421.791975] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f20ab7 [ 1421.793448] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1421.794926] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1421.796422] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 1421.797923] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1421.802090] FAULT_INJECTION: forcing a failure. [ 1421.802090] name failslab, interval 1, probability 0, space 0, times 0 [ 1421.803657] CPU: 0 PID: 16490 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1421.804619] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1421.805768] Call Trace: [ 1421.806129] dump_stack+0x107/0x167 [ 1421.806620] should_fail.cold+0x5/0xa [ 1421.807140] ? create_object.isra.0+0x3a/0xa20 [ 1421.807750] should_failslab+0x5/0x20 [ 1421.808258] kmem_cache_alloc+0x5b/0x310 [ 1421.808820] create_object.isra.0+0x3a/0xa20 [ 1421.809417] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1421.810099] kmem_cache_alloc+0x159/0x310 [ 1421.810660] __d_alloc+0x2a/0x990 [ 1421.811135] d_alloc_parallel+0x111/0x1bc0 [ 1421.811925] ? __d_lookup+0x396/0x760 [ 1421.812541] ? lock_downgrade+0x6d0/0x6d0 [ 1421.813098] ? find_held_lock+0x2c/0x110 [ 1421.813645] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1421.814198] ? __d_lookup+0x3bf/0x760 [ 1421.814711] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1421.815427] lookup_open.isra.0+0x962/0x1270 [ 1421.816018] ? vfs_tmpfile+0x350/0x350 [ 1421.816562] ? __mnt_want_write+0x196/0x280 [ 1421.817150] path_openat+0x972/0x2770 [ 1421.817668] ? path_lookupat+0x860/0x860 [ 1421.818210] ? perf_trace_lock+0xac/0x490 [ 1421.818784] ? SOFTIRQ_verbose+0x10/0x10 [ 1421.819332] ? find_held_lock+0x2c/0x110 [ 1421.819878] ? __lockdep_reset_lock+0x180/0x180 [ 1421.820503] do_filp_open+0x190/0x3e0 [ 1421.821012] ? may_open_dev+0xf0/0xf0 [ 1421.821531] ? do_raw_spin_lock+0x121/0x260 [ 1421.822020] loop4: detected capacity change from 0 to 135266304 [ 1421.822111] ? rwlock_bug.part.0+0x90/0x90 [ 1421.823956] ? _raw_spin_unlock+0x1a/0x30 [ 1421.824508] ? alloc_fd+0x2e7/0x670 [ 1421.825004] do_sys_openat2+0x171/0x4d0 [ 1421.825538] ? build_open_flags+0x6f0/0x6f0 [ 1421.826122] ? rcu_read_lock_any_held+0x75/0xa0 [ 1421.826747] __x64_sys_openat+0x13f/0x1f0 [ 1421.827312] ? __ia32_sys_open+0x1c0/0x1c0 [ 1421.827896] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1421.828608] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1421.829299] do_syscall_64+0x33/0x40 [ 1421.829796] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1421.830479] RIP: 0033:0x7fe0a08afa04 [ 1421.830977] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1421.833437] RSP: 002b:00007fe09de71ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1421.834450] RAX: ffffffffffffffda RBX: 00007fe0a0946970 RCX: 00007fe0a08afa04 [ 1421.835410] RDX: 0000000000000002 RSI: 00007fe09de72000 RDI: 00000000ffffff9c [ 1421.836359] RBP: 00007fe09de72000 R08: 0000000000000000 R09: ffffffffffffffff [ 1421.837311] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1421.838314] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 04:39:02 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:39:02 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:39:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{0x0}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:39:02 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x40000000}) 04:39:02 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 11) [ 1421.994992] loop3: detected capacity change from 0 to 262144 04:39:02 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x275cee97ffffffff}) [ 1422.027719] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block 04:39:02 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) [ 1422.029963] EXT4-fs (loop3): get root inode failed [ 1422.030888] EXT4-fs (loop3): mount failed 04:39:02 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x97ee5c27}) 04:39:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 32) [ 1422.069957] FAULT_INJECTION: forcing a failure. [ 1422.069957] name failslab, interval 1, probability 0, space 0, times 0 [ 1422.072355] CPU: 1 PID: 16505 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1422.073798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1422.075534] Call Trace: [ 1422.076089] dump_stack+0x107/0x167 [ 1422.076855] should_fail.cold+0x5/0xa [ 1422.077667] ? create_object.isra.0+0x3a/0xa20 [ 1422.078634] should_failslab+0x5/0x20 [ 1422.079442] kmem_cache_alloc+0x5b/0x310 [ 1422.080300] create_object.isra.0+0x3a/0xa20 [ 1422.081219] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1422.082297] kmem_cache_alloc+0x159/0x310 [ 1422.083187] __alloc_file+0x21/0x320 [ 1422.083968] alloc_empty_file+0x6d/0x170 [ 1422.084820] alloc_file+0x5e/0x5a0 [ 1422.085570] alloc_file_pseudo+0x16a/0x250 [ 1422.086458] ? alloc_file+0x5a0/0x5a0 [ 1422.087274] ? shmem_get_inode+0x55c/0xbc0 [ 1422.088175] __shmem_file_setup+0x144/0x320 [ 1422.089085] ? _copy_from_user+0xfb/0x1b0 [ 1422.089956] __do_sys_memfd_create+0x275/0x450 [ 1422.090917] ? memfd_file_seals_ptr+0x170/0x170 [ 1422.091904] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1422.092999] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1422.094085] do_syscall_64+0x33/0x40 [ 1422.094864] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1422.095951] RIP: 0033:0x7f40b893ab19 [ 1422.096730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1422.100598] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1422.102188] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f40b893ab19 [ 1422.103685] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f40b89940fb [ 1422.105170] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1422.106652] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1422.108155] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1422.110704] FAULT_INJECTION: forcing a failure. [ 1422.110704] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1422.112767] CPU: 0 PID: 16510 Comm: syz-executor.2 Not tainted 5.10.236 #1 [ 1422.113735] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1422.114902] Call Trace: [ 1422.115283] dump_stack+0x107/0x167 [ 1422.115796] should_fail.cold+0x5/0xa [ 1422.116340] _copy_from_user+0x2e/0x1b0 [ 1422.116911] kstrtouint_from_user+0xbd/0x220 [ 1422.117537] ? kstrtou8_from_user+0x210/0x210 [ 1422.118171] ? lock_acquire+0x197/0x470 [ 1422.118727] ? ksys_write+0x12d/0x260 [ 1422.119273] proc_fail_nth_write+0x78/0x220 [ 1422.119875] ? proc_task_getattr+0x1f0/0x1f0 [ 1422.120505] ? proc_task_getattr+0x1f0/0x1f0 [ 1422.121127] vfs_write+0x29a/0xb10 [ 1422.121631] ksys_write+0x12d/0x260 [ 1422.122140] ? __ia32_sys_read+0xb0/0xb0 [ 1422.122721] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1422.123463] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1422.124188] do_syscall_64+0x33/0x40 [ 1422.124711] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1422.125434] RIP: 0033:0x7fe0a08af5ff [ 1422.125961] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1422.128504] RSP: 002b:00007fe09de72170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1422.129560] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe0a08af5ff [ 1422.130547] RDX: 0000000000000001 RSI: 00007fe09de721e0 RDI: 0000000000000003 [ 1422.131542] RBP: 00007fe09de721d0 R08: 0000000000000000 R09: ffffffffffffffff [ 1422.132542] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1422.133535] R13: 00007fff78f0cfef R14: 00007fe09de72300 R15: 0000000000022000 04:39:02 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:39:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:39:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 1422.205471] loop7: detected capacity change from 0 to 262144 [ 1422.220095] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1422.221724] EXT4-fs (loop7): get root inode failed [ 1422.222284] EXT4-fs (loop7): mount failed 04:39:16 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xd0000000}) 04:39:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:39:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:39:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:39:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 18) 04:39:16 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:39:16 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x3f420f0000000000}) 04:39:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 12) [ 1436.264706] FAULT_INJECTION: forcing a failure. [ 1436.264706] name failslab, interval 1, probability 0, space 0, times 0 [ 1436.267248] CPU: 1 PID: 16538 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1436.268753] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1436.270544] Call Trace: [ 1436.271115] dump_stack+0x107/0x167 [ 1436.271912] should_fail.cold+0x5/0xa [ 1436.272737] ? security_file_alloc+0x34/0x170 [ 1436.273710] should_failslab+0x5/0x20 [ 1436.274533] kmem_cache_alloc+0x5b/0x310 [ 1436.275424] security_file_alloc+0x34/0x170 [ 1436.276358] __alloc_file+0xb7/0x320 [ 1436.277166] alloc_empty_file+0x6d/0x170 [ 1436.278044] alloc_file+0x5e/0x5a0 [ 1436.278816] alloc_file_pseudo+0x16a/0x250 [ 1436.278850] loop4: detected capacity change from 0 to 135266304 [ 1436.279733] ? alloc_file+0x5a0/0x5a0 [ 1436.279761] ? shmem_get_inode+0x55c/0xbc0 [ 1436.282385] __shmem_file_setup+0x144/0x320 [ 1436.283330] ? _copy_from_user+0xfb/0x1b0 [ 1436.284228] __do_sys_memfd_create+0x275/0x450 [ 1436.285215] ? memfd_file_seals_ptr+0x170/0x170 [ 1436.286229] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1436.287374] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1436.288490] do_syscall_64+0x33/0x40 [ 1436.289293] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1436.290399] RIP: 0033:0x7f40b893ab19 [ 1436.291202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1436.295182] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1436.296838] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f40b893ab19 [ 1436.298372] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f40b89940fb [ 1436.299923] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1436.301458] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1436.302993] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1436.326929] FAULT_INJECTION: forcing a failure. [ 1436.326929] name failslab, interval 1, probability 0, space 0, times 0 [ 1436.329273] CPU: 1 PID: 16532 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1436.330720] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1436.332474] Call Trace: [ 1436.333030] dump_stack+0x107/0x167 [ 1436.333797] should_fail.cold+0x5/0xa [ 1436.334604] ? create_object.isra.0+0x3a/0xa20 [ 1436.335575] should_failslab+0x5/0x20 [ 1436.336374] kmem_cache_alloc+0x5b/0x310 [ 1436.337236] create_object.isra.0+0x3a/0xa20 [ 1436.338154] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1436.339223] kmem_cache_alloc+0x159/0x310 [ 1436.340101] ? __lockdep_reset_lock+0x180/0x180 [ 1436.341095] xas_alloc+0x336/0x440 [ 1436.341843] xas_create+0x60f/0x10d0 [ 1436.342648] xas_create_range+0x189/0x620 [ 1436.343542] shmem_add_to_page_cache+0x760/0x1130 [ 1436.344575] ? shmem_getattr+0x180/0x180 [ 1436.345455] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 1436.346593] ? shmem_unuse_inode+0xf60/0xf60 [ 1436.347536] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1436.348612] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1436.349687] shmem_write_begin+0xf7/0x1d0 [ 1436.350564] generic_perform_write+0x20a/0x4f0 [ 1436.351542] ? page_cache_prev_miss+0x310/0x310 [ 1436.352522] ? evict_inodes+0x470/0x470 [ 1436.353356] ? generic_write_checks+0x2ad/0x390 [ 1436.354343] __generic_file_write_iter+0x39d/0x5d0 [ 1436.355386] generic_file_write_iter+0xdb/0x230 [ 1436.356357] ? iov_iter_init+0x3c/0x130 [ 1436.357193] new_sync_write+0x42c/0x660 [ 1436.358028] ? new_sync_read+0x6f0/0x6f0 [ 1436.358880] ? __x64_sys_pwrite64+0x201/0x260 [ 1436.359837] ? lock_release+0x680/0x680 [ 1436.360676] ? selinux_file_permission+0x92/0x520 [ 1436.361688] ? security_file_permission+0xb1/0xe0 [ 1436.362712] vfs_write+0x7c0/0xb10 [ 1436.363475] __x64_sys_pwrite64+0x201/0x260 [ 1436.364379] ? ksys_pwrite64+0x1b0/0x1b0 [ 1436.365233] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1436.366335] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1436.367425] do_syscall_64+0x33/0x40 [ 1436.368205] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1436.369280] RIP: 0033:0x7f9954f20ab7 [ 1436.370058] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1436.373922] RSP: 002b:00007f99524e2f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1436.375526] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f20ab7 [ 1436.377021] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1436.378517] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1436.380015] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 1436.381511] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:39:16 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:39:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:39:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x45a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:39:16 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x4000000000000000}) 04:39:16 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xffc99a3b}) 04:39:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1009, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:39:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4282, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:39:17 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) [ 1436.604837] loop3: detected capacity change from 0 to 262144 [ 1436.616747] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1436.618427] EXT4-fs (loop3): get root inode failed [ 1436.619042] EXT4-fs (loop3): mount failed 04:39:30 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xffc99a3b00000000}) 04:39:30 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:39:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8008, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:39:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:39:30 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x100000000000000}) 04:39:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:39:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 19) 04:39:30 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 13) [ 1450.461973] FAULT_INJECTION: forcing a failure. [ 1450.461973] name failslab, interval 1, probability 0, space 0, times 0 [ 1450.463672] CPU: 1 PID: 16586 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1450.464642] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1450.465799] Call Trace: [ 1450.466174] dump_stack+0x107/0x167 [ 1450.466684] should_fail.cold+0x5/0xa [ 1450.467218] ? create_object.isra.0+0x3a/0xa20 [ 1450.467875] should_failslab+0x5/0x20 [ 1450.468408] kmem_cache_alloc+0x5b/0x310 [ 1450.468994] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1450.469804] create_object.isra.0+0x3a/0xa20 [ 1450.470028] loop4: detected capacity change from 0 to 135266304 [ 1450.470454] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1450.470477] kmem_cache_alloc+0x159/0x310 [ 1450.473339] security_file_alloc+0x34/0x170 [ 1450.473937] __alloc_file+0xb7/0x320 [ 1450.474454] alloc_empty_file+0x6d/0x170 [ 1450.475017] alloc_file+0x5e/0x5a0 [ 1450.475520] alloc_file_pseudo+0x16a/0x250 [ 1450.476113] ? alloc_file+0x5a0/0x5a0 [ 1450.476647] ? shmem_get_inode+0x55c/0xbc0 [ 1450.477240] __shmem_file_setup+0x144/0x320 [ 1450.477840] ? _copy_from_user+0xfb/0x1b0 [ 1450.478417] __do_sys_memfd_create+0x275/0x450 [ 1450.479053] ? memfd_file_seals_ptr+0x170/0x170 [ 1450.479713] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1450.480439] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1450.481157] do_syscall_64+0x33/0x40 [ 1450.481675] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1450.482386] RIP: 0033:0x7f40b893ab19 [ 1450.482902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1450.485480] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1450.486549] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f40b893ab19 [ 1450.487547] RDX: 0000000000008400 RSI: 0000000000000000 RDI: 00007f40b89940fb [ 1450.488540] RBP: 0000000000000003 R08: 0000000000004200 R09: ffffffffffffffff [ 1450.489536] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 1450.490529] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013a00 [ 1450.492784] FAULT_INJECTION: forcing a failure. [ 1450.492784] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1450.494481] CPU: 1 PID: 16590 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1450.495487] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1450.496689] Call Trace: [ 1450.497078] dump_stack+0x107/0x167 [ 1450.497604] should_fail.cold+0x5/0xa [ 1450.498161] __alloc_pages_nodemask+0x182/0x600 [ 1450.498838] ? stack_trace_consume_entry+0x160/0x160 [ 1450.499584] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1450.500464] ? kmem_cache_alloc+0x2d0/0x310 [ 1450.501097] alloc_pages_current+0x187/0x280 [ 1450.501733] ? vfs_write+0x7c0/0xb10 [ 1450.502276] allocate_slab+0x26f/0x380 [ 1450.502823] ___slab_alloc+0x470/0x700 [ 1450.503393] ? create_object.isra.0+0x3a/0xa20 [ 1450.504053] ? create_object.isra.0+0x3a/0xa20 [ 1450.504717] ? kmem_cache_alloc+0x2d0/0x310 [ 1450.505339] kmem_cache_alloc+0x2d0/0x310 [ 1450.505946] create_object.isra.0+0x3a/0xa20 [ 1450.506581] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1450.507323] kmem_cache_alloc+0x159/0x310 [ 1450.507910] ? __lockdep_reset_lock+0x180/0x180 [ 1450.508586] xas_alloc+0x336/0x440 [ 1450.509106] xas_create+0x60f/0x10d0 [ 1450.509663] xas_create_range+0x189/0x620 [ 1450.510277] shmem_add_to_page_cache+0x760/0x1130 [ 1450.510963] ? shmem_getattr+0x180/0x180 [ 1450.511576] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 1450.512364] ? shmem_unuse_inode+0xf60/0xf60 [ 1450.513006] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1450.513751] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1450.514492] shmem_write_begin+0xf7/0x1d0 [ 1450.515099] generic_perform_write+0x20a/0x4f0 [ 1450.515773] ? page_cache_prev_miss+0x310/0x310 [ 1450.516448] ? evict_inodes+0x470/0x470 [ 1450.517017] ? generic_write_checks+0x2ad/0x390 [ 1450.517696] __generic_file_write_iter+0x39d/0x5d0 [ 1450.518405] generic_file_write_iter+0xdb/0x230 [ 1450.519076] ? iov_iter_init+0x3c/0x130 [ 1450.519663] new_sync_write+0x42c/0x660 [ 1450.520239] ? new_sync_read+0x6f0/0x6f0 [ 1450.520833] ? __x64_sys_pwrite64+0x201/0x260 [ 1450.521482] ? lock_release+0x680/0x680 [ 1450.522061] ? selinux_file_permission+0x92/0x520 [ 1450.522762] ? security_file_permission+0xb1/0xe0 [ 1450.523471] vfs_write+0x7c0/0xb10 [ 1450.523992] __x64_sys_pwrite64+0x201/0x260 [ 1450.524617] ? ksys_pwrite64+0x1b0/0x1b0 [ 1450.525205] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1450.525935] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1450.526684] do_syscall_64+0x33/0x40 [ 1450.527206] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1450.527956] RIP: 0033:0x7f9954f20ab7 [ 1450.528475] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1450.531123] RSP: 002b:00007f99524e2f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1450.532227] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f20ab7 [ 1450.533232] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1450.534274] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1450.535310] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 1450.536349] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:39:31 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:39:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:39:31 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xffffffff97ee5c27}) 04:39:31 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:39:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40002, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1450.612928] loop7: detected capacity change from 0 to 262144 04:39:31 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:39:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1450.669039] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1450.690031] loop3: detected capacity change from 0 to 262144 [ 1450.695778] EXT4-fs (loop7): get root inode failed [ 1450.696853] EXT4-fs (loop7): mount failed [ 1450.726098] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1450.730924] EXT4-fs (loop3): get root inode failed [ 1450.732070] EXT4-fs (loop3): mount failed 04:39:46 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:39:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:39:46 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x275cee97ffffffff}) [ 1465.667669] FAULT_INJECTION: forcing a failure. [ 1465.667669] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1465.670324] CPU: 0 PID: 16625 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1465.671806] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1465.673570] Call Trace: [ 1465.674138] dump_stack+0x107/0x167 [ 1465.674916] should_fail.cold+0x5/0xa [ 1465.675742] __alloc_pages_nodemask+0x182/0x600 [ 1465.676773] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1465.678063] ? lock_downgrade+0x6d0/0x6d0 [ 1465.678954] ? lock_acquire+0x197/0x470 [ 1465.679849] alloc_pages_vma+0xbb/0x410 [ 1465.680713] shmem_alloc_page+0x10f/0x1e0 [ 1465.681606] ? shmem_init_inode+0x20/0x20 [ 1465.682530] ? percpu_counter_add_batch+0x8b/0x140 [ 1465.683597] ? __vm_enough_memory+0x184/0x360 [ 1465.684571] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 1465.685747] ? shmem_unuse_inode+0xf60/0xf60 [ 1465.686909] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1465.688021] shmem_write_begin+0xf7/0x1d0 [ 1465.688922] generic_perform_write+0x20a/0x4f0 [ 1465.689920] ? __mnt_drop_write_file+0x9/0x70 [ 1465.690884] ? page_cache_prev_miss+0x310/0x310 [ 1465.692057] ? evict_inodes+0x470/0x470 [ 1465.692924] ? generic_write_checks+0x2ad/0x390 [ 1465.694151] __generic_file_write_iter+0x39d/0x5d0 [ 1465.695225] generic_file_write_iter+0xdb/0x230 [ 1465.696447] ? iov_iter_init+0x3c/0x130 [ 1465.697320] new_sync_write+0x42c/0x660 [ 1465.698359] ? new_sync_read+0x6f0/0x6f0 [ 1465.699239] ? __x64_sys_pwrite64+0x201/0x260 [ 1465.700436] ? lock_release+0x680/0x680 [ 1465.701297] ? selinux_file_permission+0x92/0x520 [ 1465.702548] ? security_file_permission+0xb1/0xe0 [ 1465.703707] vfs_write+0x7c0/0xb10 [ 1465.704650] __x64_sys_pwrite64+0x201/0x260 [ 1465.705579] ? ksys_pwrite64+0x1b0/0x1b0 [ 1465.706637] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1465.707802] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1465.709162] do_syscall_64+0x33/0x40 [ 1465.709971] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1465.711299] RIP: 0033:0x7f9954f20ab7 [ 1465.712195] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1465.716950] RSP: 002b:00007f99524e2f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1465.718930] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f20ab7 [ 1465.720729] RDX: 0000000000000029 RSI: 00000000200026c0 RDI: 0000000000000004 [ 1465.722617] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1465.724436] R10: 0000000000004200 R11: 0000000000000293 R12: 0000000000000004 [ 1465.726229] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1465.746076] FAULT_INJECTION: forcing a failure. [ 1465.746076] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1465.747594] CPU: 1 PID: 16632 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1465.748385] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1465.749342] Call Trace: [ 1465.749650] dump_stack+0x107/0x167 [ 1465.750078] should_fail.cold+0x5/0xa [ 1465.750518] __alloc_pages_nodemask+0x182/0x600 [ 1465.751058] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1465.751747] ? lock_downgrade+0x6d0/0x6d0 [ 1465.752221] ? lock_acquire+0x197/0x470 [ 1465.752689] alloc_pages_vma+0xbb/0x410 [ 1465.753153] shmem_alloc_page+0x10f/0x1e0 [ 1465.753628] ? shmem_init_inode+0x20/0x20 [ 1465.754122] ? percpu_counter_add_batch+0x8b/0x140 [ 1465.754686] ? __vm_enough_memory+0x184/0x360 [ 1465.755203] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 1465.755832] ? shmem_unuse_inode+0xf60/0xf60 [ 1465.756340] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1465.756927] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1465.757520] shmem_write_begin+0xf7/0x1d0 04:39:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 20) 04:39:46 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x2}) 04:39:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 14) 04:39:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:39:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1465.758266] generic_perform_write+0x20a/0x4f0 [ 1465.758921] ? page_cache_prev_miss+0x310/0x310 [ 1465.759452] ? evict_inodes+0x470/0x470 [ 1465.759915] ? generic_write_checks+0x2ad/0x390 [ 1465.760445] __generic_file_write_iter+0x39d/0x5d0 [ 1465.761006] generic_file_write_iter+0xdb/0x230 [ 1465.761535] ? iov_iter_init+0x3c/0x130 [ 1465.761992] new_sync_write+0x42c/0x660 [ 1465.762450] ? new_sync_read+0x6f0/0x6f0 [ 1465.762915] ? __x64_sys_pwrite64+0x201/0x260 [ 1465.763429] ? lock_release+0x680/0x680 [ 1465.763887] ? selinux_file_permission+0x92/0x520 [ 1465.764442] ? security_file_permission+0xb1/0xe0 [ 1465.764995] vfs_write+0x7c0/0xb10 [ 1465.765407] __x64_sys_pwrite64+0x201/0x260 [ 1465.765896] ? ksys_pwrite64+0x1b0/0x1b0 [ 1465.766365] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1465.766962] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1465.767557] do_syscall_64+0x33/0x40 [ 1465.767990] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1465.768576] RIP: 0033:0x7f40b88edab7 [ 1465.768881] loop4: detected capacity change from 0 to 135266304 [ 1465.769000] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1465.769014] RSP: 002b:00007f40b5eaff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1465.773258] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b88edab7 [ 1465.774069] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000004 [ 1465.774890] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1465.775707] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1465.776517] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 04:39:46 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:39:46 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x3f420f0000000000}) [ 1465.790178] loop3: detected capacity change from 0 to 262144 [ 1465.819287] EXT4-fs error (device loop3): ext4_fill_super:4967: inode #2: comm syz-executor.3: iget: special inode unallocated [ 1465.821113] EXT4-fs (loop3): get root inode failed [ 1465.821955] EXT4-fs (loop3): mount failed 04:39:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:39:46 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:39:46 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x4000000000000000}) 04:39:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 21) 04:39:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:39:46 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:39:46 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 1465.936948] loop7: detected capacity change from 0 to 262144 04:39:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40005, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1465.987593] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1466.061285] FAULT_INJECTION: forcing a failure. [ 1466.061285] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1466.062702] CPU: 1 PID: 16661 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1466.063485] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1466.064463] Call Trace: [ 1466.064778] dump_stack+0x107/0x167 [ 1466.065196] should_fail.cold+0x5/0xa [ 1466.065656] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1466.066273] ? shmem_write_begin+0xf7/0x1d0 [ 1466.066768] ? shmem_write_begin+0x100/0x1d0 [ 1466.067277] generic_perform_write+0x279/0x4f0 [ 1466.067813] ? page_cache_prev_miss+0x310/0x310 [ 1466.068346] ? evict_inodes+0x470/0x470 [ 1466.068814] ? generic_write_checks+0x2ad/0x390 [ 1466.069353] __generic_file_write_iter+0x39d/0x5d0 [ 1466.069934] generic_file_write_iter+0xdb/0x230 [ 1466.070465] ? iov_iter_init+0x3c/0x130 [ 1466.070936] new_sync_write+0x42c/0x660 [ 1466.071393] ? new_sync_read+0x6f0/0x6f0 [ 1466.071880] ? __x64_sys_pwrite64+0x201/0x260 [ 1466.072398] ? lock_release+0x680/0x680 [ 1466.072853] ? selinux_file_permission+0x92/0x520 [ 1466.073425] ? security_file_permission+0xb1/0xe0 [ 1466.073984] vfs_write+0x7c0/0xb10 [ 1466.074398] __x64_sys_pwrite64+0x201/0x260 [ 1466.074903] ? ksys_pwrite64+0x1b0/0x1b0 [ 1466.075370] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1466.075992] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1466.076583] do_syscall_64+0x33/0x40 [ 1466.077012] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1466.077633] RIP: 0033:0x7f9954f20ab7 [ 1466.078057] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1466.080227] RSP: 002b:00007f99524e2f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1466.081096] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f20ab7 [ 1466.081927] RDX: 0000000000000029 RSI: 00000000200026c0 RDI: 0000000000000004 [ 1466.082744] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1466.083572] R10: 0000000000004200 R11: 0000000000000293 R12: 0000000000000004 [ 1466.084454] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1466.132763] loop3: detected capacity change from 0 to 262144 [ 1466.142185] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1466.143806] EXT4-fs (loop3): get root inode failed [ 1466.144384] EXT4-fs (loop3): mount failed 04:40:01 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xd000000000000000}) 04:40:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:40:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 22) 04:40:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 