1, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 527.689685][T19313] should_fail+0x23c/0x250 [ 527.694107][T19313] ? __alloc_file+0x2e/0x1a0 [ 527.698702][T19313] __should_failslab+0x81/0x90 [ 527.703541][T19313] should_failslab+0x5/0x20 [ 527.708136][T19313] kmem_cache_alloc+0x4f/0x320 [ 527.713006][T19313] __alloc_file+0x2e/0x1a0 [ 527.717450][T19313] alloc_empty_file+0xcd/0x1c0 [ 527.722211][T19313] path_openat+0x6a/0x1eb0 [ 527.726632][T19313] ? __set_page_dirty_no_writeback+0x96/0xc0 [ 527.732617][T19313] ? folio_mark_dirty+0x84/0xe0 [ 527.737521][T19313] ? unlock_page+0x37/0x50 [ 527.741944][T19313] ? inode_to_bdi+0x43/0xa0 [ 527.746483][T19313] ? balance_dirty_pages_ratelimited+0x47/0x280 [ 527.752744][T19313] ? generic_perform_write+0x397/0x400 [ 527.758223][T19313] do_filp_open+0x105/0x220 [ 527.762760][T19313] do_sys_openat2+0xb5/0x2b0 [ 527.767425][T19313] __x64_sys_openat+0xef/0x110 [ 527.772190][T19313] do_syscall_64+0x44/0xd0 [ 527.776810][T19313] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 527.782753][T19313] RIP: 0033:0x7f867f547a14 [ 527.787173][T19313] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 527.806810][T19313] RSP: 002b:00007f867ed0aed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 527.815236][T19313] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f547a14 [ 527.823222][T19313] RDX: 0000000000000002 RSI: 00007f867ed0b000 RDI: 00000000ffffff9c [ 527.831289][T19313] RBP: 00007f867ed0b000 R08: 0000000000000000 R09: ffffffffffffffff [ 527.839276][T19313] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 527.847335][T19313] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 527.855333][T19313] [ 527.862036][T19314] FAULT_INJECTION: forcing a failure. [ 527.862036][T19314] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 527.875624][T19314] CPU: 0 PID: 19314 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 527.884594][T19314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.894658][T19314] Call Trace: [ 527.898019][T19314] [ 527.900959][T19314] dump_stack_lvl+0xd6/0x122 [ 527.905568][T19314] dump_stack+0x11/0x1b [ 527.909740][T19314] should_fail+0x23c/0x250 [ 527.914201][T19314] should_fail_usercopy+0x16/0x20 [ 527.919230][T19314] strncpy_from_user+0x21/0