15) 04:40:01 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:40:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:40:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40006, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:40:01 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) [ 1481.357804] FAULT_INJECTION: forcing a failure. [ 1481.357804] name failslab, interval 1, probability 0, space 0, times 0 [ 1481.359490] loop4: detected capacity change from 0 to 135266304 [ 1481.360088] CPU: 1 PID: 16680 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1481.362150] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1481.363834] Call Trace: [ 1481.364372] dump_stack+0x107/0x167 [ 1481.365105] should_fail.cold+0x5/0xa [ 1481.365870] ? getname_flags.part.0+0x50/0x4f0 [ 1481.366796] should_failslab+0x5/0x20 [ 1481.367558] kmem_cache_alloc+0x5b/0x310 [ 1481.368377] ? new_sync_write+0x499/0x660 [ 1481.369215] getname_flags.part.0+0x50/0x4f0 04:40:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x0, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1481.370223] getname+0x8e/0xd0 [ 1481.370899] do_sys_openat2+0xf9/0x4d0 [ 1481.371695] ? build_open_flags+0x6f0/0x6f0 [ 1481.372581] ? rcu_read_lock_any_held+0x75/0xa0 [ 1481.373522] __x64_sys_openat+0x13f/0x1f0 [ 1481.374352] ? __ia32_sys_open+0x1c0/0x1c0 [ 1481.375207] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1481.376268] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1481.377312] do_syscall_64+0x33/0x40 [ 1481.378061] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1481.379084] RIP: 0033:0x7f9954f20a04 [ 1481.379837] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1481.383495] RSP: 002b:00007f99524e2ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1481.385024] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f20a04 [ 1481.386576] RDX: 0000000000000002 RSI: 00007f99524e3000 RDI: 00000000ffffff9c [ 1481.388185] RBP: 00007f99524e3000 R08: 0000000000000000 R09: ffffffffffffffff [ 1481.389604] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1481.391027] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 04:40:01 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xffc99a3b00000000}) [ 1481.418873] FAULT_INJECTION: forcing a failure. [ 1481.418873] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1481.421268] CPU: 1 PID: 16685 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1481.422640] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1481.424292] Call Trace: [ 1481.424820] dump_stack+0x107/0x167 [ 1481.425554] should_fail.cold+0x5/0xa [ 1481.426321] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1481.427378] ? shmem_write_begin+0xf7/0x1d0 [ 1481.428241] ? shmem_write_begin+0x100/0x1d0 [ 1481.429114] generic_perform_write+0x279/0x4f0 [ 1481.430017] ? page_cache_prev_miss+0x310/0x310 04:40:01 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0xffffffff97ee5c27}) [ 1481.431084] ? evict_inodes+0x470/0x470 [ 1481.431958] ? generic_write_checks+0x2ad/0x390 [ 1481.432891] __generic_file_write_iter+0x39d/0x5d0 [ 1481.433877] generic_file_write_iter+0xdb/0x230 [ 1481.434792] ? iov_iter_init+0x3c/0x130 [ 1481.435593] new_sync_write+0x42c/0x660 [ 1481.436393] ? new_sync_read+0x6f0/0x6f0 [ 1481.437187] ? __x64_sys_pwrite64+0x201/0x260 [ 1481.438090] ? lock_release+0x680/0x680 [ 1481.438875] ? selinux_file_permission+0x92/0x520 [ 1481.439836] ? security_file_permission+0xb1/0xe0 [ 1481.440804] vfs_write+0x7c0/0xb10 [ 1481.441522] __x64_sys_pwrite64+0x201/0x260 [ 1481.442369] ? ksys_pwrite64+0x1b0/0x1b0 [ 1481.443170] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1481.444211] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1481.445234] do_syscall_64+0x33/0x40 [ 1481.445964] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1481.446960] RIP: 0033:0x7f40b88edab7 [ 1481.447694] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1481.451326] RSP: 002b:00007f40b5eaff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1481.452823] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b88edab7 [ 1481.454216] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000004 [ 1481.455615] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1481.457029] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 1481.458437] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 04:40:01 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x4000}) 04:40:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x0, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:40:02 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:40:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40007, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1481.594769] loop7: detected capacity change from 0 to 262144 [ 1481.605172] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1481.607311] EXT4-fs (loop7): get root inode failed [ 1481.608127] EXT4-fs (loop7): mount failed 04:40:17 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xf423f}) 04:40:17 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xb}) [ 1496.724004] FAULT_INJECTION: forcing a failure. [ 1496.724004] name failslab, interval 1, probability 0, space 0, times 0 [ 1496.725482] CPU: 0 PID: 16714 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1496.726293] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1496.727244] Call Trace: [ 1496.727561] dump_stack+0x107/0x167 [ 1496.727998] should_fail.cold+0x5/0xa [ 1496.728459] ? create_object.isra.0+0x3a/0xa20 [ 1496.728998] should_failslab+0x5/0x20 [ 1496.729452] kmem_cache_alloc+0x5b/0x310 [ 1496.729933] ? __generic_file_write_iter+0x1a4/0x5d0 [ 1496.730520] create_object.isra.0+0x3a/0xa20 [ 1496.731035] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1496.731637] kmem_cache_alloc+0x159/0x310 [ 1496.732128] ? new_sync_write+0x499/0x660 [ 1496.732618] getname_flags.part.0+0x50/0x4f0 [ 1496.733136] getname+0x8e/0xd0 [ 1496.733513] do_sys_openat2+0xf9/0x4d0 [ 1496.733972] ? build_open_flags+0x6f0/0x6f0 [ 1496.734487] ? rcu_read_lock_any_held+0x75/0xa0 [ 1496.735031] __x64_sys_openat+0x13f/0x1f0 [ 1496.735516] ? __ia32_sys_open+0x1c0/0x1c0 [ 1496.736033] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1496.736669] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1496.737265] do_syscall_64+0x33/0x40 [ 1496.737705] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1496.738296] RIP: 0033:0x7f9954f20a04 [ 1496.738732] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1496.740907] RSP: 002b:00007f99524e2ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1496.741811] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f20a04 [ 1496.742654] RDX: 0000000000000002 RSI: 00007f99524e3000 RDI: 00000000ffffff9c [ 1496.743470] RBP: 00007f99524e3000 R08: 0000000000000000 R09: ffffffffffffffff [ 1496.744321] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1496.745134] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 04:40:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:40:17 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 16) 04:40:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40008, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:40:17 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:40:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x0, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:40:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 23) [ 1496.761102] loop4: detected capacity change from 0 to 135266304 [ 1496.777714] FAULT_INJECTION: forcing a failure. [ 1496.777714] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1496.780570] CPU: 1 PID: 16725 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1496.782136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1496.784014] Call Trace: [ 1496.784614] dump_stack+0x107/0x167 [ 1496.785440] should_fail.cold+0x5/0xa [ 1496.786307] __alloc_pages_nodemask+0x182/0x600 [ 1496.787367] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1496.788729] ? lock_downgrade+0x6d0/0x6d0 [ 1496.789665] ? lock_acquire+0x197/0x470 [ 1496.790592] alloc_pages_vma+0xbb/0x410 [ 1496.791498] shmem_alloc_page+0x10f/0x1e0 [ 1496.792443] ? shmem_init_inode+0x20/0x20 [ 1496.793418] ? percpu_counter_add_batch+0x8b/0x140 [ 1496.794537] ? __vm_enough_memory+0x184/0x360 [ 1496.795558] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 1496.796792] ? shmem_unuse_inode+0xf60/0xf60 [ 1496.797788] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1496.798945] shmem_write_begin+0xf7/0x1d0 [ 1496.799902] generic_perform_write+0x20a/0x4f0 [ 1496.800954] ? __mnt_drop_write_file+0x9/0x70 [ 1496.801965] ? page_cache_prev_miss+0x310/0x310 [ 1496.803017] ? evict_inodes+0x470/0x470 [ 1496.803926] ? generic_write_checks+0x2ad/0x390 [ 1496.804987] __generic_file_write_iter+0x39d/0x5d0 [ 1496.806111] generic_file_write_iter+0xdb/0x230 [ 1496.807157] ? iov_iter_init+0x3c/0x130 [ 1496.808069] new_sync_write+0x42c/0x660 [ 1496.808973] ? new_sync_read+0x6f0/0x6f0 [ 1496.809893] ? __x64_sys_pwrite64+0x201/0x260 [ 1496.810908] ? lock_release+0x680/0x680 [ 1496.811809] ? selinux_file_permission+0x92/0x520 [ 1496.812909] ? security_file_permission+0xb1/0xe0 [ 1496.814014] vfs_write+0x7c0/0xb10 [ 1496.814829] __x64_sys_pwrite64+0x201/0x260 [ 1496.815810] ? ksys_pwrite64+0x1b0/0x1b0 [ 1496.816743] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1496.817934] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1496.819105] do_syscall_64+0x33/0x40 [ 1496.819961] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1496.821112] RIP: 0033:0x7f40b88edab7 [ 1496.821956] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1496.826103] RSP: 002b:00007f40b5eaff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1496.827821] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b88edab7 [ 1496.829432] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1496.831043] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1496.832659] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 1496.834261] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1496.863985] loop3: detected capacity change from 0 to 262144 [ 1496.872867] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1496.875093] EXT4-fs (loop3): get root inode failed [ 1496.875716] EXT4-fs (loop3): mount failed 04:40:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x0) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:40:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 24) [ 1496.916292] FAULT_INJECTION: forcing a failure. [ 1496.916292] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1496.917718] CPU: 0 PID: 16733 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1496.918503] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1496.919453] Call Trace: [ 1496.919764] dump_stack+0x107/0x167 [ 1496.920191] should_fail.cold+0x5/0xa [ 1496.920636] strncpy_from_user+0x34/0x470 [ 1496.921117] getname_flags.part.0+0x95/0x4f0 [ 1496.921624] getname+0x8e/0xd0 [ 1496.921997] do_sys_openat2+0xf9/0x4d0 [ 1496.922448] ? build_open_flags+0x6f0/0x6f0 [ 1496.922961] ? rcu_read_lock_any_held+0x75/0xa0 [ 1496.923493] __x64_sys_openat+0x13f/0x1f0 [ 1496.923977] ? __ia32_sys_open+0x1c0/0x1c0 [ 1496.924476] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1496.925079] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1496.925670] do_syscall_64+0x33/0x40 [ 1496.926100] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1496.926688] RIP: 0033:0x7f9954f20a04 [ 1496.927113] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1496.929217] RSP: 002b:00007f99524e2ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1496.930092] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f20a04 [ 1496.930908] RDX: 0000000000000002 RSI: 00007f99524e3000 RDI: 00000000ffffff9c [ 1496.931726] RBP: 00007f99524e3000 R08: 0000000000000000 R09: ffffffffffffffff [ 1496.932545] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1496.933359] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 04:40:17 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:40:17 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xd0}) 04:40:17 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:40:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40018, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1496.983165] loop7: detected capacity change from 0 to 262144 04:40:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 25) 04:40:17 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) [ 1497.023430] FAULT_INJECTION: forcing a failure. [ 1497.023430] name failslab, interval 1, probability 0, space 0, times 0 [ 1497.026399] CPU: 1 PID: 16742 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1497.027978] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1497.029837] Call Trace: [ 1497.030437] dump_stack+0x107/0x167 [ 1497.031263] should_fail.cold+0x5/0xa [ 1497.032131] ? __alloc_file+0x21/0x320 [ 1497.033018] should_failslab+0x5/0x20 [ 1497.033876] kmem_cache_alloc+0x5b/0x310 [ 1497.034796] __alloc_file+0x21/0x320 [ 1497.035635] alloc_empty_file+0x6d/0x170 [ 1497.036560] path_openat+0xe6/0x2770 [ 1497.037404] ? __lock_acquire+0x1657/0x5b00 [ 1497.038389] ? path_lookupat+0x860/0x860 [ 1497.039306] ? asm_sysvec_call_function_single+0x12/0x20 [ 1497.040535] ? perf_trace_lock+0xac/0x490 [ 1497.041469] ? asm_sysvec_call_function_single+0x12/0x20 [ 1497.042698] ? __lockdep_reset_lock+0x180/0x180 [ 1497.043753] do_filp_open+0x190/0x3e0 [ 1497.044619] ? may_open_dev+0xf0/0xf0 [ 1497.045482] ? alloc_fd+0x2e7/0x670 [ 1497.046309] ? lock_downgrade+0x6d0/0x6d0 [ 1497.047246] ? do_raw_spin_lock+0x121/0x260 [ 1497.048227] ? rwlock_bug.part.0+0x90/0x90 [ 1497.049200] ? _raw_spin_unlock+0x1a/0x30 [ 1497.050139] ? alloc_fd+0x2e7/0x670 [ 1497.050975] do_sys_openat2+0x171/0x4d0 [ 1497.051885] ? build_open_flags+0x6f0/0x6f0 [ 1497.052867] ? rcu_read_lock_any_held+0x75/0xa0 [ 1497.053931] __x64_sys_openat+0x13f/0x1f0 [ 1497.054874] ? __ia32_sys_open+0x1c0/0x1c0 [ 1497.055837] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1497.057030] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1497.058202] do_syscall_64+0x33/0x40 [ 1497.059047] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1497.060219] RIP: 0033:0x7f9954f20a04 [ 1497.061062] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1497.065246] RSP: 002b:00007f99524e2ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1497.066971] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f20a04 [ 1497.068586] RDX: 0000000000000002 RSI: 00007f99524e3000 RDI: 00000000ffffff9c [ 1497.070194] RBP: 00007f99524e3000 R08: 0000000000000000 R09: ffffffffffffffff [ 1497.071805] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1497.073419] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1497.102705] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1497.103894] EXT4-fs (loop7): group descriptors corrupted! 04:40:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 26) 04:40:31 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:40:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4001c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1511.006746] FAULT_INJECTION: forcing a failure. [ 1511.006746] name failslab, interval 1, probability 0, space 0, times 0 [ 1511.008606] CPU: 0 PID: 16760 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1511.009815] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1511.011264] Call Trace: [ 1511.011736] dump_stack+0x107/0x167 [ 1511.012384] should_fail.cold+0x5/0xa [ 1511.013061] ? create_object.isra.0+0x3a/0xa20 [ 1511.013860] should_failslab+0x5/0x20 [ 1511.014520] kmem_cache_alloc+0x5b/0x310 [ 1511.015248] create_object.isra.0+0x3a/0xa20 [ 1511.016023] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1511.016922] kmem_cache_alloc+0x159/0x310 [ 1511.017654] __alloc_file+0x21/0x320 [ 1511.018313] alloc_empty_file+0x6d/0x170 [ 1511.018918] path_openat+0xe6/0x2770 [ 1511.019570] ? __lock_acquire+0x1657/0x5b00 [ 1511.020237] ? path_lookupat+0x860/0x860 [ 1511.021067] ? perf_trace_lock+0xac/0x490 [ 1511.021685] ? SOFTIRQ_verbose+0x10/0x10 [ 1511.022283] ? find_held_lock+0x2c/0x110 [ 1511.022896] ? __lockdep_reset_lock+0x180/0x180 [ 1511.023594] do_filp_open+0x190/0x3e0 [ 1511.024165] ? may_open_dev+0xf0/0xf0 [ 1511.024736] ? alloc_fd+0x2e7/0x670 [ 1511.025277] ? lock_downgrade+0x6d0/0x6d0 [ 1511.025890] ? do_raw_spin_lock+0x121/0x260 [ 1511.026524] ? rwlock_bug.part.0+0x90/0x90 [ 1511.027163] ? _raw_spin_unlock+0x1a/0x30 [ 1511.027776] ? alloc_fd+0x2e7/0x670 [ 1511.028330] do_sys_openat2+0x171/0x4d0 [ 1511.028921] ? build_open_flags+0x6f0/0x6f0 [ 1511.029570] ? rcu_read_lock_any_held+0x75/0xa0 [ 1511.030262] __x64_sys_openat+0x13f/0x1f0 [ 1511.030876] ? __ia32_sys_open+0x1c0/0x1c0 [ 1511.031506] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1511.032288] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1511.033057] do_syscall_64+0x33/0x40 [ 1511.033610] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1511.034361] RIP: 0033:0x7f9954f20a04 [ 1511.034915] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1511.037641] RSP: 002b:00007f99524e2ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1511.038766] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f20a04 [ 1511.039822] RDX: 0000000000000002 RSI: 00007f99524e3000 RDI: 00000000ffffff9c [ 1511.040885] RBP: 00007f99524e3000 R08: 0000000000000000 R09: ffffffffffffffff [ 1511.041933] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1511.042992] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 04:40:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 17) 04:40:31 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:40:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x0) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:40:31 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x2000000}) 04:40:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:40:31 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x4000}) [ 1511.060558] loop3: detected capacity change from 0 to 262144 [ 1511.105278] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1511.107286] EXT4-fs (loop3): get root inode failed [ 1511.108156] EXT4-fs (loop3): mount failed [ 1511.112217] FAULT_INJECTION: forcing a failure. [ 1511.112217] name failslab, interval 1, probability 0, space 0, times 0 [ 1511.114815] CPU: 1 PID: 16774 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1511.116418] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1511.118337] Call Trace: [ 1511.118951] dump_stack+0x107/0x167 [ 1511.119798] should_fail.cold+0x5/0xa [ 1511.120688] ? xas_alloc+0x336/0x440 [ 1511.121555] should_failslab+0x5/0x20 [ 1511.122439] kmem_cache_alloc+0x5b/0x310 [ 1511.123379] ? __lockdep_reset_lock+0x180/0x180 [ 1511.124474] xas_alloc+0x336/0x440 [ 1511.125303] xas_create+0x60f/0x10d0 [ 1511.126190] xas_create_range+0x189/0x620 [ 1511.127171] shmem_add_to_page_cache+0x760/0x1130 [ 1511.128312] ? shmem_getattr+0x180/0x180 [ 1511.129285] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 1511.130544] ? shmem_unuse_inode+0xf60/0xf60 [ 1511.131566] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1511.132766] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1511.133959] shmem_write_begin+0xf7/0x1d0 [ 1511.134937] generic_perform_write+0x20a/0x4f0 [ 1511.136020] ? page_cache_prev_miss+0x310/0x310 [ 1511.137098] ? evict_inodes+0x470/0x470 [ 1511.138021] ? generic_write_checks+0x2ad/0x390 [ 1511.139108] __generic_file_write_iter+0x39d/0x5d0 [ 1511.140259] generic_file_write_iter+0xdb/0x230 [ 1511.141332] ? iov_iter_init+0x3c/0x130 [ 1511.142257] new_sync_write+0x42c/0x660 [ 1511.143182] ? new_sync_read+0x6f0/0x6f0 [ 1511.144131] ? __x64_sys_pwrite64+0x201/0x260 [ 1511.145182] ? lock_release+0x680/0x680 [ 1511.146103] ? selinux_file_permission+0x92/0x520 [ 1511.147224] ? security_file_permission+0xb1/0xe0 [ 1511.148360] vfs_write+0x7c0/0xb10 [ 1511.149196] __x64_sys_pwrite64+0x201/0x260 [ 1511.150197] ? ksys_pwrite64+0x1b0/0x1b0 [ 1511.151142] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1511.152364] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1511.153561] do_syscall_64+0x33/0x40 [ 1511.154424] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1511.155609] RIP: 0033:0x7f40b88edab7 [ 1511.156477] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1511.160741] RSP: 002b:00007f40b5eaff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1511.162504] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b88edab7 [ 1511.164163] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1511.165809] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1511.167458] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 1511.169117] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1511.175759] loop4: detected capacity change from 0 to 135266304 04:40:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x0) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:40:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40066, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:40:31 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:40:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 27) 04:40:31 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xb000000}) [ 1511.325000] FAULT_INJECTION: forcing a failure. [ 1511.325000] name failslab, interval 1, probability 0, space 0, times 0 [ 1511.327656] CPU: 1 PID: 16788 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1511.329262] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1511.331170] Call Trace: [ 1511.331781] dump_stack+0x107/0x167 [ 1511.332634] should_fail.cold+0x5/0xa [ 1511.333515] ? security_file_alloc+0x34/0x170 [ 1511.334553] should_failslab+0x5/0x20 [ 1511.335432] kmem_cache_alloc+0x5b/0x310 [ 1511.336395] security_file_alloc+0x34/0x170 [ 1511.337390] __alloc_file+0xb7/0x320 [ 1511.338246] alloc_empty_file+0x6d/0x170 [ 1511.339183] path_openat+0xe6/0x2770 [ 1511.340049] ? __lock_acquire+0x1657/0x5b00 [ 1511.341057] ? path_lookupat+0x860/0x860 [ 1511.341994] ? perf_trace_lock+0xac/0x490 [ 1511.342947] ? SOFTIRQ_verbose+0x10/0x10 [ 1511.343882] ? find_held_lock+0x2c/0x110 [ 1511.344831] ? __lockdep_reset_lock+0x180/0x180 [ 1511.345913] do_filp_open+0x190/0x3e0 [ 1511.346790] ? may_open_dev+0xf0/0xf0 [ 1511.347675] ? alloc_fd+0x2e7/0x670 [ 1511.348521] ? lock_downgrade+0x6d0/0x6d0 [ 1511.349473] ? do_raw_spin_lock+0x121/0x260 [ 1511.350467] ? rwlock_bug.part.0+0x90/0x90 [ 1511.351452] ? _raw_spin_unlock+0x1a/0x30 [ 1511.352415] ? alloc_fd+0x2e7/0x670 [ 1511.353271] do_sys_openat2+0x171/0x4d0 [ 1511.354195] ? build_open_flags+0x6f0/0x6f0 [ 1511.355203] ? rcu_read_lock_any_held+0x75/0xa0 [ 1511.356291] __x64_sys_openat+0x13f/0x1f0 [ 1511.357249] ? __ia32_sys_open+0x1c0/0x1c0 [ 1511.358238] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1511.359452] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1511.360656] do_syscall_64+0x33/0x40 [ 1511.361517] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1511.362704] RIP: 0033:0x7f9954f20a04 [ 1511.363559] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1511.367813] RSP: 002b:00007f99524e2ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1511.369589] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f20a04 [ 1511.371239] RDX: 0000000000000002 RSI: 00007f99524e3000 RDI: 00000000ffffff9c [ 1511.372899] RBP: 00007f99524e3000 R08: 0000000000000000 R09: ffffffffffffffff [ 1511.374550] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1511.376208] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 04:40:31 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xd000}) 04:40:31 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xf423f}) 04:40:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400f0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1511.385860] loop7: detected capacity change from 0 to 262144 [ 1511.423914] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1511.426130] EXT4-fs (loop7): get root inode failed [ 1511.427019] EXT4-fs (loop7): mount failed [ 1526.283045] FAULT_INJECTION: forcing a failure. [ 1526.283045] name failslab, interval 1, probability 0, space 0, times 0 [ 1526.284706] CPU: 1 PID: 16815 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1526.285654] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1526.286785] Call Trace: [ 1526.287150] dump_stack+0x107/0x167 [ 1526.287648] should_fail.cold+0x5/0xa [ 1526.288184] ? create_object.isra.0+0x3a/0xa20 [ 1526.288810] should_failslab+0x5/0x20 [ 1526.289331] kmem_cache_alloc+0x5b/0x310 [ 1526.289887] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1526.290640] create_object.isra.0+0x3a/0xa20 [ 1526.291239] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1526.292058] kmem_cache_alloc+0x159/0x310 [ 1526.292651] security_file_alloc+0x34/0x170 [ 1526.293253] __alloc_file+0xb7/0x320 [ 1526.293773] alloc_empty_file+0x6d/0x170 [ 1526.294347] path_openat+0xe6/0x2770 [ 1526.294868] ? __lock_acquire+0x1657/0x5b00 [ 1526.295477] ? path_lookupat+0x860/0x860 [ 1526.296054] ? perf_trace_lock+0xac/0x490 [ 1526.296656] ? SOFTIRQ_verbose+0x10/0x10 [ 1526.297220] ? find_held_lock+0x2c/0x110 [ 1526.297792] ? __lockdep_reset_lock+0x180/0x180 [ 1526.298445] do_filp_open+0x190/0x3e0 [ 1526.298975] ? may_open_dev+0xf0/0xf0 [ 1526.299513] ? alloc_fd+0x2e7/0x670 [ 1526.300035] ? lock_downgrade+0x6d0/0x6d0 [ 1526.300628] ? do_raw_spin_lock+0x121/0x260 [ 1526.301227] ? rwlock_bug.part.0+0x90/0x90 [ 1526.301828] ? _raw_spin_unlock+0x1a/0x30 [ 1526.302403] ? alloc_fd+0x2e7/0x670 [ 1526.302920] do_sys_openat2+0x171/0x4d0 [ 1526.303480] ? build_open_flags+0x6f0/0x6f0 [ 1526.304092] ? rcu_read_lock_any_held+0x75/0xa0 [ 1526.304756] __x64_sys_openat+0x13f/0x1f0 [ 1526.305344] ? __ia32_sys_open+0x1c0/0x1c0 [ 1526.305959] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1526.306691] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1526.307418] do_syscall_64+0x33/0x40 [ 1526.307946] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1526.308675] RIP: 0033:0x7f9954f20a04 [ 1526.309200] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1526.311790] RSP: 002b:00007f99524e2ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1526.312860] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f20a04 [ 1526.313854] RDX: 0000000000000002 RSI: 00007f99524e3000 RDI: 00000000ffffff9c [ 1526.314850] RBP: 00007f99524e3000 R08: 0000000000000000 R09: ffffffffffffffff [ 1526.315844] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1526.316846] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 04:40:46 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:40:46 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x275cee97}) 04:40:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:40:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 18) 04:40:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:40:46 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:40:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 28) 04:40:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1526.323070] loop4: detected capacity change from 0 to 135266304 [ 1526.351157] loop3: detected capacity change from 0 to 262144 [ 1526.361200] FAULT_INJECTION: forcing a failure. [ 1526.361200] name failslab, interval 1, probability 0, space 0, times 0 [ 1526.363731] CPU: 0 PID: 16822 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1526.365305] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1526.367198] Call Trace: [ 1526.367802] dump_stack+0x107/0x167 [ 1526.368637] should_fail.cold+0x5/0xa [ 1526.369505] ? create_object.isra.0+0x3a/0xa20 [ 1526.370538] should_failslab+0x5/0x20 [ 1526.371401] kmem_cache_alloc+0x5b/0x310 [ 1526.372341] create_object.isra.0+0x3a/0xa20 [ 1526.373333] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1526.374488] kmem_cache_alloc+0x159/0x310 [ 1526.375428] ? __lockdep_reset_lock+0x180/0x180 [ 1526.376498] xas_alloc+0x336/0x440 [ 1526.377307] xas_create+0x60f/0x10d0 [ 1526.378173] xas_create_range+0x189/0x620 [ 1526.379139] shmem_add_to_page_cache+0x760/0x1130 [ 1526.380256] ? shmem_getattr+0x180/0x180 [ 1526.381209] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 1526.382444] ? shmem_unuse_inode+0xf60/0xf60 [ 1526.383443] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1526.384618] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1526.385778] shmem_write_begin+0xf7/0x1d0 [ 1526.386728] generic_perform_write+0x20a/0x4f0 [ 1526.387785] ? page_cache_prev_miss+0x310/0x310 [ 1526.388854] ? evict_inodes+0x470/0x470 [ 1526.389758] ? generic_write_checks+0x2ad/0x390 [ 1526.390826] __generic_file_write_iter+0x39d/0x5d0 [ 1526.391948] generic_file_write_iter+0xdb/0x230 [ 1526.393003] ? iov_iter_init+0x3c/0x130 [ 1526.393907] new_sync_write+0x42c/0x660 [ 1526.394812] ? new_sync_read+0x6f0/0x6f0 [ 1526.395761] ? __x64_sys_pwrite64+0x201/0x260 [ 1526.396817] ? lock_release+0x680/0x680 [ 1526.397747] ? selinux_file_permission+0x92/0x520 [ 1526.398875] ? security_file_permission+0xb1/0xe0 [ 1526.400009] vfs_write+0x7c0/0xb10 [ 1526.400855] __x64_sys_pwrite64+0x201/0x260 [ 1526.401863] ? ksys_pwrite64+0x1b0/0x1b0 [ 1526.402815] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1526.404035] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1526.405248] do_syscall_64+0x33/0x40 [ 1526.406120] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1526.407313] RIP: 0033:0x7f40b88edab7 [ 1526.408184] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1526.412476] RSP: 002b:00007f40b5eaff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1526.414246] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b88edab7 [ 1526.415903] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1526.417573] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1526.419230] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 1526.420894] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 04:40:46 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:40:46 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xb000000}) [ 1526.448670] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1526.462888] EXT4-fs (loop3): get root inode failed [ 1526.464191] EXT4-fs (loop3): mount failed 04:40:46 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}) [ 1526.482349] loop7: detected capacity change from 0 to 262144 04:40:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40480, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:40:47 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x275cee97}) 04:40:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:40:47 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:40:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40500, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1526.626899] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1526.630905] EXT4-fs (loop7): get root inode failed [ 1526.632258] EXT4-fs (loop7): mount failed 04:40:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 29) 04:40:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 19) [ 1526.769642] FAULT_INJECTION: forcing a failure. [ 1526.769642] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1526.771237] CPU: 1 PID: 16853 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1526.772031] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1526.772988] Call Trace: [ 1526.773296] dump_stack+0x107/0x167 [ 1526.773717] should_fail.cold+0x5/0xa [ 1526.774159] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1526.774390] FAULT_INJECTION: forcing a failure. [ 1526.774390] name failslab, interval 1, probability 0, space 0, times 0 [ 1526.774775] ? shmem_write_begin+0xf7/0x1d0 [ 1526.774786] ? shmem_write_begin+0x100/0x1d0 [ 1526.774801] generic_perform_write+0x279/0x4f0 [ 1526.774819] ? page_cache_prev_miss+0x310/0x310 [ 1526.774831] ? evict_inodes+0x470/0x470 [ 1526.774852] ? generic_write_checks+0x2ad/0x390 [ 1526.774868] __generic_file_write_iter+0x39d/0x5d0 [ 1526.781163] generic_file_write_iter+0xdb/0x230 [ 1526.781694] ? iov_iter_init+0x3c/0x130 [ 1526.782156] new_sync_write+0x42c/0x660 [ 1526.782611] ? new_sync_read+0x6f0/0x6f0 [ 1526.783084] ? __x64_sys_pwrite64+0x201/0x260 [ 1526.783603] ? lock_release+0x680/0x680 [ 1526.784063] ? selinux_file_permission+0x92/0x520 [ 1526.784629] ? security_file_permission+0xb1/0xe0 [ 1526.785196] vfs_write+0x7c0/0xb10 [ 1526.785610] __x64_sys_pwrite64+0x201/0x260 [ 1526.786107] ? ksys_pwrite64+0x1b0/0x1b0 [ 1526.786577] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1526.787178] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1526.787773] do_syscall_64+0x33/0x40 [ 1526.788207] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1526.788797] RIP: 0033:0x7f40b88edab7 [ 1526.789224] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1526.791334] RSP: 002b:00007f40b5eaff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1526.792214] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b88edab7 [ 1526.793026] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 1526.793847] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1526.794660] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 1526.795481] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1526.796333] CPU: 0 PID: 16854 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1526.797937] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1526.799832] Call Trace: [ 1526.800451] dump_stack+0x107/0x167 [ 1526.801283] should_fail.cold+0x5/0xa [ 1526.802159] ? __kthread_create_on_node+0xd1/0x400 [ 1526.803282] should_failslab+0x5/0x20 [ 1526.804154] kmem_cache_alloc_trace+0x55/0x320 [ 1526.805220] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1526.806300] __kthread_create_on_node+0xd1/0x400 [ 1526.807386] ? __kthread_parkme+0x1d0/0x1d0 [ 1526.808406] ? __mutex_lock+0x4fe/0x10b0 [ 1526.809335] ? loop_configure+0xc8a/0x1410 [ 1526.810297] ? do_raw_spin_unlock+0x4f/0x220 [ 1526.811303] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1526.812391] kthread_create_on_node+0xbb/0x100 [ 1526.813476] ? __kthread_create_on_node+0x400/0x400 [ 1526.814734] ? lockdep_init_map_type+0x2c7/0x780 [ 1526.815817] ? lockdep_init_map_type+0x2c7/0x780 [ 1526.816928] loop_configure+0x3e7/0x1410 [ 1526.817869] lo_ioctl+0xa57/0x16b0 [ 1526.818689] ? avc_has_extended_perms+0x7f1/0xf40 [ 1526.819786] ? loop_set_status_old+0x250/0x250 [ 1526.820837] ? avc_ss_reset+0x180/0x180 [ 1526.821743] ? find_held_lock+0x2c/0x110 [ 1526.822685] ? __lock_acquire+0xbb1/0x5b00 [ 1526.823729] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1526.824936] ? generic_block_fiemap+0x60/0x60 [ 1526.825964] ? lock_downgrade+0x6d0/0x6d0 [ 1526.826911] ? build_open_flags+0x6f0/0x6f0 [ 1526.827902] ? loop_set_status_old+0x250/0x250 [ 1526.828958] blkdev_ioctl+0x291/0x710 [ 1526.829826] ? blkdev_common_ioctl+0x1930/0x1930 [ 1526.830916] ? selinux_file_ioctl+0xb6/0x270 [ 1526.831927] block_ioctl+0xf9/0x140 [ 1526.832766] ? blkdev_read_iter+0x1c0/0x1c0 [ 1526.833754] __x64_sys_ioctl+0x19a/0x210 [ 1526.834684] do_syscall_64+0x33/0x40 [ 1526.835534] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1526.836705] RIP: 0033:0x7f9954f6d8d7 [ 1526.837552] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1526.841737] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1526.843465] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f6d8d7 [ 1526.845078] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1526.846686] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1526.848296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1526.849908] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1526.861191] loop7: detected capacity change from 0 to 262144 [ 1526.887285] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1526.892988] EXT4-fs (loop7): get root inode failed [ 1526.893758] EXT4-fs (loop7): mount failed 04:41:01 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x3f420f00}) 04:41:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:41:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 20) 04:41:01 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:41:01 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}) 04:41:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:41:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40600, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:41:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 30) [ 1540.716234] FAULT_INJECTION: forcing a failure. [ 1540.716234] name failslab, interval 1, probability 0, space 0, times 0 [ 1540.719264] CPU: 0 PID: 16862 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1540.721114] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1540.723290] Call Trace: [ 1540.723990] dump_stack+0x107/0x167 [ 1540.724977] should_fail.cold+0x5/0xa [ 1540.725977] ? create_object.isra.0+0x3a/0xa20 [ 1540.727193] should_failslab+0x5/0x20 [ 1540.728191] kmem_cache_alloc+0x5b/0x310 [ 1540.729282] create_object.isra.0+0x3a/0xa20 [ 1540.730433] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1540.731794] kmem_cache_alloc_trace+0x151/0x320 [ 1540.733042] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1540.734293] __kthread_create_on_node+0xd1/0x400 [ 1540.735539] ? __kthread_parkme+0x1d0/0x1d0 [ 1540.736704] ? __mutex_lock+0x4fe/0x10b0 [ 1540.737785] ? loop_configure+0xc8a/0x1410 [ 1540.738897] ? do_raw_spin_unlock+0x4f/0x220 [ 1540.740049] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1540.741312] kthread_create_on_node+0xbb/0x100 [ 1540.742504] ? __kthread_create_on_node+0x400/0x400 [ 1540.743845] ? lockdep_init_map_type+0x2c7/0x780 [ 1540.745100] ? lockdep_init_map_type+0x2c7/0x780 [ 1540.746346] loop_configure+0x3e7/0x1410 [ 1540.747452] lo_ioctl+0xa57/0x16b0 [ 1540.748414] ? avc_has_extended_perms+0x7f1/0xf40 [ 1540.749686] ? loop_set_status_old+0x250/0x250 [ 1540.750913] ? avc_ss_reset+0x180/0x180 [ 1540.751958] ? find_held_lock+0x2c/0x110 [ 1540.753074] ? __lock_acquire+0xbb1/0x5b00 [ 1540.754252] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1540.755642] ? generic_block_fiemap+0x60/0x60 [ 1540.756852] ? lock_downgrade+0x6d0/0x6d0 [ 1540.757946] ? build_open_flags+0x6f0/0x6f0 [ 1540.759100] ? loop_set_status_old+0x250/0x250 [ 1540.760291] blkdev_ioctl+0x291/0x710 [ 1540.761313] ? blkdev_common_ioctl+0x1930/0x1930 [ 1540.762561] ? selinux_file_ioctl+0xb6/0x270 [ 1540.763754] block_ioctl+0xf9/0x140 [ 1540.764722] ? blkdev_read_iter+0x1c0/0x1c0 [ 1540.765861] __x64_sys_ioctl+0x19a/0x210 [ 1540.766945] do_syscall_64+0x33/0x40 [ 1540.767927] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1540.769252] RIP: 0033:0x7f9954f6d8d7 [ 1540.770279] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1540.775219] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1540.777008] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f6d8d7 [ 1540.778635] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1540.780291] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1540.781941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1540.783571] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 04:41:01 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 1540.817934] FAULT_INJECTION: forcing a failure. [ 1540.817934] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1540.820844] CPU: 0 PID: 16874 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1540.822427] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1540.824350] Call Trace: [ 1540.824972] dump_stack+0x107/0x167 [ 1540.825818] should_fail.cold+0x5/0xa [ 1540.826694] __alloc_pages_nodemask+0x182/0x600 [ 1540.827797] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1540.829180] ? lock_downgrade+0x6d0/0x6d0 [ 1540.830139] ? lock_acquire+0x197/0x470 [ 1540.831093] alloc_pages_vma+0xbb/0x410 [ 1540.831865] loop3: detected capacity change from 0 to 262144 [ 1540.832022] shmem_alloc_page+0x10f/0x1e0 [ 1540.833802] ? shmem_init_inode+0x20/0x20 [ 1540.834812] ? percpu_counter_add_batch+0x8b/0x140 [ 1540.835961] ? __vm_enough_memory+0x184/0x360 [ 1540.837030] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 1540.838280] ? shmem_unuse_inode+0xf60/0xf60 [ 1540.839318] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1540.840518] ? iov_iter_fault_in_readable+0x9a/0x410 [ 1540.841714] shmem_write_begin+0xf7/0x1d0 [ 1540.842675] generic_perform_write+0x20a/0x4f0 [ 1540.843769] ? page_cache_prev_miss+0x310/0x310 [ 1540.844860] ? evict_inodes+0x470/0x470 [ 1540.845782] ? generic_write_checks+0x2ad/0x390 [ 1540.846878] __generic_file_write_iter+0x39d/0x5d0 [ 1540.848023] generic_file_write_iter+0xdb/0x230 [ 1540.849102] ? iov_iter_init+0x3c/0x130 [ 1540.850027] new_sync_write+0x42c/0x660 [ 1540.850962] ? new_sync_read+0x6f0/0x6f0 [ 1540.851906] ? __x64_sys_pwrite64+0x201/0x260 [ 1540.853005] ? lock_release+0x680/0x680 [ 1540.853923] ? selinux_file_permission+0x92/0x520 [ 1540.855049] ? security_file_permission+0xb1/0xe0 [ 1540.856170] vfs_write+0x7c0/0xb10 [ 1540.857020] __x64_sys_pwrite64+0x201/0x260 [ 1540.858023] ? ksys_pwrite64+0x1b0/0x1b0 [ 1540.858981] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1540.860181] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1540.861383] do_syscall_64+0x33/0x40 [ 1540.862253] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1540.863441] RIP: 0033:0x7f40b88edab7 [ 1540.864317] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1540.868542] RSP: 002b:00007f40b5eaff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1540.870302] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b88edab7 [ 1540.871986] RDX: 0000000000000069 RSI: 00000000200026c0 RDI: 0000000000000004 [ 1540.874055] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1540.876099] R10: 0000000000004200 R11: 0000000000000293 R12: 0000000000000004 [ 1540.877794] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 04:41:01 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x3f420f00}) 04:41:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40700, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1540.903932] loop4: detected capacity change from 0 to 135266304 04:41:01 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x40000000}) [ 1540.976703] loop7: detected capacity change from 0 to 262144 [ 1541.032165] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1541.033837] EXT4-fs (loop3): get root inode failed [ 1541.034453] EXT4-fs (loop3): mount failed [ 1541.049793] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 1541.063268] EXT4-fs (loop7): get root inode failed [ 1541.064708] EXT4-fs (loop7): mount failed 04:41:15 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:41:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, 0x0, &(0x7f00000009c0)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:41:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:41:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 31) 04:41:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41800, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:41:15 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x97ee5c27}) 04:41:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 21) 04:41:15 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x40000000}) [ 1555.035590] FAULT_INJECTION: forcing a failure. [ 1555.035590] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1555.037283] CPU: 1 PID: 16911 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1555.038292] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1555.039498] Call Trace: [ 1555.039887] dump_stack+0x107/0x167 [ 1555.040418] should_fail.cold+0x5/0xa [ 1555.040986] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 1555.041768] ? shmem_write_begin+0xf7/0x1d0 [ 1555.042394] ? shmem_write_begin+0x100/0x1d0 [ 1555.043044] generic_perform_write+0x279/0x4f0 [ 1555.043720] ? __mnt_drop_write_file+0x9/0x70 [ 1555.044370] ? page_cache_prev_miss+0x310/0x310 [ 1555.045055] ? evict_inodes+0x470/0x470 [ 1555.045635] ? generic_write_checks+0x2ad/0x390 [ 1555.046321] __generic_file_write_iter+0x39d/0x5d0 [ 1555.047038] generic_file_write_iter+0xdb/0x230 [ 1555.047712] ? iov_iter_init+0x3c/0x130 [ 1555.048292] new_sync_write+0x42c/0x660 [ 1555.048879] ? new_sync_read+0x6f0/0x6f0 [ 1555.049470] ? __x64_sys_pwrite64+0x201/0x260 [ 1555.050133] ? lock_release+0x680/0x680 [ 1555.050712] ? selinux_file_permission+0x92/0x520 [ 1555.051414] ? security_file_permission+0xb1/0xe0 [ 1555.052126] vfs_write+0x7c0/0xb10 [ 1555.052659] __x64_sys_pwrite64+0x201/0x260 [ 1555.053289] ? ksys_pwrite64+0x1b0/0x1b0 [ 1555.053884] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1555.054648] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1555.055401] do_syscall_64+0x33/0x40 [ 1555.055944] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1555.056697] RIP: 0033:0x7f40b88edab7 [ 1555.057242] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1555.059916] RSP: 002b:00007f40b5eaff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1555.061028] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b88edab7 [ 1555.062068] RDX: 0000000000000069 RSI: 00000000200026c0 RDI: 0000000000000004 [ 1555.063104] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 1555.064140] R10: 0000000000004200 R11: 0000000000000293 R12: 0000000000000004 [ 1555.065195] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1555.072763] FAULT_INJECTION: forcing a failure. [ 1555.072763] name failslab, interval 1, probability 0, space 0, times 0 [ 1555.075453] CPU: 0 PID: 16904 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1555.077077] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1555.079002] Call Trace: [ 1555.079619] dump_stack+0x107/0x167 [ 1555.080481] should_fail.cold+0x5/0xa [ 1555.081372] ? __kernfs_new_node+0xd4/0x860 [ 1555.082377] should_failslab+0x5/0x20 [ 1555.083262] kmem_cache_alloc+0x5b/0x310 [ 1555.084214] __kernfs_new_node+0xd4/0x860 [ 1555.085190] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1555.086291] ? perf_trace_lock+0xac/0x490 [ 1555.087251] ? perf_trace_lock+0xac/0x490 [ 1555.088223] ? lock_chain_count+0x20/0x20 [ 1555.089198] ? __lockdep_reset_lock+0x180/0x180 [ 1555.090278] ? __lockdep_reset_lock+0x180/0x180 [ 1555.091355] ? task_rq_lock+0xab/0x270 [ 1555.092265] ? lock_release+0x680/0x680 [ 1555.093196] ? find_held_lock+0x2c/0x110 [ 1555.094145] kernfs_new_node+0x18d/0x250 [ 1555.095095] kernfs_create_dir_ns+0x49/0x160 [ 1555.096123] internal_create_group+0x793/0xb30 [ 1555.097200] ? set_user_nice.part.0+0x2fd/0x760 [ 1555.098280] ? sysfs_remove_group+0x170/0x170 [ 1555.099325] ? lockdep_init_map_type+0x2c7/0x780 [ 1555.100433] ? blk_queue_flag_set+0x22/0x30 [ 1555.101439] ? __loop_update_dio+0x2d2/0x690 [ 1555.102465] loop_configure+0x953/0x1410 [ 1555.103426] lo_ioctl+0xa57/0x16b0 [ 1555.104257] ? avc_has_extended_perms+0x7f1/0xf40 [ 1555.105392] ? loop_set_status_old+0x250/0x250 [ 1555.106459] ? avc_ss_reset+0x180/0x180 [ 1555.107386] ? find_held_lock+0x2c/0x110 [ 1555.108346] ? __lock_acquire+0xbb1/0x5b00 [ 1555.109396] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1555.110617] ? generic_block_fiemap+0x60/0x60 [ 1555.111657] ? lock_downgrade+0x6d0/0x6d0 [ 1555.112633] ? build_open_flags+0x6f0/0x6f0 [ 1555.113643] ? loop_set_status_old+0x250/0x250 [ 1555.114700] blkdev_ioctl+0x291/0x710 [ 1555.115586] ? blkdev_common_ioctl+0x1930/0x1930 [ 1555.116701] ? selinux_file_ioctl+0xb6/0x270 [ 1555.117731] block_ioctl+0xf9/0x140 [ 1555.118575] ? blkdev_read_iter+0x1c0/0x1c0 [ 1555.119581] __x64_sys_ioctl+0x19a/0x210 [ 1555.120537] do_syscall_64+0x33/0x40 [ 1555.121402] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1555.122594] RIP: 0033:0x7f9954f6d8d7 [ 1555.123460] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1555.127740] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1555.129516] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f6d8d7 [ 1555.131172] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1555.132837] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1555.134494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1555.136150] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 04:41:15 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xd0000000}) 04:41:15 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:41:15 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x97ee5c27}) 04:41:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41c00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1555.182008] loop3: detected capacity change from 0 to 262144 [ 1555.214364] loop4: detected capacity change from 0 to 135266304 04:41:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, 0x0, &(0x7f00000009c0)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:41:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1555.249477] loop7: detected capacity change from 0 to 262144 04:41:15 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}) [ 1555.274589] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1555.282391] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1555.288669] EXT4-fs (loop3): get root inode failed [ 1555.289998] EXT4-fs (loop3): mount failed [ 1555.290673] EXT4-fs (loop7): get root inode failed [ 1555.291680] EXT4-fs (loop7): mount failed 04:41:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 32) 04:41:15 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:41:15 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}) [ 1555.344958] FAULT_INJECTION: forcing a failure. [ 1555.344958] name failslab, interval 1, probability 0, space 0, times 0 [ 1555.346551] CPU: 1 PID: 16936 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1555.347585] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1555.348639] Call Trace: [ 1555.349011] dump_stack+0x107/0x167 [ 1555.349440] should_fail.cold+0x5/0xa [ 1555.349889] ? create_object.isra.0+0x3a/0xa20 [ 1555.350427] should_failslab+0x5/0x20 [ 1555.350877] kmem_cache_alloc+0x5b/0x310 [ 1555.351357] create_object.isra.0+0x3a/0xa20 [ 1555.351877] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1555.352484] kmem_cache_alloc+0x159/0x310 [ 1555.352983] __kernfs_new_node+0xd4/0x860 [ 1555.353482] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1555.354041] ? perf_trace_lock+0xac/0x490 [ 1555.354529] ? perf_trace_lock+0xac/0x490 [ 1555.355017] ? lock_chain_count+0x20/0x20 [ 1555.355683] ? __lockdep_reset_lock+0x180/0x180 [ 1555.356231] ? __lockdep_reset_lock+0x180/0x180 [ 1555.356790] ? update_load_avg+0x162/0x1870 [ 1555.357299] ? find_held_lock+0x2c/0x110 [ 1555.357779] kernfs_new_node+0x18d/0x250 [ 1555.358259] kernfs_create_dir_ns+0x49/0x160 [ 1555.358809] internal_create_group+0x793/0xb30 [ 1555.359526] ? set_user_nice.part.0+0x2fd/0x760 [ 1555.360161] ? sysfs_remove_group+0x170/0x170 [ 1555.360706] ? lockdep_init_map_type+0x2c7/0x780 [ 1555.361265] ? blk_queue_flag_set+0x22/0x30 [ 1555.361795] ? __loop_update_dio+0x2d2/0x690 [ 1555.362391] loop_configure+0x953/0x1410 [ 1555.362956] lo_ioctl+0xa57/0x16b0 [ 1555.363376] ? avc_has_extended_perms+0x7f1/0xf40 [ 1555.364052] ? loop_set_status_old+0x250/0x250 [ 1555.364625] ? avc_ss_reset+0x180/0x180 [ 1555.365099] ? find_held_lock+0x2c/0x110 [ 1555.365584] ? __lock_acquire+0xbb1/0x5b00 [ 1555.366110] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1555.366733] ? generic_block_fiemap+0x60/0x60 [ 1555.367258] ? lock_downgrade+0x6d0/0x6d0 [ 1555.367744] ? build_open_flags+0x6f0/0x6f0 [ 1555.368262] ? loop_set_status_old+0x250/0x250 [ 1555.368804] blkdev_ioctl+0x291/0x710 [ 1555.369265] ? blkdev_common_ioctl+0x1930/0x1930 [ 1555.369966] ? selinux_file_ioctl+0xb6/0x270 [ 1555.370555] block_ioctl+0xf9/0x140 [ 1555.371108] ? blkdev_read_iter+0x1c0/0x1c0 [ 1555.371706] __x64_sys_ioctl+0x19a/0x210 [ 1555.372210] do_syscall_64+0x33/0x40 [ 1555.372787] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1555.373419] RIP: 0033:0x7f9954f6d8d7 [ 1555.373966] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1555.376116] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1555.377030] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f6d8d7 [ 1555.377860] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1555.378701] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1555.379666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1555.380563] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1555.383818] loop3: detected capacity change from 0 to 262144 [ 1555.415859] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1555.425635] EXT4-fs (loop3): get root inode failed [ 1555.426819] EXT4-fs (loop3): mount failed 04:41:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x43f00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:41:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, 0x0, &(0x7f00000009c0)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:41:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:41:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 33) 04:41:31 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:41:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 22) 04:41:31 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:41:31 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) [ 1571.092672] FAULT_INJECTION: forcing a failure. [ 1571.092672] name failslab, interval 1, probability 0, space 0, times 0 [ 1571.094818] CPU: 0 PID: 16964 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1571.096051] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1571.097526] Call Trace: [ 1571.098001] dump_stack+0x107/0x167 [ 1571.098650] should_fail.cold+0x5/0xa [ 1571.099329] ? getname_flags.part.0+0x50/0x4f0 [ 1571.100148] should_failslab+0x5/0x20 [ 1571.100835] kmem_cache_alloc+0x5b/0x310 [ 1571.100870] FAULT_INJECTION: forcing a failure. [ 1571.100870] name failslab, interval 1, probability 0, space 0, times 0 [ 1571.101563] ? new_sync_write+0x499/0x660 [ 1571.101585] getname_flags.part.0+0x50/0x4f0 [ 1571.101604] getname+0x8e/0xd0 [ 1571.101620] do_sys_openat2+0xf9/0x4d0 [ 1571.101649] ? build_open_flags+0x6f0/0x6f0 [ 1571.101675] ? rcu_read_lock_any_held+0x75/0xa0 [ 1571.108733] __x64_sys_openat+0x13f/0x1f0 [ 1571.109468] ? __ia32_sys_open+0x1c0/0x1c0 [ 1571.110237] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1571.111169] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1571.112090] do_syscall_64+0x33/0x40 [ 1571.112761] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1571.113675] RIP: 0033:0x7f40b88eda04 [ 1571.114335] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1571.117602] RSP: 002b:00007f40b5eafed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1571.118959] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b88eda04 [ 1571.120226] RDX: 0000000000000002 RSI: 00007f40b5eb0000 RDI: 00000000ffffff9c [ 1571.121500] RBP: 00007f40b5eb0000 R08: 0000000000000000 R09: ffffffffffffffff [ 1571.122764] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1571.124036] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1571.125347] CPU: 1 PID: 16958 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 1571.126966] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1571.128904] Call Trace: [ 1571.129523] dump_stack+0x107/0x167 [ 1571.130373] should_fail.cold+0x5/0xa [ 1571.131264] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1571.132601] should_failslab+0x5/0x20 [ 1571.133496] kmem_cache_alloc+0x5b/0x310 [ 1571.134450] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1571.135752] idr_get_free+0x4b5/0x8f0 [ 1571.136663] idr_alloc_u32+0x170/0x2d0 [ 1571.137572] ? __fprop_inc_percpu_max+0x130/0x130 [ 1571.138695] ? lock_acquire+0x197/0x470 [ 1571.139616] ? __kernfs_new_node+0xff/0x860 [ 1571.140639] idr_alloc_cyclic+0x102/0x230 [ 1571.141602] ? idr_alloc+0x130/0x130 [ 1571.142459] ? rwlock_bug.part.0+0x90/0x90 [ 1571.143460] __kernfs_new_node+0x117/0x860 [ 1571.144450] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1571.145555] ? perf_trace_lock+0xac/0x490 [ 1571.146513] ? perf_trace_lock+0xac/0x490 [ 1571.147476] ? lock_chain_count+0x20/0x20 [ 1571.148439] ? __lockdep_reset_lock+0x180/0x180 [ 1571.149522] ? __lockdep_reset_lock+0x180/0x180 [ 1571.150606] ? update_load_avg+0x162/0x1870 [ 1571.151604] ? find_held_lock+0x2c/0x110 [ 1571.152566] kernfs_new_node+0x18d/0x250 [ 1571.153522] kernfs_create_dir_ns+0x49/0x160 [ 1571.154548] internal_create_group+0x793/0xb30 [ 1571.155616] ? set_user_nice.part.0+0x2fd/0x760 [ 1571.156701] ? sysfs_remove_group+0x170/0x170 [ 1571.157744] ? lockdep_init_map_type+0x2c7/0x780 [ 1571.158847] ? blk_queue_flag_set+0x22/0x30 [ 1571.159843] ? __loop_update_dio+0x2d2/0x690 [ 1571.160876] loop_configure+0x953/0x1410 [ 1571.161834] lo_ioctl+0xa57/0x16b0 [ 1571.162663] ? avc_has_extended_perms+0x7f1/0xf40 [ 1571.163786] ? loop_set_status_old+0x250/0x250 [ 1571.164861] ? avc_ss_reset+0x180/0x180 [ 1571.165785] ? find_held_lock+0x2c/0x110 [ 1571.166745] ? __lock_acquire+0xbb1/0x5b00 [ 1571.167790] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1571.169014] ? generic_block_fiemap+0x60/0x60 [ 1571.170051] ? lock_downgrade+0x6d0/0x6d0 [ 1571.171011] ? build_open_flags+0x6f0/0x6f0 [ 1571.172019] ? loop_set_status_old+0x250/0x250 [ 1571.173076] blkdev_ioctl+0x291/0x710 [ 1571.173960] ? blkdev_common_ioctl+0x1930/0x1930 [ 1571.175061] ? selinux_file_ioctl+0xb6/0x270 [ 1571.176086] block_ioctl+0xf9/0x140 [ 1571.176934] ? blkdev_read_iter+0x1c0/0x1c0 [ 1571.177935] __x64_sys_ioctl+0x19a/0x210 [ 1571.178880] do_syscall_64+0x33/0x40 [ 1571.179745] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1571.180940] RIP: 0033:0x7f9954f6d8d7 [ 1571.181803] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1571.185926] RSP: 002b:00007f99524e2f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1571.187669] RAX: ffffffffffffffda RBX: 00007f9954fb7970 RCX: 00007f9954f6d8d7 [ 1571.189271] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1571.190873] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1571.192474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1571.194122] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1571.200951] loop3: detected capacity change from 0 to 262144 04:41:31 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) [ 1571.253371] loop4: detected capacity change from 0 to 135266304 04:41:31 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:41:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 23) 04:41:31 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 04:41:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x46600, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1571.300757] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1571.345620] EXT4-fs (loop3): get root inode failed [ 1571.346841] EXT4-fs (loop3): mount failed [ 1571.359332] FAULT_INJECTION: forcing a failure. [ 1571.359332] name failslab, interval 1, probability 0, space 0, times 0 [ 1571.361999] CPU: 1 PID: 16984 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1571.363564] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1571.365441] Call Trace: [ 1571.366043] dump_stack+0x107/0x167 [ 1571.366866] should_fail.cold+0x5/0xa [ 1571.367733] ? create_object.isra.0+0x3a/0xa20 [ 1571.368784] should_failslab+0x5/0x20 [ 1571.369644] kmem_cache_alloc+0x5b/0x310 [ 1571.370563] ? __generic_file_write_iter+0x1a4/0x5d0 [ 1571.371714] create_object.isra.0+0x3a/0xa20 [ 1571.372707] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1571.373855] kmem_cache_alloc+0x159/0x310 [ 1571.374784] ? new_sync_write+0x499/0x660 [ 1571.375730] getname_flags.part.0+0x50/0x4f0 [ 1571.376737] getname+0x8e/0xd0 [ 1571.377465] do_sys_openat2+0xf9/0x4d0 [ 1571.378348] ? build_open_flags+0x6f0/0x6f0 [ 1571.379335] ? rcu_read_lock_any_held+0x75/0xa0 [ 1571.380402] __x64_sys_openat+0x13f/0x1f0 [ 1571.381350] ? __ia32_sys_open+0x1c0/0x1c0 [ 1571.382319] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1571.383505] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1571.384680] do_syscall_64+0x33/0x40 [ 1571.385523] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1571.386679] RIP: 0033:0x7f40b88eda04 [ 1571.387519] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1571.391684] RSP: 002b:00007f40b5eafed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1571.393403] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b88eda04 [ 1571.395019] RDX: 0000000000000002 RSI: 00007f40b5eb0000 RDI: 00000000ffffff9c [ 1571.396636] RBP: 00007f40b5eb0000 R08: 0000000000000000 R09: ffffffffffffffff [ 1571.398238] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1571.399844] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 04:41:31 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x275cee97ffffffff}) 04:41:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:41:31 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:41:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 34) [ 1571.522692] loop7: detected capacity change from 0 to 262144 04:41:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x48004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1571.587072] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1571.589195] EXT4-fs (loop7): get root inode failed [ 1571.589875] EXT4-fs (loop7): mount failed 04:41:45 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 24) 04:41:45 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:41:45 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x3f420f0000000000}) 04:41:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:41:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:41:45 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:41:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:41:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1585.344916] FAULT_INJECTION: forcing a failure. [ 1585.344916] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1585.346628] CPU: 1 PID: 17018 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1585.347566] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1585.348667] Call Trace: [ 1585.349012] dump_stack+0x107/0x167 [ 1585.349464] should_fail.cold+0x5/0xa [ 1585.349941] strncpy_from_user+0x34/0x470 [ 1585.350461] getname_flags.part.0+0x95/0x4f0 [ 1585.351007] getname+0x8e/0xd0 [ 1585.351405] do_sys_openat2+0xf9/0x4d0 [ 1585.351889] ? build_open_flags+0x6f0/0x6f0 [ 1585.352428] ? rcu_read_lock_any_held+0x75/0xa0 [ 1585.353012] __x64_sys_openat+0x13f/0x1f0 [ 1585.353521] ? __ia32_sys_open+0x1c0/0x1c0 [ 1585.354052] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1585.354700] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1585.355333] do_syscall_64+0x33/0x40 [ 1585.355795] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1585.356422] RIP: 0033:0x7f40b88eda04 [ 1585.356894] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1585.359133] RSP: 002b:00007f40b5eafed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1585.360066] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b88eda04 [ 1585.360946] RDX: 0000000000000002 RSI: 00007f40b5eb0000 RDI: 00000000ffffff9c [ 1585.361818] RBP: 00007f40b5eb0000 R08: 0000000000000000 R09: ffffffffffffffff [ 1585.362686] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1585.363560] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1585.366163] loop4: detected capacity change from 0 to 135266304 04:41:45 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) [ 1585.385785] loop3: detected capacity change from 0 to 262144 04:41:45 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}) 04:41:45 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x275cee97ffffffff}) 04:41:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8800000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:41:45 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 25) [ 1585.440246] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1585.442818] EXT4-fs (loop3): get root inode failed [ 1585.443410] EXT4-fs (loop3): mount failed [ 1585.484638] FAULT_INJECTION: forcing a failure. [ 1585.484638] name failslab, interval 1, probability 0, space 0, times 0 [ 1585.486317] CPU: 1 PID: 17038 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1585.487296] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1585.488467] Call Trace: [ 1585.488853] dump_stack+0x107/0x167 [ 1585.489368] should_fail.cold+0x5/0xa [ 1585.489909] ? __alloc_file+0x21/0x320 [ 1585.490458] should_failslab+0x5/0x20 [ 1585.490999] kmem_cache_alloc+0x5b/0x310 [ 1585.491577] __alloc_file+0x21/0x320 [ 1585.492106] alloc_empty_file+0x6d/0x170 [ 1585.492679] path_openat+0xe6/0x2770 [ 1585.493213] ? __lock_acquire+0x1657/0x5b00 [ 1585.493721] ? path_lookupat+0x860/0x860 [ 1585.494292] ? perf_trace_lock+0xac/0x490 [ 1585.494870] ? SOFTIRQ_verbose+0x10/0x10 [ 1585.495440] ? find_held_lock+0x2c/0x110 [ 1585.496013] ? __lockdep_reset_lock+0x180/0x180 [ 1585.496543] do_filp_open+0x190/0x3e0 [ 1585.497470] ? may_open_dev+0xf0/0xf0 [ 1585.498460] ? alloc_fd+0x2e7/0x670 [ 1585.499395] ? lock_downgrade+0x6d0/0x6d0 [ 1585.500454] ? do_raw_spin_lock+0x121/0x260 [ 1585.501557] ? rwlock_bug.part.0+0x90/0x90 [ 1585.502540] ? _raw_spin_unlock+0x1a/0x30 [ 1585.503488] ? alloc_fd+0x2e7/0x670 [ 1585.504337] do_sys_openat2+0x171/0x4d0 [ 1585.505265] ? build_open_flags+0x6f0/0x6f0 [ 1585.506265] ? rcu_read_lock_any_held+0x75/0xa0 [ 1585.507335] __x64_sys_openat+0x13f/0x1f0 [ 1585.508287] ? __ia32_sys_open+0x1c0/0x1c0 [ 1585.509282] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1585.510491] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1585.511679] do_syscall_64+0x33/0x40 [ 1585.512536] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1585.513724] RIP: 0033:0x7f40b88eda04 [ 1585.514583] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1585.518824] RSP: 002b:00007f40b5eafed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1585.520580] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b88eda04 [ 1585.522230] RDX: 0000000000000002 RSI: 00007f40b5eb0000 RDI: 00000000ffffff9c [ 1585.523874] RBP: 00007f40b5eb0000 R08: 0000000000000000 R09: ffffffffffffffff [ 1585.525522] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1585.527160] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 04:42:01 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:42:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:42:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:42:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 26) 04:42:01 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x3f420f0000000000}) 04:42:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:42:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:42:01 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xd000000000000000}) [ 1600.579490] FAULT_INJECTION: forcing a failure. [ 1600.579490] name failslab, interval 1, probability 0, space 0, times 0 04:42:01 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) [ 1600.582483] CPU: 0 PID: 17057 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1600.584493] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1600.586794] Call Trace: [ 1600.587550] dump_stack+0x107/0x167 [ 1600.588562] should_fail.cold+0x5/0xa [ 1600.589645] ? create_object.isra.0+0x3a/0xa20 [ 1600.590927] should_failslab+0x5/0x20 [ 1600.591979] kmem_cache_alloc+0x5b/0x310 [ 1600.593148] create_object.isra.0+0x3a/0xa20 [ 1600.594172] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1600.595588] kmem_cache_alloc+0x159/0x310 [ 1600.596625] __alloc_file+0x21/0x320 [ 1600.597505] alloc_empty_file+0x6d/0x170 [ 1600.598456] path_openat+0xe6/0x2770 [ 1600.599321] ? __lock_acquire+0x1657/0x5b00 [ 1600.600342] ? path_lookupat+0x860/0x860 [ 1600.601298] ? perf_trace_lock+0xac/0x490 [ 1600.602262] ? SOFTIRQ_verbose+0x10/0x10 [ 1600.603214] ? find_held_lock+0x2c/0x110 [ 1600.604170] ? __lockdep_reset_lock+0x180/0x180 [ 1600.605283] do_filp_open+0x190/0x3e0 [ 1600.606179] ? may_open_dev+0xf0/0xf0 [ 1600.607079] ? alloc_fd+0x2e7/0x670 [ 1600.607931] ? lock_downgrade+0x6d0/0x6d0 [ 1600.608900] ? do_raw_spin_lock+0x121/0x260 [ 1600.609914] ? rwlock_bug.part.0+0x90/0x90 [ 1600.610917] ? _raw_spin_unlock+0x1a/0x30 [ 1600.611881] ? alloc_fd+0x2e7/0x670 [ 1600.612748] do_sys_openat2+0x171/0x4d0 [ 1600.613696] ? build_open_flags+0x6f0/0x6f0 [ 1600.614717] ? rcu_read_lock_any_held+0x75/0xa0 [ 1600.615801] __x64_sys_openat+0x13f/0x1f0 [ 1600.616768] ? __ia32_sys_open+0x1c0/0x1c0 [ 1600.617777] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1600.618999] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1600.620210] do_syscall_64+0x33/0x40 [ 1600.621094] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1600.622285] RIP: 0033:0x7f40b88eda04 [ 1600.623150] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1600.627403] RSP: 002b:00007f40b5eafed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1600.629176] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b88eda04 [ 1600.630827] RDX: 0000000000000002 RSI: 00007f40b5eb0000 RDI: 00000000ffffff9c [ 1600.632474] RBP: 00007f40b5eb0000 R08: 0000000000000000 R09: ffffffffffffffff [ 1600.634140] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1600.635794] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1600.643513] loop4: detected capacity change from 0 to 135266304 04:42:01 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}) [ 1600.663874] loop3: detected capacity change from 0 to 131072 [ 1600.677672] EXT4-fs (loop3): bad geometry: block count 64 exceeds size of device (32 blocks) 04:42:01 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}) [ 1600.696455] loop7: detected capacity change from 0 to 262144 [ 1600.729057] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1600.732792] EXT4-fs (loop7): get root inode failed [ 1600.733792] EXT4-fs (loop7): mount failed [ 1600.736510] loop3: detected capacity change from 0 to 131072 [ 1600.756966] EXT4-fs (loop3): bad geometry: block count 64 exceeds size of device (32 blocks) 04:42:01 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:42:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:42:01 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xffffffff97ee5c27}) 04:42:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:42:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 27) [ 1600.970069] FAULT_INJECTION: forcing a failure. [ 1600.970069] name failslab, interval 1, probability 0, space 0, times 0 [ 1600.973576] CPU: 0 PID: 17085 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1600.975287] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1600.977207] Call Trace: [ 1600.977817] dump_stack+0x107/0x167 [ 1600.978654] should_fail.cold+0x5/0xa [ 1600.979529] ? security_file_alloc+0x34/0x170 [ 1600.980563] should_failslab+0x5/0x20 [ 1600.981448] kmem_cache_alloc+0x5b/0x310 [ 1600.982386] security_file_alloc+0x34/0x170 [ 1600.983378] __alloc_file+0xb7/0x320 [ 1600.984235] alloc_empty_file+0x6d/0x170 [ 1600.985171] path_openat+0xe6/0x2770 [ 1600.986022] ? __lock_acquire+0x1657/0x5b00 [ 1600.987027] ? path_lookupat+0x860/0x860 [ 1600.987959] ? perf_trace_lock+0xac/0x490 [ 1600.988917] ? SOFTIRQ_verbose+0x10/0x10 [ 1600.989846] ? find_held_lock+0x2c/0x110 [ 1600.990778] ? __lockdep_reset_lock+0x180/0x180 [ 1600.991851] do_filp_open+0x190/0x3e0 [ 1600.992721] ? may_open_dev+0xf0/0xf0 [ 1600.993612] ? alloc_fd+0x2e7/0x670 [ 1600.994445] ? lock_downgrade+0x6d0/0x6d0 [ 1600.995393] ? do_raw_spin_lock+0x121/0x260 [ 1600.996384] ? rwlock_bug.part.0+0x90/0x90 [ 1600.997370] ? _raw_spin_unlock+0x1a/0x30 [ 1600.998317] ? alloc_fd+0x2e7/0x670 [ 1600.999169] do_sys_openat2+0x171/0x4d0 [ 1601.000085] ? build_open_flags+0x6f0/0x6f0 [ 1601.001093] ? rcu_read_lock_any_held+0x75/0xa0 [ 1601.002173] __x64_sys_openat+0x13f/0x1f0 [ 1601.003124] ? __ia32_sys_open+0x1c0/0x1c0 [ 1601.004107] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1601.005327] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1601.006516] do_syscall_64+0x33/0x40 [ 1601.007371] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1601.008543] RIP: 0033:0x7f40b88eda04 [ 1601.009401] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1601.013619] RSP: 002b:00007f40b5eafed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1601.015359] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b88eda04 [ 1601.017000] RDX: 0000000000000002 RSI: 00007f40b5eb0000 RDI: 00000000ffffff9c [ 1601.018636] RBP: 00007f40b5eb0000 R08: 0000000000000000 R09: ffffffffffffffff [ 1601.020270] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1601.021917] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 04:42:15 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:42:15 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}) 04:42:15 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:42:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:42:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x30000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:42:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:42:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 28) 04:42:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 1614.994070] FAULT_INJECTION: forcing a failure. [ 1614.994070] name failslab, interval 1, probability 0, space 0, times 0 [ 1614.996830] CPU: 0 PID: 17104 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1614.998443] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1615.000342] Call Trace: [ 1615.000951] dump_stack+0x107/0x167 [ 1615.001792] should_fail.cold+0x5/0xa [ 1615.002670] ? create_object.isra.0+0x3a/0xa20 [ 1615.003723] should_failslab+0x5/0x20 [ 1615.004588] kmem_cache_alloc+0x5b/0x310 [ 1615.005526] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1615.006794] create_object.isra.0+0x3a/0xa20 [ 1615.007785] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1615.008957] kmem_cache_alloc+0x159/0x310 [ 1615.009927] security_file_alloc+0x34/0x170 [ 1615.010895] __alloc_file+0xb7/0x320 [ 1615.011753] alloc_empty_file+0x6d/0x170 [ 1615.012684] path_openat+0xe6/0x2770 [ 1615.013549] ? __lock_acquire+0x1657/0x5b00 [ 1615.014546] ? path_lookupat+0x860/0x860 [ 1615.015475] ? perf_trace_lock+0xac/0x490 [ 1615.016430] ? SOFTIRQ_verbose+0x10/0x10 [ 1615.017365] ? find_held_lock+0x2c/0x110 [ 1615.018287] ? __lockdep_reset_lock+0x180/0x180 [ 1615.019337] do_filp_open+0x190/0x3e0 [ 1615.020212] ? may_open_dev+0xf0/0xf0 [ 1615.021100] ? alloc_fd+0x2e7/0x670 [ 1615.021939] ? lock_downgrade+0x6d0/0x6d0 [ 1615.022885] ? do_raw_spin_lock+0x121/0x260 [ 1615.023883] ? rwlock_bug.part.0+0x90/0x90 [ 1615.024847] ? _raw_spin_unlock+0x1a/0x30 [ 1615.025809] ? alloc_fd+0x2e7/0x670 [ 1615.026656] do_sys_openat2+0x171/0x4d0 [ 1615.027562] ? build_open_flags+0x6f0/0x6f0 [ 1615.028573] ? rcu_read_lock_any_held+0x75/0xa0 [ 1615.029634] __x64_sys_openat+0x13f/0x1f0 [ 1615.030590] ? __ia32_sys_open+0x1c0/0x1c0 [ 1615.031566] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1615.032769] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1615.033970] do_syscall_64+0x33/0x40 [ 1615.034824] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1615.036003] RIP: 0033:0x7f40b88eda04 [ 1615.036842] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1615.041071] RSP: 002b:00007f40b5eafed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1615.042792] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b88eda04 [ 1615.044442] RDX: 0000000000000002 RSI: 00007f40b5eb0000 RDI: 00000000ffffff9c [ 1615.046071] RBP: 00007f40b5eb0000 R08: 0000000000000000 R09: ffffffffffffffff [ 1615.047682] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1615.049296] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1615.057250] loop3: detected capacity change from 0 to 196608 [ 1615.074830] loop4: detected capacity change from 0 to 135266304 [ 1615.088646] EXT4-fs (loop3): bad geometry: block count 64 exceeds size of device (48 blocks) 04:42:15 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0}) 04:42:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1615.125342] loop7: detected capacity change from 0 to 262144 04:42:15 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) [ 1615.152149] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1615.154959] EXT4-fs (loop7): get root inode failed [ 1615.155660] EXT4-fs (loop7): mount failed [ 1615.156439] loop3: detected capacity change from 0 to 196608 [ 1615.166090] EXT4-fs (loop3): bad geometry: block count 64 exceeds size of device (48 blocks) 04:42:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:42:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:42:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 29) 04:42:15 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:42:15 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0xffffffff97ee5c27}) [ 1615.303430] FAULT_INJECTION: forcing a failure. [ 1615.303430] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1615.304939] CPU: 1 PID: 17125 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1615.305779] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1615.306795] Call Trace: [ 1615.307122] dump_stack+0x107/0x167 [ 1615.307562] should_fail.cold+0x5/0xa [ 1615.308031] _copy_from_user+0x2e/0x1b0 [ 1615.308510] get_timespec64+0x75/0x190 [ 1615.308982] ? put_timespec64+0x130/0x130 [ 1615.309485] ? loop_set_status_old+0x250/0x250 [ 1615.310036] ? blkdev_ioctl+0xc9/0x710 [ 1615.310515] ? blkdev_common_ioctl+0x1930/0x1930 [ 1615.311084] __x64_sys_clock_nanosleep+0x1b1/0x480 [ 1615.311669] ? __ia32_sys_clock_getres_time32+0x260/0x260 [ 1615.312322] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1615.312957] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1615.313583] do_syscall_64+0x33/0x40 [ 1615.314024] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1615.314637] RIP: 0033:0x7f40b895f8e1 [ 1615.315085] Code: 24 0c 89 3c 24 48 89 4c 24 18 e8 aa e7 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 8b 74 24 0c 8b 3c 24 b8 e6 00 00 00 0f 05 <44> 89 c7 48 89 04 24 e8 e3 e7 ff ff 48 8b 04 24 eb 97 66 2e 0f 1f [ 1615.317299] RSP: 002b:00007f40b5eafee0 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6 [ 1615.318210] RAX: ffffffffffffffda RBX: 00007f40b5eb06bc RCX: 00007f40b895f8e1 [ 1615.319063] RDX: 00007f40b5eaff20 RSI: 0000000000000000 RDI: 0000000000000000 [ 1615.319941] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1615.320803] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000010 [ 1615.321658] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 04:42:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40002, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:42:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:42:15 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 04:42:15 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:42:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:42:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0x0, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:42:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) [ 1633.314462] FAULT_INJECTION: forcing a failure. [ 1633.314462] name failslab, interval 1, probability 0, space 0, times 0 [ 1633.316565] CPU: 0 PID: 17146 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1633.317782] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1633.319224] Call Trace: [ 1633.319695] dump_stack+0x107/0x167 [ 1633.320318] should_fail.cold+0x5/0xa [ 1633.320997] ? create_object.isra.0+0x3a/0xa20 [ 1633.321860] should_failslab+0x5/0x20 [ 1633.322545] kmem_cache_alloc+0x5b/0x310 [ 1633.323270] create_object.isra.0+0x3a/0xa20 [ 1633.324047] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1633.324949] kmem_cache_alloc_trace+0x151/0x320 [ 1633.325790] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1633.326632] __kthread_create_on_node+0xd1/0x400 [ 1633.327461] ? __kthread_parkme+0x1d0/0x1d0 [ 1633.328238] ? __mutex_lock+0x4fe/0x10b0 [ 1633.328957] ? loop_configure+0xc8a/0x1410 [ 1633.329712] ? do_raw_spin_unlock+0x4f/0x220 [ 1633.330499] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1633.331330] kthread_create_on_node+0xbb/0x100 [ 1633.332130] ? __kthread_create_on_node+0x400/0x400 [ 1633.333014] ? lockdep_init_map_type+0x2c7/0x780 [ 1633.333847] ? lockdep_init_map_type+0x2c7/0x780 [ 1633.334687] loop_configure+0x3e7/0x1410 [ 1633.335411] lo_ioctl+0xa57/0x16b0 [ 1633.336035] ? avc_has_extended_perms+0x7f1/0xf40 [ 1633.336882] ? loop_set_status_old+0x250/0x250 [ 1633.337667] ? avc_ss_reset+0x180/0x180 [ 1633.338371] ? find_held_lock+0x2c/0x110 [ 1633.339103] ? __lock_acquire+0xbb1/0x5b00 04:42:33 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:42:33 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 30) 04:42:33 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:42:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:42:33 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}) [ 1633.339896] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1633.340993] ? generic_block_fiemap+0x60/0x60 [ 1633.341781] ? lock_downgrade+0x6d0/0x6d0 [ 1633.342508] ? build_open_flags+0x6f0/0x6f0 [ 1633.343266] ? loop_set_status_old+0x250/0x250 [ 1633.344064] blkdev_ioctl+0x291/0x710 [ 1633.344733] ? blkdev_common_ioctl+0x1930/0x1930 [ 1633.345571] ? selinux_file_ioctl+0xb6/0x270 [ 1633.346347] block_ioctl+0xf9/0x140 [ 1633.346980] ? blkdev_read_iter+0x1c0/0x1c0 [ 1633.347726] __x64_sys_ioctl+0x19a/0x210 [ 1633.348426] do_syscall_64+0x33/0x40 [ 1633.349081] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1633.349992] RIP: 0033:0x7f40b893a8d7 [ 1633.350644] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1633.353805] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1633.355108] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b893a8d7 [ 1633.356328] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1633.357526] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1633.358736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1633.359935] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 04:42:33 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:42:33 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:42:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1633.449069] loop7: detected capacity change from 0 to 262144 04:42:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0x0, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1633.469234] loop3: detected capacity change from 0 to 262144 [ 1633.495367] loop4: detected capacity change from 0 to 135266304 [ 1633.516089] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1633.519001] EXT4-fs (loop3): get root inode failed [ 1633.520235] EXT4-fs (loop3): mount failed [ 1633.555134] loop3: detected capacity change from 0 to 262144 [ 1633.563114] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1633.566486] EXT4-fs (loop7): get root inode failed [ 1633.567714] EXT4-fs (loop7): mount failed [ 1633.597433] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1633.614446] EXT4-fs (loop3): get root inode failed [ 1633.615570] EXT4-fs (loop3): mount failed 04:42:52 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000}) 04:42:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000001) 04:42:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 31) 04:42:52 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:42:52 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}) 04:42:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40005, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:42:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0x0, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:42:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="020000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1652.210912] loop3: detected capacity change from 0 to 262144 [ 1652.216965] FAULT_INJECTION: forcing a failure. [ 1652.216965] name failslab, interval 1, probability 0, space 0, times 0 [ 1652.219763] CPU: 0 PID: 17299 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1652.221329] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1652.223214] Call Trace: [ 1652.223815] dump_stack+0x107/0x167 [ 1652.224642] should_fail.cold+0x5/0xa [ 1652.225514] ? create_object.isra.0+0x3a/0xa20 [ 1652.226550] should_failslab+0x5/0x20 [ 1652.227414] kmem_cache_alloc+0x5b/0x310 [ 1652.228341] create_object.isra.0+0x3a/0xa20 [ 1652.229335] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1652.230499] kmem_cache_alloc_trace+0x151/0x320 [ 1652.231551] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1652.232620] __kthread_create_on_node+0xd1/0x400 [ 1652.233696] ? __kthread_parkme+0x1d0/0x1d0 [ 1652.234682] ? __mutex_lock+0x4fe/0x10b0 [ 1652.235606] ? loop_configure+0xc8a/0x1410 [ 1652.236572] ? do_raw_spin_unlock+0x4f/0x220 [ 1652.237578] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1652.238655] kthread_create_on_node+0xbb/0x100 [ 1652.239689] ? __kthread_create_on_node+0x400/0x400 [ 1652.240824] ? lockdep_init_map_type+0x2c7/0x780 [ 1652.241910] ? lockdep_init_map_type+0x2c7/0x780 [ 1652.243002] loop_configure+0x3e7/0x1410 [ 1652.243937] lo_ioctl+0xa57/0x16b0 [ 1652.244745] ? avc_has_extended_perms+0x7f1/0xf40 [ 1652.245851] ? loop_set_status_old+0x250/0x250 [ 1652.246884] ? avc_ss_reset+0x180/0x180 [ 1652.247781] ? find_held_lock+0x2c/0x110 [ 1652.248719] ? __lock_acquire+0xbb1/0x5b00 [ 1652.249741] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1652.250933] ? generic_block_fiemap+0x60/0x60 [ 1652.251942] ? lock_downgrade+0x6d0/0x6d0 [ 1652.252880] ? build_open_flags+0x6f0/0x6f0 [ 1652.253882] ? loop_set_status_old+0x250/0x250 [ 1652.254918] blkdev_ioctl+0x291/0x710 [ 1652.255777] ? blkdev_common_ioctl+0x1930/0x1930 [ 1652.256842] ? selinux_file_ioctl+0xb6/0x270 [ 1652.257856] block_ioctl+0xf9/0x140 [ 1652.258682] ? blkdev_read_iter+0x1c0/0x1c0 [ 1652.259660] __x64_sys_ioctl+0x19a/0x210 [ 1652.260562] do_syscall_64+0x33/0x40 [ 1652.261392] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1652.262527] RIP: 0033:0x7f40b893a8d7 [ 1652.263360] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1652.267489] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1652.269238] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b893a8d7 [ 1652.270867] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1652.272486] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1652.274113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1652.275726] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1652.324994] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block 04:42:52 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:42:52 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf423f}) [ 1652.348806] EXT4-fs (loop3): get root inode failed [ 1652.350077] EXT4-fs (loop3): mount failed 04:42:52 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf423f}) [ 1652.379441] loop7: detected capacity change from 0 to 262144 04:42:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="300000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1652.405934] loop4: detected capacity change from 0 to 135266304 04:42:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(0xffffffffffffffff, 0x6, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:42:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40006, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1652.501924] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1652.535687] EXT4-fs (loop7): get root inode failed [ 1652.537006] EXT4-fs (loop7): mount failed 04:42:53 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:42:53 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:42:53 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:43:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200020000000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:43:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(0xffffffffffffffff, 0x6, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:43:08 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:43:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000001) 04:43:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40007, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:43:08 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 32) 04:43:08 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}) 04:43:08 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) [ 1668.483815] loop3: detected capacity change from 0 to 262144 [ 1668.495919] FAULT_INJECTION: forcing a failure. [ 1668.495919] name failslab, interval 1, probability 0, space 0, times 0 [ 1668.497775] CPU: 1 PID: 17349 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1668.498840] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1668.500108] Call Trace: [ 1668.500514] dump_stack+0x107/0x167 [ 1668.501080] should_fail.cold+0x5/0xa [ 1668.501672] ? create_object.isra.0+0x3a/0xa20 [ 1668.502376] should_failslab+0x5/0x20 [ 1668.502955] kmem_cache_alloc+0x5b/0x310 [ 1668.503577] create_object.isra.0+0x3a/0xa20 [ 1668.504247] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1668.505025] kmem_cache_alloc+0x159/0x310 [ 1668.505670] __kernfs_new_node+0xd4/0x860 [ 1668.506305] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1668.507029] ? perf_trace_lock+0xac/0x490 [ 1668.507659] ? perf_trace_lock+0xac/0x490 [ 1668.508295] ? lock_chain_count+0x20/0x20 [ 1668.508926] ? __lockdep_reset_lock+0x180/0x180 [ 1668.509639] ? __lockdep_reset_lock+0x180/0x180 [ 1668.510355] ? update_load_avg+0x162/0x1870 [ 1668.511011] ? find_held_lock+0x2c/0x110 [ 1668.511633] kernfs_new_node+0x18d/0x250 [ 1668.512255] kernfs_create_dir_ns+0x49/0x160 [ 1668.512934] internal_create_group+0x793/0xb30 [ 1668.513644] ? set_user_nice.part.0+0x2fd/0x760 [ 1668.514355] ? sysfs_remove_group+0x170/0x170 [ 1668.515042] ? lockdep_init_map_type+0x2c7/0x780 [ 1668.515768] ? blk_queue_flag_set+0x22/0x30 [ 1668.516424] ? __loop_update_dio+0x2d2/0x690 [ 1668.517104] loop_configure+0x953/0x1410 [ 1668.517741] lo_ioctl+0xa57/0x16b0 [ 1668.518285] ? avc_has_extended_perms+0x7f1/0xf40 [ 1668.519019] ? loop_set_status_old+0x250/0x250 [ 1668.519716] ? avc_ss_reset+0x180/0x180 [ 1668.520325] ? find_held_lock+0x2c/0x110 [ 1668.520957] ? __lock_acquire+0xbb1/0x5b00 [ 1668.521652] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1668.522454] ? generic_block_fiemap+0x60/0x60 [ 1668.523135] ? lock_downgrade+0x6d0/0x6d0 [ 1668.523764] ? build_open_flags+0x6f0/0x6f0 [ 1668.524428] ? loop_set_status_old+0x250/0x250 [ 1668.525123] blkdev_ioctl+0x291/0x710 [ 1668.525712] ? blkdev_common_ioctl+0x1930/0x1930 [ 1668.526445] ? selinux_file_ioctl+0xb6/0x270 [ 1668.527121] block_ioctl+0xf9/0x140 [ 1668.527672] ? blkdev_read_iter+0x1c0/0x1c0 [ 1668.528332] __x64_sys_ioctl+0x19a/0x210 [ 1668.528956] do_syscall_64+0x33/0x40 [ 1668.529521] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1668.530305] RIP: 0033:0x7f40b893a8d7 [ 1668.530874] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1668.533682] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1668.534841] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b893a8d7 [ 1668.535929] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1668.537018] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1668.538107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1668.539191] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1668.541830] loop7: detected capacity change from 0 to 262144 [ 1668.578371] loop4: detected capacity change from 0 to 135266304 04:43:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200200004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1668.593333] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1668.595811] EXT4-fs (loop7): get root inode failed [ 1668.596609] EXT4-fs (loop7): mount failed [ 1668.596995] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block 04:43:09 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:43:09 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) [ 1668.616907] EXT4-fs (loop3): get root inode failed [ 1668.618241] EXT4-fs (loop3): mount failed 04:43:09 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 33) [ 1668.706886] loop3: detected capacity change from 0 to 262144 [ 1668.776734] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1668.792342] EXT4-fs (loop3): get root inode failed [ 1668.793684] EXT4-fs (loop3): mount failed [ 1668.815965] FAULT_INJECTION: forcing a failure. [ 1668.815965] name failslab, interval 1, probability 0, space 0, times 0 [ 1668.817890] CPU: 1 PID: 17376 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1668.819153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1668.820553] Call Trace: [ 1668.820964] dump_stack+0x107/0x167 [ 1668.821680] should_fail.cold+0x5/0xa [ 1668.822411] ? __kernfs_new_node+0xd4/0x860 [ 1668.823244] should_failslab+0x5/0x20 [ 1668.823824] kmem_cache_alloc+0x5b/0x310 [ 1668.824584] __kernfs_new_node+0xd4/0x860 [ 1668.825240] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1668.826069] ? kernfs_add_one+0x36e/0x4d0 [ 1668.826917] ? mutex_lock_io_nested+0xf30/0xf30 [ 1668.827728] ? perf_trace_lock+0xac/0x490 [ 1668.828424] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1668.829262] kernfs_new_node+0x18d/0x250 [ 1668.830044] __kernfs_create_file+0x51/0x350 [ 1668.830817] sysfs_add_file_mode_ns+0x221/0x560 [ 1668.831727] internal_create_group+0x324/0xb30 [ 1668.832499] ? sysfs_remove_group+0x170/0x170 [ 1668.833296] ? lockdep_init_map_type+0x2c7/0x780 [ 1668.834046] ? blk_queue_flag_set+0x22/0x30 [ 1668.834890] ? __loop_update_dio+0x2d2/0x690 [ 1668.835733] loop_configure+0x953/0x1410 [ 1668.836516] lo_ioctl+0xa57/0x16b0 [ 1668.837065] ? avc_has_extended_perms+0x7f1/0xf40 [ 1668.837820] ? loop_set_status_old+0x250/0x250 [ 1668.838518] ? avc_ss_reset+0x180/0x180 [ 1668.839194] ? find_held_lock+0x2c/0x110 [ 1668.839888] ? __lock_acquire+0xbb1/0x5b00 [ 1668.840682] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1668.841626] ? generic_block_fiemap+0x60/0x60 [ 1668.842484] ? lock_downgrade+0x6d0/0x6d0 [ 1668.843117] ? build_open_flags+0x6f0/0x6f0 [ 1668.843784] ? loop_set_status_old+0x250/0x250 [ 1668.844401] blkdev_ioctl+0x291/0x710 [ 1668.844886] ? blkdev_common_ioctl+0x1930/0x1930 [ 1668.845585] ? selinux_file_ioctl+0xb6/0x270 [ 1668.846287] block_ioctl+0xf9/0x140 [ 1668.846928] ? blkdev_read_iter+0x1c0/0x1c0 [ 1668.847462] __x64_sys_ioctl+0x19a/0x210 [ 1668.848001] do_syscall_64+0x33/0x40 [ 1668.848597] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1668.849222] RIP: 0033:0x7f40b893a8d7 [ 1668.849830] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1668.852453] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1668.853390] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b893a8d7 [ 1668.854386] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1668.855300] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1668.856373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1668.857495] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1668.859847] loop7: detected capacity change from 0 to 262144 [ 1668.876405] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1668.879195] EXT4-fs (loop7): get root inode failed [ 1668.879898] EXT4-fs (loop7): mount failed 04:43:25 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:43:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000001) 04:43:25 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 34) 04:43:25 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x275cee97}) 04:43:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(0xffffffffffffffff, 0x6, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r3, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r4, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:43:25 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x275cee97}) 04:43:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200300004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:43:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40008, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:43:25 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) [ 1685.106483] FAULT_INJECTION: forcing a failure. [ 1685.106483] name failslab, interval 1, probability 0, space 0, times 0 [ 1685.108163] CPU: 0 PID: 17385 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1685.109169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1685.110380] Call Trace: [ 1685.110765] dump_stack+0x107/0x167 [ 1685.111288] should_fail.cold+0x5/0xa [ 1685.111838] ? ___slab_alloc+0x155/0x700 [ 1685.112427] ? create_object.isra.0+0x3a/0xa20 [ 1685.113099] should_failslab+0x5/0x20 [ 1685.113656] kmem_cache_alloc+0x5b/0x310 [ 1685.114253] create_object.isra.0+0x3a/0xa20 [ 1685.114878] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1685.115601] kmem_cache_alloc+0x159/0x310 [ 1685.116207] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1685.117022] idr_get_free+0x4b5/0x8f0 [ 1685.117575] idr_alloc_u32+0x170/0x2d0 [ 1685.118148] ? __fprop_inc_percpu_max+0x130/0x130 [ 1685.118840] ? lock_acquire+0x197/0x470 [ 1685.119407] ? __kernfs_new_node+0xff/0x860 [ 1685.120042] idr_alloc_cyclic+0x102/0x230 [ 1685.120635] ? idr_alloc+0x130/0x130 [ 1685.121161] ? rwlock_bug.part.0+0x90/0x90 [ 1685.121781] __kernfs_new_node+0x117/0x860 [ 1685.122388] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1685.123056] ? perf_trace_lock+0xac/0x490 [ 1685.123652] ? perf_trace_lock+0xac/0x490 [ 1685.124263] ? lock_chain_count+0x20/0x20 [ 1685.124854] ? __lockdep_reset_lock+0x180/0x180 [ 1685.125512] ? __lockdep_reset_lock+0x180/0x180 [ 1685.126184] ? task_rq_lock+0xab/0x270 [ 1685.126743] ? lock_release+0x680/0x680 [ 1685.127315] ? find_held_lock+0x2c/0x110 [ 1685.127892] kernfs_new_node+0x18d/0x250 [ 1685.128471] kernfs_create_dir_ns+0x49/0x160 [ 1685.129095] internal_create_group+0x793/0xb30 [ 1685.129748] ? set_user_nice.part.0+0x2fd/0x760 [ 1685.130423] ? sysfs_remove_group+0x170/0x170 [ 1685.131062] ? lockdep_init_map_type+0x2c7/0x780 [ 1685.131736] ? blk_queue_flag_set+0x22/0x30 [ 1685.132348] ? __loop_update_dio+0x2d2/0x690 [ 1685.132994] loop_configure+0x953/0x1410 [ 1685.133587] lo_ioctl+0xa57/0x16b0 [ 1685.134101] ? avc_has_extended_perms+0x7f1/0xf40 [ 1685.134789] ? loop_set_status_old+0x250/0x250 [ 1685.135439] ? avc_ss_reset+0x180/0x180 [ 1685.136003] ? find_held_lock+0x2c/0x110 [ 1685.136586] ? __lock_acquire+0xbb1/0x5b00 [ 1685.137220] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1685.137966] ? generic_block_fiemap+0x60/0x60 [ 1685.138607] ? lock_downgrade+0x6d0/0x6d0 [ 1685.139189] ? build_open_flags+0x6f0/0x6f0 [ 1685.139815] ? loop_set_status_old+0x250/0x250 [ 1685.140455] blkdev_ioctl+0x291/0x710 [ 1685.140996] ? blkdev_common_ioctl+0x1930/0x1930 [ 1685.141664] ? selinux_file_ioctl+0xb6/0x270 [ 1685.142295] block_ioctl+0xf9/0x140 [ 1685.142806] ? blkdev_read_iter+0x1c0/0x1c0 [ 1685.143414] __x64_sys_ioctl+0x19a/0x210 [ 1685.143986] do_syscall_64+0x33/0x40 [ 1685.144512] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1685.145239] RIP: 0033:0x7f40b893a8d7 [ 1685.145762] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1685.148359] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1685.149435] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b893a8d7 [ 1685.150445] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1685.151453] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1685.152464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1685.153472] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1685.164480] loop7: detected capacity change from 0 to 262144 04:43:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200400004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:43:25 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}) 04:43:25 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}) [ 1685.168687] loop4: detected capacity change from 0 to 135266304 [ 1685.189355] loop3: detected capacity change from 0 to 262144 [ 1685.199808] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1685.202751] EXT4-fs (loop7): get root inode failed [ 1685.203477] EXT4-fs (loop7): mount failed 04:43:25 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f420f00}) [ 1685.260957] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1685.263031] EXT4-fs (loop3): get root inode failed [ 1685.263863] EXT4-fs (loop3): mount failed [ 1685.282796] loop3: detected capacity change from 0 to 262144 04:43:25 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) [ 1685.313115] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1685.315402] EXT4-fs (loop3): get root inode failed [ 1685.316286] EXT4-fs (loop3): mount failed 04:43:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200500004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:43:25 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97ee5c27}) 04:43:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200600004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:43:41 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f420f00}) 04:43:41 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 35) 04:43:41 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:43:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:43:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40009, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:43:41 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}) 04:43:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80000001) [ 1701.101365] FAULT_INJECTION: forcing a failure. [ 1701.101365] name failslab, interval 1, probability 0, space 0, times 0 [ 1701.102947] CPU: 1 PID: 17438 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 1701.103879] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1701.104992] Call Trace: [ 1701.105358] dump_stack+0x107/0x167 [ 1701.105850] should_fail.cold+0x5/0xa [ 1701.106373] ? __kernfs_new_node+0xd4/0x860 [ 1701.106964] should_failslab+0x5/0x20 [ 1701.107472] kmem_cache_alloc+0x5b/0x310 [ 1701.108024] __kernfs_new_node+0xd4/0x860 [ 1701.108588] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1701.109231] ? kernfs_add_one+0x36e/0x4d0 [ 1701.109796] ? mutex_lock_io_nested+0xf30/0xf30 [ 1701.110425] ? perf_trace_lock+0xac/0x490 [ 1701.110983] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1701.111630] kernfs_new_node+0x18d/0x250 [ 1701.112174] __kernfs_create_file+0x51/0x350 [ 1701.112771] sysfs_add_file_mode_ns+0x221/0x560 [ 1701.113403] internal_create_group+0x324/0xb30 [ 1701.114020] ? sysfs_remove_group+0x170/0x170 [ 1701.114620] ? lockdep_init_map_type+0x2c7/0x780 [ 1701.115264] ? blk_queue_flag_set+0x22/0x30 [ 1701.115838] ? __loop_update_dio+0x2d2/0x690 [ 1701.116434] loop_configure+0x953/0x1410 [ 1701.116980] lo_ioctl+0xa57/0x16b0 [ 1701.117453] ? avc_has_extended_perms+0x7f1/0xf40 [ 1701.118111] ? loop_set_status_old+0x250/0x250 [ 1701.118735] ? avc_ss_reset+0x180/0x180 [ 1701.119272] ? find_held_lock+0x2c/0x110 [ 1701.119822] ? __lock_acquire+0xbb1/0x5b00 [ 1701.120434] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1701.121130] ? generic_block_fiemap+0x60/0x60 [ 1701.121731] ? lock_downgrade+0x6d0/0x6d0 [ 1701.122325] ? build_open_flags+0x6f0/0x6f0 [ 1701.122919] ? loop_set_status_old+0x250/0x250 [ 1701.123524] blkdev_ioctl+0x291/0x710 [ 1701.124028] ? blkdev_common_ioctl+0x1930/0x1930 [ 1701.124667] ? selinux_file_ioctl+0xb6/0x270 [ 1701.125256] block_ioctl+0xf9/0x140 [ 1701.125745] ? blkdev_read_iter+0x1c0/0x1c0 [ 1701.126339] __x64_sys_ioctl+0x19a/0x210 [ 1701.126882] do_syscall_64+0x33/0x40 [ 1701.127374] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1701.128065] RIP: 0033:0x7f40b893a8d7 [ 1701.128570] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1701.131048] RSP: 002b:00007f40b5eaff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1701.132076] RAX: ffffffffffffffda RBX: 00007f40b8984970 RCX: 00007f40b893a8d7 [ 1701.133042] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1701.134021] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1701.134982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1701.135926] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 04:43:41 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) [ 1701.149733] loop7: detected capacity change from 0 to 262144 [ 1701.167819] loop4: detected capacity change from 0 to 135266304 [ 1701.171892] loop3: detected capacity change from 0 to 262144 [ 1701.182658] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 04:43:41 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97ee5c27}) [ 1701.210145] EXT4-fs (loop7): get root inode failed [ 1701.211351] EXT4-fs (loop7): mount failed [ 1701.229226] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block 04:43:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200700004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1701.244401] EXT4-fs (loop3): get root inode failed [ 1701.245594] EXT4-fs (loop3): mount failed 04:43:41 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:43:41 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) [ 1701.316316] loop3: detected capacity change from 0 to 262144 [ 1701.385873] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block 04:43:41 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000}) [ 1701.391328] EXT4-fs (loop3): get root inode failed [ 1701.392812] EXT4-fs (loop3): mount failed 04:43:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200800004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:43:41 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) (fail_nth: 36) 04:43:41 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:43:41 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:43:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:43:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:43:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80000001) 04:43:42 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}) [ 1701.582255] loop3: detected capacity change from 0 to 262144 [ 1701.610269] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1701.612315] EXT4-fs (loop3): get root inode failed [ 1701.613010] EXT4-fs (loop3): mount failed [ 1701.633043] loop3: detected capacity change from 0 to 262144 [ 1701.651604] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1701.653442] EXT4-fs (loop3): get root inode failed [ 1701.654205] EXT4-fs (loop3): mount failed 04:43:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80000001) 04:43:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="201800004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:43:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000b, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:43:56 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:43:56 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 04:43:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x45a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:43:56 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:43:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1715.592972] loop4: detected capacity change from 0 to 135266304 [ 1715.609382] loop7: detected capacity change from 0 to 33792 [ 1715.618865] loop3: detected capacity change from 0 to 262144 04:43:56 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) [ 1715.675948] EXT4-fs (loop7): bad geometry: block count 64 exceeds size of device (8 blocks) [ 1715.705208] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1715.710842] EXT4-fs (loop3): get root inode failed [ 1715.712027] EXT4-fs (loop3): mount failed 04:43:56 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:43:56 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:43:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="201c00004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1715.785353] loop3: detected capacity change from 0 to 262144 [ 1715.812640] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1715.832419] EXT4-fs (loop3): get root inode failed [ 1715.833674] EXT4-fs (loop3): mount failed 04:43:56 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x275cee97ffffffff}) 04:44:10 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x275cee97ffffffff}) 04:44:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x0) 04:44:10 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:44:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:44:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:44:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="206600004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:44:10 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f420f0000000000}) 04:44:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1009, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:44:10 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}) 04:44:10 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 1730.473292] loop7: detected capacity change from 0 to 33792 [ 1730.485748] loop3: detected capacity change from 0 to 262144 [ 1730.487642] EXT4-fs (loop7): bad geometry: block count 64 exceeds size of device (8 blocks) [ 1730.501465] loop4: detected capacity change from 0 to 135266304 04:44:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20f000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1730.516733] loop7: detected capacity change from 0 to 33792 [ 1730.519708] EXT4-fs (loop7): bad geometry: block count 64 exceeds size of device (8 blocks) 04:44:11 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f420f0000000000}) [ 1730.543095] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1730.546300] EXT4-fs (loop3): get root inode failed [ 1730.547433] EXT4-fs (loop3): mount failed [ 1730.595884] loop3: detected capacity change from 0 to 262144 [ 1730.608482] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1730.610208] EXT4-fs (loop3): get root inode failed [ 1730.610841] EXT4-fs (loop3): mount failed 04:44:26 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}) 04:44:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x0) 04:44:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000d, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:44:26 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:44:26 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4269, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1746.416480] loop3: detected capacity change from 0 to 262144 04:44:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:44:26 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000000000000}) 04:44:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200003004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1746.449981] loop4: detected capacity change from 0 to 135266304 04:44:26 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}) [ 1746.463450] loop7: detected capacity change from 0 to 33792 [ 1746.467777] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1746.476228] EXT4-fs (loop3): get root inode failed [ 1746.477549] EXT4-fs (loop3): mount failed [ 1746.480987] EXT4-fs (loop7): bad geometry: block count 64 exceeds size of device (8 blocks) 04:44:26 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:44:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="208004004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:44:26 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}) [ 1746.512146] loop3: detected capacity change from 0 to 262144 [ 1746.522887] loop7: detected capacity change from 0 to 33792 [ 1746.533627] EXT4-fs (loop7): bad geometry: block count 64 exceeds size of device (8 blocks) [ 1746.541470] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1746.544205] EXT4-fs (loop3): get root inode failed [ 1746.545415] EXT4-fs (loop3): mount failed 04:44:27 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff97ee5c27}) 04:44:27 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8008, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:44:27 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:44:27 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff97ee5c27}) 04:44:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1746.637728] loop7: detected capacity change from 0 to 33792 [ 1746.663594] EXT4-fs (loop7): bad geometry: block count 64 exceeds size of device (8 blocks) [ 1746.679747] loop7: detected capacity change from 0 to 33792 [ 1746.718860] EXT4-fs (loop7): bad geometry: block count 64 exceeds size of device (8 blocks) 04:44:43 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40002, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:44:43 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:44:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x0) 04:44:43 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:44:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(0xffffffffffffffff, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:44:43 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 04:44:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:44:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200005004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1763.275393] loop7: detected capacity change from 0 to 262144 [ 1763.291648] loop3: detected capacity change from 0 to 262144 [ 1763.303988] loop4: detected capacity change from 0 to 135266304 [ 1763.313930] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1763.325124] EXT4-fs (loop7): get root inode failed [ 1763.326215] EXT4-fs (loop7): mount failed 04:44:43 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:44:43 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0}) [ 1763.366015] loop7: detected capacity change from 0 to 262144 [ 1763.367450] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block 04:44:43 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) [ 1763.371577] EXT4-fs (loop3): get root inode failed [ 1763.372784] EXT4-fs (loop3): mount failed 04:44:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200006004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1763.395438] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1763.398943] EXT4-fs (loop7): get root inode failed [ 1763.400347] EXT4-fs (loop7): mount failed [ 1763.412883] loop3: detected capacity change from 0 to 262144 [ 1763.435070] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1763.438012] EXT4-fs (loop3): get root inode failed [ 1763.439151] EXT4-fs (loop3): mount failed 04:44:43 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:44:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40010, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:44:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(0xffffffffffffffff, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:44:44 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) [ 1763.553080] loop3: detected capacity change from 0 to 262144 04:44:44 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:44:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200007004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:44:44 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 1763.620463] loop7: detected capacity change from 0 to 262144 [ 1763.643819] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1763.647731] EXT4-fs (loop3): get root inode failed [ 1763.648928] EXT4-fs (loop3): mount failed [ 1763.670638] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1763.673107] loop3: detected capacity change from 0 to 262144 [ 1763.693344] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1763.699124] EXT4-fs (loop3): get root inode failed [ 1763.699296] EXT4-fs (loop7): get root inode failed [ 1763.700267] EXT4-fs (loop3): mount failed [ 1763.702366] EXT4-fs (loop7): mount failed 04:44:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40011, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:44:58 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}) 04:44:58 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:44:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(0xffffffffffffffff, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:44:58 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:44:58 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}) 04:44:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200018004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:44:58 executing program 4: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) [ 1777.696053] loop7: detected capacity change from 0 to 262144 [ 1777.720893] loop3: detected capacity change from 0 to 262144 04:44:58 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf423f}) 04:44:58 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000}) [ 1777.742484] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 04:44:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20001c004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1777.751159] EXT4-fs (loop7): get root inode failed [ 1777.751907] EXT4-fs (loop7): mount failed 04:44:58 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) [ 1777.784336] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block 04:44:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x0) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1777.789578] EXT4-fs (loop3): get root inode failed [ 1777.790231] EXT4-fs (loop3): mount failed [ 1777.794134] loop7: detected capacity change from 0 to 262144 [ 1777.821699] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1777.825386] EXT4-fs (loop7): get root inode failed [ 1777.826194] EXT4-fs (loop7): mount failed 04:44:58 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 1777.837802] loop3: detected capacity change from 0 to 262144 04:44:58 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf423f}) 04:44:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200020004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1777.890627] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1777.913110] EXT4-fs (loop3): get root inode failed [ 1777.913808] EXT4-fs (loop3): mount failed 04:45:15 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:45:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20003f004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:45:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4002e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:45:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40005, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:45:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) (fail_nth: 1) 04:45:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:45:15 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}) 04:45:15 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 1794.707891] loop7: detected capacity change from 0 to 262144 [ 1794.730768] loop3: detected capacity change from 0 to 262144 [ 1794.751851] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1794.754942] EXT4-fs (loop7): get root inode failed [ 1794.756065] EXT4-fs (loop7): mount failed [ 1794.778332] loop4: detected capacity change from 0 to 135266304 [ 1794.799758] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1794.806800] EXT4-fs (loop3): get root inode failed [ 1794.808013] EXT4-fs (loop3): mount failed 04:45:15 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:45:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200066004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:45:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40006, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:45:15 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:45:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200480004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1794.912264] FAULT_INJECTION: forcing a failure. [ 1794.912264] name failslab, interval 1, probability 0, space 0, times 0 [ 1794.915310] CPU: 0 PID: 17782 Comm: syz-executor.4 Not tainted 5.10.236 #1 [ 1794.916773] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1794.918519] Call Trace: [ 1794.919096] dump_stack+0x107/0x167 [ 1794.919867] should_fail.cold+0x5/0xa [ 1794.920673] ? alloc_pipe_info+0x10a/0x590 [ 1794.921566] should_failslab+0x5/0x20 [ 1794.922370] kmem_cache_alloc_trace+0x55/0x320 [ 1794.923350] alloc_pipe_info+0x10a/0x590 [ 1794.924213] splice_direct_to_actor+0x774/0x980 [ 1794.925201] ? _cond_resched+0x10/0x30 [ 1794.926022] ? inode_security+0x107/0x140 [ 1794.926901] ? pipe_to_sendpage+0x380/0x380 [ 1794.927812] ? avc_policy_seqno+0x9/0x70 [ 1794.928668] ? selinux_file_permission+0x92/0x520 [ 1794.929691] ? do_splice_to+0x160/0x160 [ 1794.930528] ? security_file_permission+0xb1/0xe0 [ 1794.931566] do_splice_direct+0x1c4/0x290 [ 1794.932446] ? splice_direct_to_actor+0x980/0x980 [ 1794.933457] ? avc_policy_seqno+0x9/0x70 [ 1794.934330] ? security_file_permission+0xb1/0xe0 [ 1794.935366] do_sendfile+0x553/0x11e0 [ 1794.936192] ? do_pwritev+0x270/0x270 [ 1794.937000] ? wait_for_completion_io+0x270/0x270 [ 1794.938026] ? rcu_read_lock_any_held+0x75/0xa0 [ 1794.939013] ? vfs_write+0x354/0xb10 [ 1794.939801] __x64_sys_sendfile64+0x1d1/0x210 [ 1794.940754] ? __ia32_sys_sendfile+0x220/0x220 [ 1794.941725] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1794.942833] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1794.943931] do_syscall_64+0x33/0x40 [ 1794.944718] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1794.945798] RIP: 0033:0x7f8ff8133b19 [ 1794.946583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1794.950472] RSP: 002b:00007f8ff5688188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1794.952088] RAX: ffffffffffffffda RBX: 00007f8ff8247020 RCX: 00007f8ff8133b19 [ 1794.953592] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 1794.955103] RBP: 00007f8ff56881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1794.956607] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 1794.958116] R13: 00007ffeba1b08bf R14: 00007f8ff5688300 R15: 0000000000022000 04:45:15 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:45:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:45:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40048, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1795.027816] loop7: detected capacity change from 0 to 262144 [ 1795.045012] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 04:45:15 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x275cee97}) [ 1795.055869] EXT4-fs (loop7): get root inode failed [ 1795.056992] EXT4-fs (loop7): mount failed 04:45:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f0004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1795.083300] loop7: detected capacity change from 0 to 262144 [ 1795.110804] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1795.113916] EXT4-fs (loop7): get root inode failed [ 1795.115142] EXT4-fs (loop7): mount failed 04:45:31 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x275cee97}) 04:45:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) (fail_nth: 2) 04:45:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200002004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:45:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4004c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:45:31 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:45:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40007, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:45:31 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}) 04:45:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1811.173487] loop4: detected capacity change from 0 to 135266304 [ 1811.186231] loop7: detected capacity change from 0 to 262144 04:45:31 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f420f00}) [ 1811.195553] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1811.197156] loop3: detected capacity change from 0 to 262144 [ 1811.201361] EXT4-fs (loop7): get root inode failed [ 1811.201966] EXT4-fs (loop7): mount failed 04:45:31 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:45:31 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}) 04:45:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200003004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1811.256365] loop7: detected capacity change from 0 to 262144 [ 1811.268416] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1811.271158] EXT4-fs (loop3): get root inode failed [ 1811.271764] EXT4-fs (loop3): mount failed 04:45:31 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) [ 1811.293863] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1811.295936] loop3: detected capacity change from 0 to 262144 [ 1811.296743] EXT4-fs (loop7): get root inode failed [ 1811.297310] EXT4-fs (loop7): mount failed 04:45:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(0x0, r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1811.314337] FAULT_INJECTION: forcing a failure. [ 1811.314337] name failslab, interval 1, probability 0, space 0, times 0 [ 1811.315847] CPU: 1 PID: 17842 Comm: syz-executor.4 Not tainted 5.10.236 #1 [ 1811.316646] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1811.317604] Call Trace: [ 1811.317913] dump_stack+0x107/0x167 [ 1811.318337] should_fail.cold+0x5/0xa [ 1811.318783] ? create_object.isra.0+0x3a/0xa20 [ 1811.319323] should_failslab+0x5/0x20 [ 1811.319765] kmem_cache_alloc+0x5b/0x310 [ 1811.320245] create_object.isra.0+0x3a/0xa20 [ 1811.320754] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1811.321349] kmem_cache_alloc_trace+0x151/0x320 [ 1811.321900] alloc_pipe_info+0x10a/0x590 [ 1811.322372] splice_direct_to_actor+0x774/0x980 [ 1811.322914] ? _cond_resched+0x10/0x30 [ 1811.323370] ? inode_security+0x107/0x140 [ 1811.323848] ? pipe_to_sendpage+0x380/0x380 [ 1811.324347] ? avc_policy_seqno+0x9/0x70 [ 1811.324821] ? selinux_file_permission+0x92/0x520 [ 1811.325381] ? do_splice_to+0x160/0x160 [ 1811.325840] ? security_file_permission+0xb1/0xe0 [ 1811.326408] do_splice_direct+0x1c4/0x290 [ 1811.326896] ? splice_direct_to_actor+0x980/0x980 [ 1811.327452] ? avc_policy_seqno+0x9/0x70 [ 1811.327927] ? security_file_permission+0xb1/0xe0 [ 1811.328490] do_sendfile+0x553/0x11e0 [ 1811.328939] ? do_pwritev+0x270/0x270 [ 1811.329379] ? wait_for_completion_io+0x270/0x270 [ 1811.329945] ? rcu_read_lock_any_held+0x75/0xa0 [ 1811.330483] ? vfs_write+0x354/0xb10 [ 1811.330913] __x64_sys_sendfile64+0x1d1/0x210 [ 1811.331445] ? __ia32_sys_sendfile+0x220/0x220 [ 1811.331978] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1811.332590] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1811.333189] do_syscall_64+0x33/0x40 [ 1811.333616] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1811.334210] RIP: 0033:0x7f8ff8133b19 [ 1811.334639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1811.336780] RSP: 002b:00007f8ff5688188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1811.337690] RAX: ffffffffffffffda RBX: 00007f8ff8247020 RCX: 00007f8ff8133b19 [ 1811.338519] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 1811.339340] RBP: 00007f8ff56881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1811.340167] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 1811.340982] R13: 00007ffeba1b08bf R14: 00007f8ff5688300 R15: 0000000000022000 [ 1811.385443] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1811.389585] EXT4-fs (loop3): get root inode failed [ 1811.390289] EXT4-fs (loop3): mount failed 04:45:31 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f420f00}) 04:45:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40008, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1811.452257] loop7: detected capacity change from 0 to 262144 [ 1811.461414] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1811.464029] EXT4-fs (loop7): get root inode failed [ 1811.464618] EXT4-fs (loop7): mount failed [ 1811.475719] loop7: detected capacity change from 0 to 262144 [ 1811.481467] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1811.483020] EXT4-fs (loop7): get root inode failed [ 1811.483699] EXT4-fs (loop7): mount failed 04:45:44 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:45:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) (fail_nth: 3) 04:45:44 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) 04:45:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40060, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:45:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200004004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:45:44 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97ee5c27}) 04:45:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(0x0, r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:45:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000b, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1823.979362] loop7: detected capacity change from 0 to 262144 [ 1823.988487] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1823.990243] EXT4-fs (loop7): get root inode failed [ 1823.990905] EXT4-fs (loop7): mount failed [ 1824.020638] loop7: detected capacity change from 0 to 262144 04:45:44 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97ee5c27}) [ 1824.045244] loop3: detected capacity change from 0 to 262144 04:45:44 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:45:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200005004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:45:44 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000}) [ 1824.080676] loop4: detected capacity change from 0 to 135266304 [ 1824.085384] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1824.086910] EXT4-fs (loop3): get root inode failed [ 1824.087528] EXT4-fs (loop3): mount failed [ 1824.110313] EXT4-fs: failed to create workqueue [ 1824.110933] EXT4-fs (loop7): mount failed [ 1824.147456] loop3: detected capacity change from 0 to 262144 [ 1824.174866] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1824.176378] EXT4-fs (loop3): get root inode failed [ 1824.176979] EXT4-fs (loop3): mount failed [ 1824.196354] FAULT_INJECTION: forcing a failure. [ 1824.196354] name failslab, interval 1, probability 0, space 0, times 0 [ 1824.199156] CPU: 0 PID: 17906 Comm: syz-executor.4 Not tainted 5.10.236 #1 [ 1824.200711] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1824.202583] Call Trace: [ 1824.203171] dump_stack+0x107/0x167 [ 1824.203995] should_fail.cold+0x5/0xa [ 1824.204879] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1824.206052] should_failslab+0x5/0x20 [ 1824.206912] __kmalloc_node+0x76/0x420 [ 1824.207826] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1824.208977] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 1824.210101] ? trace_hardirqs_on+0x5b/0x180 [ 1824.211084] kmem_cache_alloc_trace+0x169/0x320 [ 1824.212152] alloc_pipe_info+0x10a/0x590 [ 1824.213081] splice_direct_to_actor+0x774/0x980 [ 1824.214146] ? _cond_resched+0x10/0x30 [ 1824.215019] ? inode_security+0x107/0x140 [ 1824.215949] ? pipe_to_sendpage+0x380/0x380 [ 1824.216916] ? avc_policy_seqno+0x9/0x70 [ 1824.217823] ? selinux_file_permission+0x92/0x520 [ 1824.218923] ? do_splice_to+0x160/0x160 [ 1824.219823] ? security_file_permission+0xb1/0xe0 [ 1824.220914] do_splice_direct+0x1c4/0x290 [ 1824.221832] ? splice_direct_to_actor+0x980/0x980 [ 1824.222928] ? avc_policy_seqno+0x9/0x70 [ 1824.223884] ? security_file_permission+0xb1/0xe0 [ 1824.225001] do_sendfile+0x553/0x11e0 [ 1824.225869] ? do_pwritev+0x270/0x270 [ 1824.226743] ? wait_for_completion_io+0x270/0x270 [ 1824.227830] ? rcu_read_lock_any_held+0x75/0xa0 [ 1824.228878] ? vfs_write+0x354/0xb10 [ 1824.229727] __x64_sys_sendfile64+0x1d1/0x210 [ 1824.230736] ? __ia32_sys_sendfile+0x220/0x220 [ 1824.231781] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1824.232963] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1824.234157] do_syscall_64+0x33/0x40 [ 1824.234987] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1824.236155] RIP: 0033:0x7f8ff8133b19 [ 1824.236998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1824.241202] RSP: 002b:00007f8ff5688188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1824.242899] RAX: ffffffffffffffda RBX: 00007f8ff8247020 RCX: 00007f8ff8133b19 [ 1824.244534] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 1824.246175] RBP: 00007f8ff56881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1824.247779] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 1824.249398] R13: 00007ffeba1b08bf R14: 00007f8ff5688300 R15: 0000000000022000 04:45:59 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:45:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(0x0, r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:45:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) (fail_nth: 4) 04:45:59 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}) 04:45:59 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}) 04:45:59 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40018, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:45:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40068, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:45:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200006004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1839.221443] loop7: detected capacity change from 0 to 262144 [ 1839.250427] loop3: detected capacity change from 0 to 262144 [ 1839.269274] loop4: detected capacity change from 0 to 135266304 [ 1839.271268] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1839.275385] EXT4-fs (loop7): get root inode failed [ 1839.276106] EXT4-fs (loop7): mount failed [ 1839.310181] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1839.312936] EXT4-fs (loop3): get root inode failed [ 1839.314270] EXT4-fs (loop3): mount failed 04:45:59 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:45:59 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:45:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200007004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:45:59 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:45:59 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4001c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1839.400077] FAULT_INJECTION: forcing a failure. [ 1839.400077] name failslab, interval 1, probability 0, space 0, times 0 [ 1839.402951] CPU: 0 PID: 17946 Comm: syz-executor.4 Not tainted 5.10.236 #1 [ 1839.404575] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1839.406515] Call Trace: [ 1839.407139] dump_stack+0x107/0x167 [ 1839.408001] should_fail.cold+0x5/0xa [ 1839.408894] ? create_object.isra.0+0x3a/0xa20 [ 1839.409964] should_failslab+0x5/0x20 [ 1839.410857] kmem_cache_alloc+0x5b/0x310 [ 1839.411814] ? alloc_pipe_info+0x1e5/0x590 [ 1839.412807] create_object.isra.0+0x3a/0xa20 [ 1839.413831] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1839.415028] __kmalloc+0x16e/0x390 [ 1839.415875] alloc_pipe_info+0x1e5/0x590 [ 1839.416829] splice_direct_to_actor+0x774/0x980 [ 1839.417922] ? _cond_resched+0x10/0x30 [ 1839.418828] ? inode_security+0x107/0x140 [ 1839.419797] ? pipe_to_sendpage+0x380/0x380 [ 1839.420800] ? avc_policy_seqno+0x9/0x70 [ 1839.421743] ? selinux_file_permission+0x92/0x520 [ 1839.422865] ? do_splice_to+0x160/0x160 [ 1839.423797] ? security_file_permission+0xb1/0xe0 [ 1839.424930] do_splice_direct+0x1c4/0x290 [ 1839.425952] ? splice_direct_to_actor+0x980/0x980 [ 1839.427129] ? avc_policy_seqno+0x9/0x70 [ 1839.428149] ? security_file_permission+0xb1/0xe0 [ 1839.429340] do_sendfile+0x553/0x11e0 [ 1839.430262] ? do_pwritev+0x270/0x270 [ 1839.431155] ? wait_for_completion_io+0x270/0x270 [ 1839.432311] ? rcu_read_lock_any_held+0x75/0xa0 [ 1839.433387] ? vfs_write+0x354/0xb10 [ 1839.434258] __x64_sys_sendfile64+0x1d1/0x210 [ 1839.435305] ? __ia32_sys_sendfile+0x220/0x220 [ 1839.436387] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1839.437607] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1839.438813] do_syscall_64+0x33/0x40 [ 1839.439720] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1839.440919] RIP: 0033:0x7f8ff8133b19 [ 1839.441784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1839.446072] RSP: 002b:00007f8ff5688188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1839.447846] RAX: ffffffffffffffda RBX: 00007f8ff8247020 RCX: 00007f8ff8133b19 [ 1839.449501] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 1839.451170] RBP: 00007f8ff56881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1839.452838] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 1839.454501] R13: 00007ffeba1b08bf R14: 00007f8ff5688300 R15: 0000000000022000 04:45:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4006c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:45:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:45:59 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 04:45:59 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40066, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:00 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:46:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:46:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40074, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) (fail_nth: 5) 04:46:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200008004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:13 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:13 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:46:13 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:46:13 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) [ 1853.376714] loop4: detected capacity change from 0 to 135266304 [ 1853.395003] loop3: detected capacity change from 0 to 262144 [ 1853.407183] loop7: detected capacity change from 0 to 262656 04:46:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200018004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1853.463628] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1853.470403] FAULT_INJECTION: forcing a failure. [ 1853.470403] name failslab, interval 1, probability 0, space 0, times 0 [ 1853.473314] CPU: 0 PID: 17989 Comm: syz-executor.4 Not tainted 5.10.236 #1 [ 1853.474911] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1853.476817] Call Trace: [ 1853.477424] dump_stack+0x107/0x167 [ 1853.478266] should_fail.cold+0x5/0xa [ 1853.479146] ? alloc_pipe_info+0x1e5/0x590 [ 1853.480125] should_failslab+0x5/0x20 [ 1853.481003] __kmalloc+0x72/0x390 [ 1853.481806] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1853.482972] alloc_pipe_info+0x1e5/0x590 [ 1853.483915] splice_direct_to_actor+0x774/0x980 [ 1853.484991] ? _cond_resched+0x10/0x30 [ 1853.485880] ? inode_security+0x107/0x140 [ 1853.486830] ? pipe_to_sendpage+0x380/0x380 [ 1853.487826] ? avc_policy_seqno+0x9/0x70 [ 1853.488758] ? selinux_file_permission+0x92/0x520 [ 1853.489860] ? do_splice_to+0x160/0x160 [ 1853.490771] ? security_file_permission+0xb1/0xe0 [ 1853.491901] do_splice_direct+0x1c4/0x290 [ 1853.492851] ? splice_direct_to_actor+0x980/0x980 [ 1853.493945] ? avc_policy_seqno+0x9/0x70 [ 1853.494886] ? security_file_permission+0xb1/0xe0 [ 1853.496003] do_sendfile+0x553/0x11e0 [ 1853.496882] ? do_pwritev+0x270/0x270 [ 1853.497737] ? wait_for_completion_io+0x270/0x270 [ 1853.498821] ? rcu_read_lock_any_held+0x75/0xa0 [ 1853.499877] ? vfs_write+0x354/0xb10 [ 1853.500715] __x64_sys_sendfile64+0x1d1/0x210 [ 1853.501704] ? __ia32_sys_sendfile+0x220/0x220 [ 1853.502730] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1853.503903] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1853.505071] do_syscall_64+0x33/0x40 [ 1853.505905] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1853.507047] RIP: 0033:0x7f8ff8133b19 [ 1853.507913] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1853.512003] RSP: 002b:00007f8ff5688188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1853.513701] RAX: ffffffffffffffda RBX: 00007f8ff8247020 RCX: 00007f8ff8133b19 [ 1853.515317] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 1853.516915] RBP: 00007f8ff56881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1853.518506] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 1853.520098] R13: 00007ffeba1b08bf R14: 00007f8ff5688300 R15: 0000000000022000 [ 1853.522730] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1853.528474] EXT4-fs (loop7): get root inode failed [ 1853.529464] EXT4-fs (loop7): mount failed [ 1853.532114] EXT4-fs (loop3): get root inode failed [ 1853.533392] EXT4-fs (loop3): mount failed 04:46:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20001c004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:14 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:46:14 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x275cee97ffffffff}) 04:46:14 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x275cee97ffffffff}) [ 1853.586435] loop3: detected capacity change from 0 to 262144 [ 1853.607050] loop7: detected capacity change from 0 to 262656 [ 1853.607336] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1853.613082] EXT4-fs (loop3): get root inode failed [ 1853.614369] EXT4-fs (loop3): mount failed 04:46:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1853.654296] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1853.656788] EXT4-fs (loop7): get root inode failed [ 1853.657535] EXT4-fs (loop7): mount failed 04:46:14 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f420f0000000000}) 04:46:28 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f420f0000000000}) 04:46:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200066004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) (fail_nth: 6) 04:46:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4007a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:28 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:46:28 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40480, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:28 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}) 04:46:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1868.407985] loop4: detected capacity change from 0 to 135266304 [ 1868.419111] loop3: detected capacity change from 0 to 262144 [ 1868.438946] loop7: detected capacity change from 0 to 263168 [ 1868.462732] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1868.465054] EXT4-fs (loop3): get root inode failed [ 1868.465955] EXT4-fs (loop3): mount failed 04:46:28 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000000000000}) 04:46:28 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:46:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f0004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1868.494641] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1868.499205] EXT4-fs (loop7): get root inode failed [ 1868.500129] EXT4-fs (loop7): mount failed [ 1868.507785] FAULT_INJECTION: forcing a failure. [ 1868.507785] name failslab, interval 1, probability 0, space 0, times 0 [ 1868.509820] CPU: 0 PID: 18041 Comm: syz-executor.4 Not tainted 5.10.236 #1 [ 1868.510999] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1868.512405] Call Trace: [ 1868.512862] dump_stack+0x107/0x167 [ 1868.513493] should_fail.cold+0x5/0xa [ 1868.514149] ? create_object.isra.0+0x3a/0xa20 [ 1868.514928] should_failslab+0x5/0x20 [ 1868.515575] kmem_cache_alloc+0x5b/0x310 [ 1868.516292] create_object.isra.0+0x3a/0xa20 [ 1868.517043] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1868.517914] kmem_cache_alloc+0x159/0x310 [ 1868.518628] ? iov_iter_alignment+0x1b1/0x810 [ 1868.519399] do_blockdev_direct_IO+0x21b/0x43f0 [ 1868.520212] ? fat_add_cluster+0x100/0x100 [ 1868.520945] ? perf_trace_lock+0xac/0x490 [ 1868.521652] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1868.522555] ? lock_chain_count+0x20/0x20 [ 1868.523260] ? __lockdep_reset_lock+0x180/0x180 [ 1868.524062] ? __lock_acquire+0xbb1/0x5b00 [ 1868.524787] ? sb_init_dio_done_wq+0x80/0x80 [ 1868.525553] ? find_held_lock+0x2c/0x110 [ 1868.526269] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1868.527163] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1868.528056] ? trace_hardirqs_on+0x5b/0x180 [ 1868.528800] ? find_held_lock+0x2c/0x110 [ 1868.529526] ? rcu_read_lock_any_held+0x75/0xa0 [ 1868.530318] ? __blockdev_direct_IO+0x32/0x100 [ 1868.531096] ? fat_add_cluster+0x100/0x100 [ 1868.531830] fat_direct_IO+0x1d6/0x380 [ 1868.532502] generic_file_read_iter+0x259/0x490 [ 1868.533315] generic_file_splice_read+0x455/0x6d0 [ 1868.534140] ? pipe_to_user+0x170/0x170 [ 1868.534824] ? fsnotify_perm.part.0+0x22d/0x620 [ 1868.535625] ? security_file_permission+0xb1/0xe0 [ 1868.536464] ? pipe_to_user+0x170/0x170 [ 1868.537145] do_splice_to+0x10e/0x160 [ 1868.537794] splice_direct_to_actor+0x2fe/0x980 [ 1868.538591] ? pipe_to_sendpage+0x380/0x380 [ 1868.539340] ? do_splice_to+0x160/0x160 [ 1868.540073] ? security_file_permission+0xb1/0xe0 [ 1868.540901] do_splice_direct+0x1c4/0x290 [ 1868.541607] ? splice_direct_to_actor+0x980/0x980 [ 1868.542437] ? avc_policy_seqno+0x9/0x70 [ 1868.543142] ? security_file_permission+0xb1/0xe0 [ 1868.543996] do_sendfile+0x553/0x11e0 [ 1868.544659] ? do_pwritev+0x270/0x270 [ 1868.545308] ? wait_for_completion_io+0x270/0x270 [ 1868.546136] ? rcu_read_lock_any_held+0x75/0xa0 [ 1868.546927] ? vfs_write+0x354/0xb10 [ 1868.547565] __x64_sys_sendfile64+0x1d1/0x210 [ 1868.548347] ? __ia32_sys_sendfile+0x220/0x220 [ 1868.549129] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1868.550034] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1868.550924] do_syscall_64+0x33/0x40 [ 1868.551555] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1868.552437] RIP: 0033:0x7f8ff8133b19 [ 1868.553065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1868.556195] RSP: 002b:00007f8ff5688188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1868.557486] RAX: ffffffffffffffda RBX: 00007f8ff8247020 RCX: 00007f8ff8133b19 [ 1868.558706] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 1868.559930] RBP: 00007f8ff56881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1868.561139] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 1868.562347] R13: 00007ffeba1b08bf R14: 00007f8ff5688300 R15: 0000000000022000 04:46:28 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}) [ 1868.603253] loop3: detected capacity change from 0 to 262144 04:46:29 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) [ 1868.636705] loop7: detected capacity change from 0 to 263168 [ 1868.642842] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1868.644820] EXT4-fs (loop3): get root inode failed [ 1868.645576] EXT4-fs (loop3): mount failed [ 1868.651590] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1868.653640] EXT4-fs (loop7): get root inode failed [ 1868.654363] EXT4-fs (loop7): mount failed 04:46:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400d0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:46:29 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}) [ 1868.743080] loop3: detected capacity change from 0 to 262144 [ 1868.792063] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1868.806629] EXT4-fs (loop3): get root inode failed [ 1868.807829] EXT4-fs (loop3): mount failed [ 1868.840885] loop3: detected capacity change from 0 to 262144 [ 1868.873215] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1868.879870] EXT4-fs (loop3): get root inode failed [ 1868.881064] EXT4-fs (loop3): mount failed 04:46:43 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:46:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000034000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:43 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}) 04:46:43 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40500, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:43 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff97ee5c27}) 04:46:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) (fail_nth: 7) 04:46:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401f8, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1883.092013] loop3: detected capacity change from 0 to 262144 [ 1883.109502] loop7: detected capacity change from 0 to 263168 04:46:43 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 1883.121661] loop4: detected capacity change from 0 to 135266304 [ 1883.159733] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1883.163221] EXT4-fs (loop7): get root inode failed [ 1883.163939] EXT4-fs (loop7): mount failed [ 1883.173521] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1883.176419] EXT4-fs (loop3): get root inode failed [ 1883.177733] EXT4-fs (loop3): mount failed [ 1883.184883] loop7: detected capacity change from 0 to 263168 04:46:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200080044000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:43 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff97ee5c27}) [ 1883.211004] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1883.213012] EXT4-fs (loop7): get root inode failed [ 1883.213686] EXT4-fs (loop7): mount failed 04:46:43 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) [ 1883.230450] FAULT_INJECTION: forcing a failure. [ 1883.230450] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1883.233841] CPU: 0 PID: 18102 Comm: syz-executor.4 Not tainted 5.10.236 #1 [ 1883.235405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1883.237300] Call Trace: [ 1883.237906] dump_stack+0x107/0x167 [ 1883.238741] should_fail.cold+0x5/0xa [ 1883.239610] __alloc_pages_nodemask+0x182/0x600 [ 1883.240671] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1883.241700] ? rwsem_down_write_slowpath+0x512/0xc30 [ 1883.242825] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1883.244164] ? rwsem_mark_wake+0x9d0/0x9d0 [ 1883.245113] alloc_pages_current+0x187/0x280 04:46:43 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) [ 1883.246088] push_pipe+0x2b5/0x6d0 [ 1883.247032] iov_iter_get_pages+0x6b4/0xf40 [ 1883.248020] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1883.249100] ? iov_iter_npages+0x1fd/0xa70 [ 1883.250038] do_blockdev_direct_IO+0x2883/0x43f0 [ 1883.251091] ? fat_add_cluster+0x100/0x100 [ 1883.252077] ? sb_init_dio_done_wq+0x80/0x80 [ 1883.253064] ? find_held_lock+0x2c/0x110 [ 1883.253980] ? fat_add_cluster+0x100/0x100 [ 1883.254938] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1883.256103] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1883.257273] ? trace_hardirqs_on+0x5b/0x180 [ 1883.258230] ? find_held_lock+0x2c/0x110 [ 1883.259195] ? rcu_read_lock_any_held+0x75/0xa0 [ 1883.260240] ? __blockdev_direct_IO+0x32/0x100 [ 1883.261269] ? fat_add_cluster+0x100/0x100 [ 1883.262206] fat_direct_IO+0x1d6/0x380 [ 1883.263088] generic_file_read_iter+0x259/0x490 [ 1883.264147] generic_file_splice_read+0x455/0x6d0 [ 1883.265220] ? pipe_to_user+0x170/0x170 [ 1883.266117] ? fsnotify_perm.part.0+0x22d/0x620 [ 1883.267161] ? security_file_permission+0xb1/0xe0 [ 1883.268244] ? pipe_to_user+0x170/0x170 [ 1883.269147] do_splice_to+0x10e/0x160 [ 1883.269993] splice_direct_to_actor+0x2fe/0x980 [ 1883.271050] ? pipe_to_sendpage+0x380/0x380 [ 1883.272028] ? do_splice_to+0x160/0x160 [ 1883.272918] ? security_file_permission+0xb1/0xe0 [ 1883.274011] do_splice_direct+0x1c4/0x290 [ 1883.274943] ? splice_direct_to_actor+0x980/0x980 [ 1883.276044] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1883.277277] ? do_sendfile+0xd64/0x11e0 [ 1883.278184] do_sendfile+0x553/0x11e0 [ 1883.279067] ? do_pwritev+0x270/0x270 [ 1883.279940] ? wait_for_completion_io+0x270/0x270 [ 1883.281034] ? rcu_read_lock_any_held+0x75/0xa0 [ 1883.282083] ? vfs_write+0x354/0xb10 [ 1883.282931] __x64_sys_sendfile64+0x1d1/0x210 [ 1883.283956] ? __ia32_sys_sendfile+0x220/0x220 [ 1883.284997] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1883.286182] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1883.287352] do_syscall_64+0x33/0x40 [ 1883.288190] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1883.289359] RIP: 0033:0x7f8ff8133b19 [ 1883.290207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1883.294414] RSP: 002b:00007f8ff5688188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1883.296151] RAX: ffffffffffffffda RBX: 00007f8ff8247020 RCX: 00007f8ff8133b19 [ 1883.297769] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 1883.299382] RBP: 00007f8ff56881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1883.301055] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 1883.302666] R13: 00007ffeba1b08bf R14: 00007f8ff5688300 R15: 0000000000022000 [ 1883.335036] loop3: detected capacity change from 0 to 262144 [ 1883.357111] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1883.358717] EXT4-fs (loop3): get root inode failed [ 1883.359294] EXT4-fs (loop3): mount failed 04:46:57 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:46:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) (fail_nth: 8) 04:46:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:57 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 04:46:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000054000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, 0x0, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:46:57 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40600, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:57 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0}) [ 1897.492282] loop7: detected capacity change from 0 to 263680 [ 1897.528446] loop4: detected capacity change from 0 to 135266304 [ 1897.554381] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1897.557702] loop3: detected capacity change from 0 to 262656 [ 1897.558450] EXT4-fs (loop7): get root inode failed [ 1897.559976] EXT4-fs (loop7): mount failed 04:46:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, 0x0, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:46:58 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:46:58 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) [ 1897.586759] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1897.589542] EXT4-fs (loop3): get root inode failed [ 1897.590273] EXT4-fs (loop3): mount failed 04:46:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000064000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:58 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) [ 1897.605851] loop7: detected capacity change from 0 to 263680 [ 1897.633216] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1897.640790] loop3: detected capacity change from 0 to 262656 [ 1897.643345] EXT4-fs (loop7): get root inode failed [ 1897.644478] EXT4-fs (loop7): mount failed [ 1897.680222] FAULT_INJECTION: forcing a failure. [ 1897.680222] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1897.682161] CPU: 0 PID: 18150 Comm: syz-executor.4 Not tainted 5.10.236 #1 [ 1897.683161] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1897.684369] Call Trace: [ 1897.684760] dump_stack+0x107/0x167 [ 1897.685293] should_fail.cold+0x5/0xa [ 1897.685855] __alloc_pages_nodemask+0x182/0x600 [ 1897.686535] ? mark_held_locks+0x9e/0xe0 [ 1897.687118] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1897.688002] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1897.688729] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1897.689530] alloc_pages_current+0x187/0x280 [ 1897.690167] ? __sanitizer_cov_trace_pc+0x30/0x60 [ 1897.690872] push_pipe+0x2b5/0x6d0 [ 1897.691391] iov_iter_get_pages+0x6b4/0xf40 [ 1897.692039] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1897.692759] ? iov_iter_npages+0x1fd/0xa70 [ 1897.693387] do_blockdev_direct_IO+0x2883/0x43f0 [ 1897.694084] ? fat_add_cluster+0x100/0x100 [ 1897.694722] ? sb_init_dio_done_wq+0x80/0x80 [ 1897.695373] ? find_held_lock+0x2c/0x110 [ 1897.695978] ? fat_add_cluster+0x100/0x100 [ 1897.696612] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1897.697380] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1897.698127] ? trace_hardirqs_on+0x5b/0x180 [ 1897.698737] ? find_held_lock+0x2c/0x110 [ 1897.699355] ? rcu_read_lock_any_held+0x75/0xa0 [ 1897.700040] ? __blockdev_direct_IO+0x32/0x100 [ 1897.700704] ? fat_add_cluster+0x100/0x100 [ 1897.701301] fat_direct_IO+0x1d6/0x380 [ 1897.701881] generic_file_read_iter+0x259/0x490 [ 1897.702571] generic_file_splice_read+0x455/0x6d0 [ 1897.703280] ? pipe_to_user+0x170/0x170 [ 1897.703866] ? fsnotify_perm.part.0+0x22d/0x620 [ 1897.704559] ? security_file_permission+0xb1/0xe0 [ 1897.705266] ? pipe_to_user+0x170/0x170 [ 1897.705848] do_splice_to+0x10e/0x160 [ 1897.706408] splice_direct_to_actor+0x2fe/0x980 [ 1897.707092] ? pipe_to_sendpage+0x380/0x380 [ 1897.707724] ? do_splice_to+0x160/0x160 [ 1897.708316] ? security_file_permission+0xb1/0xe0 [ 1897.709049] do_splice_direct+0x1c4/0x290 [ 1897.709669] ? splice_direct_to_actor+0x980/0x980 [ 1897.710392] ? avc_policy_seqno+0x9/0x70 [ 1897.711003] ? security_file_permission+0xb1/0xe0 [ 1897.711737] do_sendfile+0x553/0x11e0 [ 1897.712324] ? do_pwritev+0x270/0x270 [ 1897.712896] ? wait_for_completion_io+0x270/0x270 [ 1897.713619] ? rcu_read_lock_any_held+0x75/0xa0 [ 1897.714316] ? vfs_write+0x354/0xb10 [ 1897.714873] __x64_sys_sendfile64+0x1d1/0x210 [ 1897.715551] ? __ia32_sys_sendfile+0x220/0x220 [ 1897.716245] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1897.717031] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1897.717807] do_syscall_64+0x33/0x40 [ 1897.718362] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1897.719134] RIP: 0033:0x7f8ff8133b19 [ 1897.719690] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1897.722460] RSP: 002b:00007f8ff5688188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1897.723524] RAX: ffffffffffffffda RBX: 00007f8ff8247020 RCX: 00007f8ff8133b19 [ 1897.724518] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 1897.725515] RBP: 00007f8ff56881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1897.726534] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 1897.727607] R13: 00007ffeba1b08bf R14: 00007f8ff5688300 R15: 0000000000022000 [ 1897.732887] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1897.735213] EXT4-fs (loop3): get root inode failed [ 1897.736014] EXT4-fs (loop3): mount failed 04:46:58 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:46:58 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:46:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, 0x0, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:46:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000074000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:46:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40410, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1897.901301] loop3: detected capacity change from 0 to 263168 [ 1897.926589] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1897.930212] EXT4-fs (loop3): get root inode failed [ 1897.930838] EXT4-fs (loop3): mount failed [ 1897.952689] loop3: detected capacity change from 0 to 263168 [ 1897.958896] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1897.960352] EXT4-fs (loop3): get root inode failed [ 1897.960994] EXT4-fs (loop3): mount failed 04:47:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40700, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:47:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:47:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) (fail_nth: 9) 04:47:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40500, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:47:16 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}) 04:47:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000184000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:47:16 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:47:16 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}) [ 1916.189972] loop4: detected capacity change from 0 to 135266304 [ 1916.214464] loop7: detected capacity change from 0 to 263680 [ 1916.225742] loop3: detected capacity change from 0 to 263168 04:47:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000001c4000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1916.254596] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1916.257484] EXT4-fs (loop3): get root inode failed [ 1916.258884] EXT4-fs (loop3): mount failed [ 1916.290889] loop3: detected capacity change from 0 to 263168 [ 1916.292811] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 04:47:16 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf423f}) 04:47:16 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 1916.314950] EXT4-fs (loop7): get root inode failed [ 1916.315947] EXT4-fs (loop7): mount failed 04:47:16 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000}) [ 1916.343807] FAULT_INJECTION: forcing a failure. [ 1916.343807] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1916.347062] CPU: 1 PID: 18214 Comm: syz-executor.4 Not tainted 5.10.236 #1 [ 1916.348664] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1916.350560] Call Trace: [ 1916.351170] dump_stack+0x107/0x167 [ 1916.352014] should_fail.cold+0x5/0xa [ 1916.352905] __alloc_pages_nodemask+0x182/0x600 [ 1916.353991] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1916.355027] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1916.356427] ? rwsem_mark_wake+0x9d0/0x9d0 [ 1916.357402] alloc_pages_current+0x187/0x280 [ 1916.358416] push_pipe+0x2b5/0x6d0 [ 1916.359244] iov_iter_get_pages+0x6b4/0xf40 [ 1916.360238] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1916.361354] ? iov_iter_npages+0x1fd/0xa70 [ 1916.362328] do_blockdev_direct_IO+0x2883/0x43f0 [ 1916.363425] ? fat_add_cluster+0x100/0x100 [ 1916.364413] ? sb_init_dio_done_wq+0x80/0x80 [ 1916.365435] ? find_held_lock+0x2c/0x110 [ 1916.366378] ? fat_add_cluster+0x100/0x100 [ 1916.367369] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1916.368588] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1916.369753] ? trace_hardirqs_on+0x5b/0x180 [ 1916.370725] ? find_held_lock+0x2c/0x110 [ 1916.371691] ? rcu_read_lock_any_held+0x75/0xa0 [ 1916.372740] ? __blockdev_direct_IO+0x32/0x100 [ 1916.373768] ? fat_add_cluster+0x100/0x100 [ 1916.374729] fat_direct_IO+0x1d6/0x380 [ 1916.375638] generic_file_read_iter+0x259/0x490 [ 1916.376708] generic_file_splice_read+0x455/0x6d0 [ 1916.377818] ? pipe_to_user+0x170/0x170 [ 1916.378730] ? fsnotify_perm.part.0+0x22d/0x620 [ 1916.379764] ? security_file_permission+0xb1/0xe0 [ 1916.380877] ? pipe_to_user+0x170/0x170 [ 1916.381799] do_splice_to+0x10e/0x160 [ 1916.382679] splice_direct_to_actor+0x2fe/0x980 [ 1916.383733] ? pipe_to_sendpage+0x380/0x380 [ 1916.384728] ? do_splice_to+0x160/0x160 [ 1916.385643] ? security_file_permission+0xb1/0xe0 [ 1916.386748] do_splice_direct+0x1c4/0x290 [ 1916.387698] ? splice_direct_to_actor+0x980/0x980 [ 1916.388820] ? avc_policy_seqno+0x9/0x70 [ 1916.389770] ? security_file_permission+0xb1/0xe0 [ 1916.390895] do_sendfile+0x553/0x11e0 [ 1916.391786] ? do_pwritev+0x270/0x270 [ 1916.392672] ? wait_for_completion_io+0x270/0x270 [ 1916.393783] ? rcu_read_lock_any_held+0x75/0xa0 [ 1916.394850] ? vfs_write+0x354/0xb10 [ 1916.395713] __x64_sys_sendfile64+0x1d1/0x210 [ 1916.396741] ? __ia32_sys_sendfile+0x220/0x220 [ 1916.397798] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1916.398992] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1916.400192] do_syscall_64+0x33/0x40 [ 1916.401052] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1916.402232] RIP: 0033:0x7f8ff8133b19 [ 1916.403087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.407335] RSP: 002b:00007f8ff5688188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1916.409098] RAX: ffffffffffffffda RBX: 00007f8ff8247020 RCX: 00007f8ff8133b19 [ 1916.410740] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 1916.412392] RBP: 00007f8ff56881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1916.414041] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 1916.415686] R13: 00007ffeba1b08bf R14: 00007f8ff5688300 R15: 0000000000022000 [ 1916.420787] EXT4-fs: failed to create workqueue [ 1916.421768] EXT4-fs (loop3): mount failed 04:47:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:47:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000204000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:47:16 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 1916.504174] loop7: detected capacity change from 0 to 263680 [ 1916.518767] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1916.529647] EXT4-fs (loop7): get root inode failed [ 1916.530745] EXT4-fs (loop7): mount failed 04:47:17 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:47:17 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40b00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:47:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40600, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1916.730442] loop7: detected capacity change from 0 to 264704 [ 1916.745424] loop3: detected capacity change from 0 to 263680 [ 1916.755234] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1916.757259] EXT4-fs (loop7): get root inode failed [ 1916.758159] EXT4-fs (loop7): mount failed [ 1916.774156] loop7: detected capacity change from 0 to 264704 [ 1916.780256] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1916.783597] EXT4-fs (loop3): get root inode failed [ 1916.784843] EXT4-fs (loop3): mount failed [ 1916.797768] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1916.799974] EXT4-fs (loop7): get root inode failed [ 1916.800743] EXT4-fs (loop7): mount failed [ 1916.829008] loop3: detected capacity change from 0 to 263680 [ 1916.862654] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1916.869193] EXT4-fs (loop3): get root inode failed [ 1916.870396] EXT4-fs (loop3): mount failed 04:47:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) (fail_nth: 10) 04:47:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000003f4000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:47:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40700, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:47:31 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf423f}) 04:47:31 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}) 04:47:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1931.241416] loop4: detected capacity change from 0 to 135266304 04:47:31 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:47:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41800, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1931.259143] loop3: detected capacity change from 0 to 263680 [ 1931.280796] loop7: detected capacity change from 0 to 268288 04:47:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000664000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1931.285250] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1931.290792] EXT4-fs (loop3): get root inode failed [ 1931.292083] EXT4-fs (loop3): mount failed 04:47:31 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 1931.349174] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1931.366096] EXT4-fs (loop7): get root inode failed [ 1931.367335] EXT4-fs (loop7): mount failed [ 1931.369433] loop3: detected capacity change from 0 to 263680 04:47:31 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:47:31 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) [ 1931.413232] FAULT_INJECTION: forcing a failure. [ 1931.413232] name failslab, interval 1, probability 0, space 0, times 0 [ 1931.416100] CPU: 0 PID: 18278 Comm: syz-executor.4 Not tainted 5.10.236 #1 [ 1931.417330] loop7: detected capacity change from 0 to 268288 [ 1931.417707] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1931.417745] Call Trace: [ 1931.421620] dump_stack+0x107/0x167 [ 1931.422467] should_fail.cold+0x5/0xa [ 1931.423316] ? create_object.isra.0+0x3a/0xa20 [ 1931.424379] should_failslab+0x5/0x20 [ 1931.425261] kmem_cache_alloc+0x5b/0x310 [ 1931.426208] create_object.isra.0+0x3a/0xa20 [ 1931.427223] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1931.428414] kmem_cache_alloc+0x159/0x310 [ 1931.429381] ? mempool_free_pages+0x20/0x20 [ 1931.430380] mempool_alloc+0x148/0x360 [ 1931.431290] ? mempool_resize+0x7d0/0x7d0 [ 1931.432256] ? mempool_resize+0x7d0/0x7d0 [ 1931.433230] ? mark_lock+0xf5/0x2df0 [ 1931.434104] bvec_alloc+0xd8/0x2f0 [ 1931.434934] bio_alloc_bioset+0x40a/0x600 [ 1931.435899] ? bvec_alloc+0x2f0/0x2f0 [ 1931.436794] ? perf_trace_lock+0xac/0x490 [ 1931.437750] ? SOFTIRQ_verbose+0x10/0x10 [ 1931.438696] mpage_alloc+0x2f/0x260 [ 1931.439543] __mpage_writepage+0x114e/0x1670 [ 1931.440592] ? clean_buffers+0x2a0/0x2a0 [ 1931.441540] ? find_get_pages_range_tag+0x5c9/0xbf0 [ 1931.442695] ? page_mkclean+0x151/0x2c0 [ 1931.443612] ? invalid_page_referenced_vma+0x570/0x570 [ 1931.444821] ? find_get_pages_contig+0x9c0/0x9c0 [ 1931.445916] ? mark_held_locks+0x9e/0xe0 [ 1931.446856] ? percpu_counter_add_batch+0x8b/0x140 [ 1931.447992] ? clear_page_dirty_for_io+0x216/0x7c0 [ 1931.449132] write_cache_pages+0x57f/0xe50 [ 1931.450113] ? clean_buffers+0x2a0/0x2a0 [ 1931.451060] ? clear_page_dirty_for_io+0x7c0/0x7c0 [ 1931.452190] ? perf_trace_lock+0xac/0x490 [ 1931.453150] ? SOFTIRQ_verbose+0x10/0x10 [ 1931.454103] ? lock_acquire+0x197/0x470 [ 1931.455017] ? find_held_lock+0x2c/0x110 [ 1931.455957] ? fat_add_cluster+0x100/0x100 [ 1931.456934] ? fat_readahead+0x20/0x20 [ 1931.457826] mpage_writepages+0xd8/0x230 [ 1931.458757] ? mpage_end_io+0x2c0/0x2c0 [ 1931.459673] ? fat_add_cluster+0x100/0x100 [ 1931.460653] ? entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1931.461887] ? __is_insn_slot_addr+0x14c/0x290 [ 1931.462945] ? kernel_text_address+0xf2/0x120 [ 1931.463983] do_writepages+0xee/0x2a0 [ 1931.464876] ? page_writeback_cpu_online+0x20/0x20 [ 1931.466018] ? stack_trace_save+0x8c/0xc0 [ 1931.466976] ? stack_trace_consume_entry+0x160/0x160 [ 1931.468145] __filemap_fdatawrite_range+0x24b/0x2f0 [ 1931.469310] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1931.470531] ? kasan_save_stack+0x32/0x40 [ 1931.471489] ? do_sendfile+0x553/0x11e0 [ 1931.472420] ? __x64_sys_sendfile64+0x1d1/0x210 [ 1931.473485] ? do_syscall_64+0x33/0x40 [ 1931.474377] ? entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1931.475597] ? perf_trace_lock+0xac/0x490 [ 1931.476553] ? lock_chain_count+0x20/0x20 [ 1931.477516] filemap_write_and_wait_range+0x65/0x100 [ 1931.478686] generic_file_read_iter+0x359/0x490 [ 1931.479765] generic_file_splice_read+0x455/0x6d0 [ 1931.480885] ? pipe_to_user+0x170/0x170 [ 1931.481816] ? fsnotify_perm.part.0+0x22d/0x620 [ 1931.482870] ? security_file_permission+0xb1/0xe0 [ 1931.483957] ? pipe_to_user+0x170/0x170 [ 1931.484875] do_splice_to+0x10e/0x160 [ 1931.485774] splice_direct_to_actor+0x2fe/0x980 [ 1931.486843] ? pipe_to_sendpage+0x380/0x380 [ 1931.487815] ? do_splice_to+0x160/0x160 [ 1931.488714] ? security_file_permission+0xb1/0xe0 [ 1931.489803] do_splice_direct+0x1c4/0x290 [ 1931.490739] ? splice_direct_to_actor+0x980/0x980 [ 1931.491813] ? avc_policy_seqno+0x9/0x70 [ 1931.492738] ? security_file_permission+0xb1/0xe0 [ 1931.493835] do_sendfile+0x553/0x11e0 [ 1931.494706] ? do_pwritev+0x270/0x270 [ 1931.495564] ? wait_for_completion_io+0x270/0x270 [ 1931.496658] ? rcu_read_lock_any_held+0x75/0xa0 [ 1931.497695] ? vfs_write+0x354/0xb10 [ 1931.498536] __x64_sys_sendfile64+0x1d1/0x210 [ 1931.499541] ? __ia32_sys_sendfile+0x220/0x220 [ 1931.500582] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1931.501755] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1931.502914] do_syscall_64+0x33/0x40 [ 1931.503752] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1931.504935] RIP: 0033:0x7f8ff8133b19 [ 1931.505768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1931.509912] RSP: 002b:00007f8ff5688188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1931.511634] RAX: ffffffffffffffda RBX: 00007f8ff8247020 RCX: 00007f8ff8133b19 [ 1931.513246] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 1931.514839] RBP: 00007f8ff56881d0 R08: 0000000000000000 R09: 0000000000000000 [ 1931.516448] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 1931.518045] R13: 00007ffeba1b08bf R14: 00007f8ff5688300 R15: 0000000000022000 [ 1931.533403] EXT4-fs: failed to create workqueue [ 1931.534555] EXT4-fs (loop7): mount failed 04:47:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0), 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1931.538899] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1931.575580] EXT4-fs (loop3): get root inode failed [ 1931.576799] EXT4-fs (loop3): mount failed 04:47:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200004804000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:47:32 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x275cee97}) 04:47:32 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:47:52 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:47:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 04:47:52 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x275cee97}) 04:47:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41c00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:47:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000f04000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:47:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40900, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:47:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0), 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:47:52 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}) [ 1951.733276] loop4: detected capacity change from 0 to 135266304 [ 1951.758860] loop3: detected capacity change from 0 to 264192 [ 1951.785644] loop7: detected capacity change from 0 to 269312 [ 1951.803210] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1951.806098] EXT4-fs (loop3): get root inode failed [ 1951.807404] EXT4-fs (loop3): mount failed 04:47:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0), 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:47:52 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f420f00}) 04:47:52 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}) 04:47:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000024000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1951.859040] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1951.865970] EXT4-fs (loop7): get root inode failed [ 1951.866723] EXT4-fs (loop7): mount failed 04:47:52 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f420f00}) 04:47:52 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) [ 1951.909146] loop3: detected capacity change from 0 to 264192 [ 1951.924977] loop7: detected capacity change from 0 to 269312 [ 1951.935997] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1951.937974] EXT4-fs (loop7): get root inode failed [ 1951.938869] EXT4-fs (loop7): mount failed [ 1951.948231] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1951.950398] EXT4-fs (loop3): get root inode failed [ 1951.951218] EXT4-fs (loop3): mount failed 04:47:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1952.065022] loop7: detected capacity change from 0 to 270336 [ 1952.087671] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1952.089332] EXT4-fs (loop7): get root inode failed [ 1952.090258] EXT4-fs (loop7): mount failed [ 1952.104696] loop7: detected capacity change from 0 to 270336 [ 1952.122046] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1952.124116] EXT4-fs (loop7): get root inode failed [ 1952.125249] EXT4-fs (loop7): mount failed 04:48:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000002) 04:48:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000034000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:48:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x43f00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:48:06 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) 04:48:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:48:06 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:48:06 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) 04:48:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40a00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1966.238883] loop4: detected capacity change from 0 to 135266304 [ 1966.248516] loop3: detected capacity change from 0 to 264704 [ 1966.256753] loop7: detected capacity change from 0 to 278016 [ 1966.280679] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1966.282119] EXT4-fs (loop3): get root inode failed [ 1966.282741] EXT4-fs (loop3): mount failed 04:48:06 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97ee5c27}) 04:48:06 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97ee5c27}) [ 1966.305759] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1966.310921] EXT4-fs (loop7): get root inode failed [ 1966.311799] EXT4-fs (loop7): mount failed [ 1966.316149] loop3: detected capacity change from 0 to 264704 04:48:06 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 04:48:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000044000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1966.361417] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1966.363029] EXT4-fs (loop3): get root inode failed [ 1966.363819] EXT4-fs (loop3): mount failed [ 1966.368213] loop7: detected capacity change from 0 to 278016 04:48:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:48:06 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) [ 1966.418650] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1966.420600] EXT4-fs (loop7): get root inode failed [ 1966.421223] EXT4-fs (loop7): mount failed 04:48:06 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000}) 04:48:06 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}) 04:48:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000003) 04:48:24 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:48:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000054000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:48:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40b00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:48:24 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:48:24 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x46600, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:48:24 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}) 04:48:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 1984.514413] loop3: detected capacity change from 0 to 264704 [ 1984.539070] loop7: detected capacity change from 0 to 288256 [ 1984.550868] loop4: detected capacity change from 0 to 135266304 [ 1984.551066] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1984.556124] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1984.558381] EXT4-fs (loop7): get root inode failed [ 1984.559196] EXT4-fs (loop7): mount failed [ 1984.568378] EXT4-fs (loop3): get root inode failed [ 1984.569748] EXT4-fs (loop3): mount failed 04:48:25 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:48:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000064000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:48:25 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) [ 1984.600393] loop7: detected capacity change from 0 to 288256 [ 1984.614381] loop3: detected capacity change from 0 to 264704 04:48:25 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) [ 1984.652760] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1984.663685] EXT4-fs (loop7): get root inode failed [ 1984.664931] EXT4-fs (loop7): mount failed [ 1984.676593] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1984.680700] EXT4-fs (loop3): get root inode failed [ 1984.682026] EXT4-fs (loop3): mount failed 04:48:25 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:48:25 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:48:25 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:48:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000074000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:48:39 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x275cee97ffffffff}) [ 1998.585758] loop3: detected capacity change from 0 to 265216 04:48:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000004) 04:48:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000084000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:48:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40c00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:48:39 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x275cee97ffffffff}) 04:48:39 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:48:39 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x48004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:48:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:48:39 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) [ 1998.619519] loop4: detected capacity change from 0 to 135266304 [ 1998.623080] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1998.624866] EXT4-fs (loop3): get root inode failed [ 1998.625472] EXT4-fs (loop3): mount failed [ 1998.641744] loop7: detected capacity change from 0 to 294912 [ 1998.648790] loop3: detected capacity change from 0 to 265216 [ 1998.673138] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1998.674703] EXT4-fs (loop3): get root inode failed [ 1998.675289] EXT4-fs (loop3): mount failed [ 1998.692881] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 04:48:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40d00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1998.712361] EXT4-fs (loop7): get root inode failed [ 1998.713640] EXT4-fs (loop7): mount failed 04:48:39 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f420f0000000000}) 04:48:39 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f420f0000000000}) 04:48:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:48:39 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:48:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000184000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 1998.807119] loop7: detected capacity change from 0 to 294912 [ 1998.835465] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 1998.837307] EXT4-fs (loop7): get root inode failed [ 1998.837927] EXT4-fs (loop7): mount failed 04:48:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40f00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:48:39 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}) [ 1998.956819] loop3: detected capacity change from 0 to 265728 [ 1998.983067] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1998.985236] EXT4-fs (loop3): get root inode failed [ 1998.985863] EXT4-fs (loop3): mount failed [ 1999.000705] loop3: detected capacity change from 0 to 265728 [ 1999.012007] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 1999.013767] EXT4-fs (loop3): get root inode failed [ 1999.014349] EXT4-fs (loop3): mount failed 04:48:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000005) 04:48:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:48:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 04:48:56 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) 04:48:56 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8800000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:48:56 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}) 04:48:56 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}) 04:48:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000001c4000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:48:56 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:48:56 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000000000000}) [ 2016.352448] loop4: detected capacity change from 0 to 135266304 [ 2016.361776] loop7: detected capacity change from 0 to 135266304 04:48:56 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff97ee5c27}) [ 2016.399047] loop3: detected capacity change from 0 to 266240 [ 2016.400510] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 2016.415178] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2016.416947] EXT4-fs (loop3): get root inode failed [ 2016.417702] EXT4-fs (loop3): mount failed [ 2016.424306] EXT4-fs (loop7): get root inode failed [ 2016.425579] EXT4-fs (loop7): mount failed [ 2016.490336] loop7: detected capacity change from 0 to 135266304 [ 2016.505945] loop3: detected capacity change from 0 to 266240 04:48:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000664000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 2016.540465] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2016.550886] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 04:48:57 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 04:48:57 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:48:57 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}) [ 2016.555716] EXT4-fs (loop7): get root inode failed [ 2016.557481] EXT4-fs (loop7): mount failed [ 2016.567672] EXT4-fs (loop3): get root inode failed [ 2016.569094] EXT4-fs (loop3): mount failed 04:48:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 04:49:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 04:49:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000000200003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:49:18 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:49:18 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:49:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000006) 04:49:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) [ 2033.811863] loop7: detected capacity change from 0 to 135266304 04:49:18 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff97ee5c27}) 04:49:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41020, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 2033.854962] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 2033.856883] EXT4-fs (loop7): get root inode failed [ 2033.857460] EXT4-fs (loop7): mount failed [ 2033.866061] loop4: detected capacity change from 0 to 135266304 04:49:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000001000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:49:40 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 04:49:40 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) 04:49:40 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) [ 2033.918373] loop3: detected capacity change from 0 to 266240 [ 2033.931708] loop7: detected capacity change from 0 to 135266304 [ 2033.963976] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2033.965466] EXT4-fs (loop3): get root inode failed [ 2033.966139] EXT4-fs (loop3): mount failed [ 2033.973146] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 2033.975950] EXT4-fs (loop7): get root inode failed [ 2033.976604] EXT4-fs (loop7): mount failed 04:50:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000002000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 2034.013726] loop3: detected capacity change from 0 to 266240 06:23:54 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0}) [ 2034.062538] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2034.069580] EXT4-fs (loop3): get root inode failed [ 2034.070281] EXT4-fs (loop3): mount failed 06:31:07 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 06:31:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004002000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 06:31:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000007) 06:31:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41100, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 06:31:07 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 06:31:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 06:31:07 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}) 06:31:07 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 08:04:59 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) [ 2051.203944] loop3: detected capacity change from 0 to 266240 [ 2051.209057] loop7: detected capacity change from 0 to 262144 [ 2051.227341] loop4: detected capacity change from 0 to 135266304 [ 2051.264372] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 2051.267327] EXT4-fs (loop7): get root inode failed [ 2051.268562] EXT4-fs (loop7): mount failed [ 2051.297430] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2051.303348] EXT4-fs (loop3): get root inode failed [ 2051.304597] EXT4-fs (loop3): mount failed 17:11:07 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}) 02:17:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004003000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 02:17:15 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf423f}) [ 2051.372093] loop7: detected capacity change from 0 to 262144 02:17:15 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000}) [ 2051.408305] loop3: detected capacity change from 0 to 266240 [ 2051.413271] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: special inode unallocated [ 2051.428704] EXT4-fs (loop7): get root inode failed [ 2051.429911] EXT4-fs (loop7): mount failed 11:25:29 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf423f}) 11:25:29 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) [ 2051.465867] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2051.487629] EXT4-fs (loop3): get root inode failed [ 2051.488748] EXT4-fs (loop3): mount failed 14:58:48 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 14:58:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 14:58:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004004000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 23:39:38 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 23:39:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 23:39:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000008) 23:39:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x418c3, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 23:39:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 23:39:38 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}) 23:39:38 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}) 23:39:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004005000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 01:41:14 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 2070.276252] loop7: detected capacity change from 0 to 262144 [ 2070.302919] loop3: detected capacity change from 0 to 268288 [ 2070.321694] loop4: detected capacity change from 0 to 135266304 [ 2070.327954] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 2070.334925] EXT4-fs (loop7): get root inode failed [ 2070.336324] EXT4-fs (loop7): mount failed 01:41:14 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) [ 2070.366203] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2070.386772] EXT4-fs (loop3): get root inode failed [ 2070.387877] EXT4-fs (loop3): mount failed 01:41:14 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) 01:41:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004006000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) [ 2070.447334] loop3: detected capacity change from 0 to 268288 [ 2070.519176] EXT4-fs: failed to create workqueue [ 2070.520388] EXT4-fs (loop3): mount failed [ 2073.482789] kauditd_printk_skb: 4 callbacks suppressed [ 2073.482805] audit: type=1107 audit(2622587581.962:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='avc: denied { stop } for auid=n/a uid=0 gid=0 path="/lib/systemd/system/rsyslog.service" cmdline="" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=service permissive=1 [ 2073.482805] exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' 00:33:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 00:33:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004007000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 00:33:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0xa2) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000009) [ 2087.572993] loop4: detected capacity change from 0 to 135266304 [ 2087.590266] loop3: detected capacity change from 0 to 268288 00:33:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x418c4, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) 00:33:16 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x275cee97}) 00:33:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 00:33:16 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x275cee97}) 00:33:16 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}) [ 2087.603210] loop7: detected capacity change from 0 to 262144 [ 2087.608891] vfat filesystem being mounted at /syzkaller-testdir316439882/syzkaller.8IsTZ8/152/file0 supports timestamps until 2107-12-31 (0x10391447e) 04:20:56 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:20:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004008000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 04:20:56 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}) [ 2087.655273] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 2087.671328] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2087.673178] EXT4-fs (loop7): get root inode failed [ 2087.674004] EXT4-fs (loop7): mount failed [ 2087.680763] EXT4-fs (loop3): get root inode failed [ 2087.681691] EXT4-fs (loop3): mount failed [ 2087.737183] loop7: detected capacity change from 0 to 262144 07:54:14 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}) [ 2087.757612] loop3: detected capacity change from 0 to 268288 [ 2087.776405] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 07:54:14 executing program 5: clock_adjtime(0x0, &(0x7f0000000200)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}) [ 2087.778613] EXT4-fs (loop7): get root inode failed [ 2087.779622] EXT4-fs (loop7): mount failed [ 2087.794411] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2087.797172] EXT4-fs (loop3): get root inode failed [ 2087.797957] EXT4-fs (loop3): mount failed 07:54:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004018000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90681e87895cca0b2b5db0ec617a507e65d00b83256a2887776a", 0x82, 0x4200}], 0x0, &(0x7f0000013a00)) 09:40:53 executing program 6: clock_adjtime(0x0, &(0x7f0000000200)={0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f420f00}) 09:40:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c", 0x33}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x43, 0x6a08, 0x8) r3 = accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, &(0x7f00000009c0)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a80)={0xfe, [], 0x0, "043ba9ba70070b"}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) lseek(r3, 0x6, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r4, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYRES16=r5, @ANYBLOB="87ce2abd7015ffdbdf250100010008"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x7}}, './file1\x00'}) 09:40:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0c7ae737fbcb265c201d794f6000e598316dafa22c262f9476d040b808131f925f1a87d000000001dc138411163fc061505c465e0b77fdf9833700c9737359a90", 0x69, 0x4200}], 0x0, &(0x7f0000013a00)) 09:40:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x418c5, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f00000026c0)="ed41000000100000d4f4655fd5f4000800e09e4e3fda9eb79cf47795982bbec5d5ff447cef2360d2d0", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)) [ 2088.022874] loop7: detected capacity change from 0 to 262144 [ 2088.029389] loop3: detected capacity change from 0 to 268288 [ 2088.056636] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2088.059337] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 2088.063897] EXT4-fs (loop3): get root inode failed [ 2088.065125] EXT4-fs (loop3): mount failed [ 2088.070245] EXT4-fs (loop7): get root inode failed [ 2088.071445] EXT4-fs (loop7): mount failed [ 2088.094431] loop3: detected capacity change from 0 to 268288 [ 2088.113893] loop7: detected capacity change from 0 to 262144 [ 2088.119410] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2088.127971] EXT4-fs (loop3): get root inode failed [ 2088.129142] EXT4-fs (loop3): mount failed [ 2088.153264] EXT4-fs error (device loop7): ext4_fill_super:4967: inode #2: comm syz-executor.7: iget: bad extended attribute block 144 [ 2088.160991] EXT4-fs (loop7): get root inode failed [ 2088.162276] EXT4-fs (loop7): mount failed [ 2104.722018] loop4: detected capacity change from 0 to 135266304 [ 2104.737879] loop3: detected capacity change from 0 to 270336 [ 2104.757184] vfat filesystem being mounted at /syzkaller-testdir316439882/syzkaller.8IsTZ8/153/file0 supports timestamps until 2107-12-31 (0x10391447e) [ 2104.771289] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2104.779962] EXT4-fs (loop3): get root inode failed [ 2104.781263] EXT4-fs (loop3): mount failed [ 2104.854086] loop3: detected capacity change from 0 to 270336 [ 2104.907868] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2104.913829] EXT4-fs (loop3): get root inode failed [ 2104.914766] EXT4-fs (loop3): mount failed [ 2105.142455] loop3: detected capacity change from 0 to 270336 [ 2105.190906] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2105.197697] EXT4-fs (loop3): get root inode failed [ 2105.198379] EXT4-fs (loop3): mount failed [ 2105.260144] loop3: detected capacity change from 0 to 270336 [ 2105.290449] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2105.296043] EXT4-fs (loop3): get root inode failed [ 2105.297490] EXT4-fs (loop3): mount failed [ 2121.152700] loop3: detected capacity change from 0 to 273920 [ 2121.178349] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2121.179848] loop4: detected capacity change from 0 to 135266304 [ 2121.182585] EXT4-fs (loop3): get root inode failed [ 2121.183255] EXT4-fs (loop3): mount failed [ 2121.209012] loop3: detected capacity change from 0 to 273920 [ 2121.238848] vfat filesystem being mounted at /syzkaller-testdir316439882/syzkaller.8IsTZ8/154/file0 supports timestamps until 2107-12-31 (0x10391447e) [ 2121.282643] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2121.285776] EXT4-fs (loop3): get root inode failed [ 2121.286975] EXT4-fs (loop3): mount failed [ 2136.576261] loop4: detected capacity change from 0 to 135266304 [ 2136.591973] loop7: detected capacity change from 0 to 262144 [ 2136.608229] loop3: detected capacity change from 0 to 278016 [ 2136.616275] vfat filesystem being mounted at /syzkaller-testdir316439882/syzkaller.8IsTZ8/155/file0 supports timestamps until 2107-12-31 (0x10391447e) [ 2136.659698] EXT4-fs (loop7): inodes count not valid: 6 vs 32 [ 2136.677643] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2136.698017] EXT4-fs (loop3): get root inode failed [ 2136.699251] EXT4-fs (loop3): mount failed [ 2136.724963] loop7: detected capacity change from 0 to 262144 [ 2136.742427] loop3: detected capacity change from 0 to 278016 [ 2136.765453] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2136.767941] EXT4-fs (loop7): inodes count not valid: 6 vs 32 [ 2136.772924] EXT4-fs (loop3): get root inode failed [ 2136.774074] EXT4-fs (loop3): mount failed [ 2136.940929] loop3: detected capacity change from 0 to 278528 [ 2136.952114] loop7: detected capacity change from 0 to 262144 [ 2136.958967] EXT4-fs (loop7): inodes count not valid: 7 vs 32 [ 2136.966068] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2136.969322] EXT4-fs (loop3): get root inode failed [ 2136.970483] EXT4-fs (loop3): mount failed [ 2136.994896] loop7: detected capacity change from 0 to 262144 [ 2137.007224] loop3: detected capacity change from 0 to 278528 [ 2137.021610] EXT4-fs (loop7): inodes count not valid: 7 vs 32 [ 2137.021766] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2137.025709] EXT4-fs (loop3): get root inode failed [ 2137.026893] EXT4-fs (loop3): mount failed [ 2151.419101] loop4: detected capacity change from 0 to 135266304 [ 2151.441292] loop7: detected capacity change from 0 to 262144 [ 2151.455993] loop3: detected capacity change from 0 to 280576 [ 2151.468966] vfat filesystem being mounted at /syzkaller-testdir316439882/syzkaller.8IsTZ8/156/file0 supports timestamps until 2107-12-31 (0x10391447e) [ 2151.473834] EXT4-fs (loop7): inodes count not valid: 8 vs 32 [ 2151.494553] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2151.497197] EXT4-fs (loop3): get root inode failed [ 2151.497915] EXT4-fs (loop3): mount failed [ 2151.520984] loop7: detected capacity change from 0 to 262144 [ 2151.525451] EXT4-fs (loop7): inodes count not valid: 8 vs 32 [ 2151.547403] loop3: detected capacity change from 0 to 280576 [ 2151.565783] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2151.572445] EXT4-fs (loop3): get root inode failed [ 2151.573229] EXT4-fs (loop3): mount failed [ 2151.685849] loop7: detected capacity change from 0 to 262144 [ 2151.722625] EXT4-fs (loop7): inodes count not valid: 48 vs 32 [ 2151.794044] loop3: detected capacity change from 0 to 281600 [ 2151.831753] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2151.833915] EXT4-fs (loop3): get root inode failed [ 2151.834551] EXT4-fs (loop3): mount failed [ 2151.883017] loop3: detected capacity change from 0 to 281600 [ 2151.893317] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2151.894548] loop7: detected capacity change from 0 to 262144 [ 2151.895758] EXT4-fs (loop3): get root inode failed [ 2151.896315] EXT4-fs (loop3): mount failed [ 2151.904967] EXT4-fs (loop7): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2151.930393] loop7: detected capacity change from 0 to 262144 [ 2151.936922] EXT4-fs (loop7): bad geometry: first data block 0 is beyond end of filesystem (0) [ 2167.274844] loop7: detected capacity change from 0 to 262144 [ 2167.292963] loop3: detected capacity change from 0 to 286720 [ 2167.325187] loop4: detected capacity change from 0 to 135266304 [ 2167.329880] EXT4-fs (loop7): inodes count not valid: 544 vs 32 [ 2167.341436] loop7: detected capacity change from 0 to 262144 [ 2167.347348] EXT4-fs (loop7): inodes count not valid: 544 vs 32 [ 2167.402958] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2167.433596] EXT4-fs (loop3): get root inode failed [ 2167.434897] EXT4-fs (loop3): mount failed [ 2167.482343] loop7: detected capacity change from 0 to 262144 [ 2167.489552] EXT4-fs (loop7): inodes count not valid: 800 vs 32 [ 2167.509147] loop7: detected capacity change from 0 to 262144 [ 2167.515897] EXT4-fs (loop7): inodes count not valid: 800 vs 32 [ 2167.540431] loop3: detected capacity change from 0 to 286720 [ 2167.615283] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2167.617925] EXT4-fs (loop3): get root inode failed [ 2167.619082] EXT4-fs (loop3): mount failed [ 2167.670440] loop7: detected capacity change from 0 to 262144 [ 2167.697777] EXT4-fs (loop7): inodes count not valid: 1056 vs 32 [ 2185.535377] loop7: detected capacity change from 0 to 262144 [ 2185.556098] loop4: detected capacity change from 0 to 135266304 [ 2185.563809] EXT4-fs (loop7): inodes count not valid: 1312 vs 32 [ 2185.575655] loop7: detected capacity change from 0 to 262144 [ 2185.579169] EXT4-fs (loop7): inodes count not valid: 1312 vs 32 [ 2185.618349] loop3: detected capacity change from 0 to 288768 [ 2185.689647] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2185.709675] EXT4-fs (loop3): get root inode failed [ 2185.710379] EXT4-fs (loop3): mount failed [ 2185.726032] loop7: detected capacity change from 0 to 262144 [ 2185.756780] EXT4-fs (loop7): inodes count not valid: 1568 vs 32 [ 2185.774019] loop3: detected capacity change from 0 to 288768 [ 2185.800695] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2185.802645] EXT4-fs (loop3): get root inode failed [ 2185.803287] EXT4-fs (loop3): mount failed [ 2185.948057] loop7: detected capacity change from 0 to 262144 [ 2185.958005] EXT4-fs (loop7): inodes count not valid: 1824 vs 32 [ 2185.971706] loop7: detected capacity change from 0 to 262144 [ 2185.975301] EXT4-fs (loop7): inodes count not valid: 1824 vs 32 [ 2204.338655] loop3: detected capacity change from 0 to 289792 [ 2204.354926] loop4: detected capacity change from 0 to 135266304 [ 2204.372810] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2204.375763] EXT4-fs (loop3): get root inode failed [ 2204.377054] EXT4-fs (loop3): mount failed [ 2204.396105] loop7: detected capacity change from 0 to 262144 [ 2204.427930] EXT4-fs (loop7): inodes count not valid: 2080 vs 32 [ 2204.446282] loop3: detected capacity change from 0 to 289792 [ 2204.470998] loop7: detected capacity change from 0 to 262144 [ 2204.476806] EXT4-fs (loop7): inodes count not valid: 2080 vs 32 [ 2204.507342] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2204.520570] EXT4-fs (loop3): get root inode failed [ 2204.521935] EXT4-fs (loop3): mount failed [ 2221.067852] loop4: detected capacity change from 0 to 135266304 [ 2221.082686] loop3: detected capacity change from 0 to 291840 [ 2221.095085] loop7: detected capacity change from 0 to 262144 [ 2221.108195] EXT4-fs (loop7): inodes count not valid: 2848 vs 32 [ 2221.126374] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2221.128997] EXT4-fs (loop3): get root inode failed [ 2221.129720] EXT4-fs (loop3): mount failed [ 2221.143744] loop7: detected capacity change from 0 to 262144 [ 2221.157185] EXT4-fs (loop7): inodes count not valid: 2848 vs 32 [ 2221.161150] loop3: detected capacity change from 0 to 291840 [ 2221.181231] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2221.192648] EXT4-fs (loop3): get root inode failed [ 2221.193392] EXT4-fs (loop3): mount failed [ 2238.325075] loop4: detected capacity change from 0 to 135266304 [ 2238.360852] loop3: detected capacity change from 0 to 293376 [ 2238.385305] loop7: detected capacity change from 0 to 262144 [ 2238.407885] EXT4-fs (loop7): inodes count not valid: 6176 vs 32 [ 2238.428407] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2238.431160] EXT4-fs (loop3): get root inode failed [ 2238.432528] EXT4-fs (loop3): mount failed [ 2238.448228] loop7: detected capacity change from 0 to 262144 [ 2238.470140] EXT4-fs (loop7): inodes count not valid: 6176 vs 32 [ 2238.500598] loop3: detected capacity change from 0 to 293376 [ 2238.515130] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2238.519775] EXT4-fs (loop3): get root inode failed [ 2238.521117] EXT4-fs (loop3): mount failed [ 2238.612214] loop7: detected capacity change from 0 to 262144 [ 2238.648795] EXT4-fs (loop7): inodes count not valid: 7200 vs 32 [ 2238.722668] loop7: detected capacity change from 0 to 262144 [ 2238.732910] loop3: detected capacity change from 0 to 302080 [ 2238.739126] EXT4-fs (loop7): inodes count not valid: 7200 vs 32 [ 2238.763083] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2238.765812] EXT4-fs (loop3): get root inode failed [ 2238.766981] EXT4-fs (loop3): mount failed [ 2255.121363] loop3: detected capacity change from 0 to 311808 [ 2255.139688] loop7: detected capacity change from 0 to 262144 [ 2255.150984] EXT4-fs (loop7): inodes count not valid: 26144 vs 32 [ 2255.157435] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2255.161048] EXT4-fs (loop3): get root inode failed [ 2255.161947] EXT4-fs (loop3): mount failed [ 2255.184138] loop4: detected capacity change from 0 to 135266304 [ 2255.190922] loop7: detected capacity change from 0 to 262144 [ 2255.209006] loop3: detected capacity change from 0 to 311808 [ 2255.216721] EXT4-fs (loop7): inodes count not valid: 26144 vs 32 [ 2255.240011] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2255.242483] EXT4-fs (loop3): get root inode failed [ 2255.243730] EXT4-fs (loop3): mount failed [ 2255.430786] loop7: detected capacity change from 0 to 262144 [ 2255.449148] loop3: detected capacity change from 0 to 312320 [ 2255.471480] EXT4-fs (loop7): inodes count not valid: 196640 vs 32 [ 2255.488210] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2255.506913] EXT4-fs (loop3): get root inode failed [ 2255.508208] EXT4-fs (loop3): mount failed [ 2255.524180] loop7: detected capacity change from 0 to 262144 [ 2255.545908] EXT4-fs (loop7): inodes count not valid: 196640 vs 32 [ 2255.548901] loop3: detected capacity change from 0 to 312320 [ 2255.566108] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2255.569376] EXT4-fs (loop3): get root inode failed [ 2255.570254] EXT4-fs (loop3): mount failed [ 2270.163456] loop7: detected capacity change from 0 to 262144 [ 2270.167165] EXT4-fs (loop7): inodes count not valid: 294944 vs 32 [ 2270.179883] loop7: detected capacity change from 0 to 262144 [ 2270.190095] loop4: detected capacity change from 0 to 135266304 [ 2270.209071] EXT4-fs (loop7): inodes count not valid: 294944 vs 32 [ 2270.224225] loop3: detected capacity change from 0 to 312320 [ 2270.264618] EXT4-fs error (device loop3): __ext4_iget:4955: inode #2: block 208: comm syz-executor.3: invalid block [ 2270.273060] EXT4-fs (loop3): get root inode failed [ 2270.274261] EXT4-fs (loop3): mount failed [ 2270.312087] loop7: detected capacity change from 0 to 262144 [ 2270.346206] loop3: detected capacity change from 0 to 312320 [ 2270.363171] EXT4-fs (loop7): inodes count not valid: 327712 vs 32 [ 2270.435755] EXT4-fs: failed to create workqueue [ 2270.437704] EXT4-fs (loop3): mount failed VM DIAGNOSIS: 04:54:25 Registers: info registers vcpu 0 RAX=ffffffff83e8ee20 RBX=0000000000000000 RCX=ffffffff83e769bc RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e8f428 RBP=0000000000000000 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85678ec8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e8ee2e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffd82811c08 CR3=000000000d980000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffff000000000000000000000000 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=40404040404040404040404040404040 XMM05=5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a XMM06=20202020202020202020202020202020 XMM07=00000000000000000000000000000000 XMM08=25203a646672656d6974206574616572 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e8ee20 RBX=0000000000000001 RCX=ffffffff83e769bc RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e8f428 RBP=0000000000000001 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85678ec8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e8ee2e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00005578e0fc852c CR3=000000000ed5a000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=7465677261742e79636e656772656d65 XMM02=ffffffffffffff0f0e0d0c0b0a090807 XMM03=00000000000000610065636976726573 XMM04=2e2e2e2e2e2e2e2e2e2e2e2e2e2e2e2e XMM05=00ff00ff010201010000000800000003 XMM06=000000000000006563697665642e3469 XMM07=00000000000000000000000000000000 XMM08=732f6563696c732e6d65747379732f3a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000200000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000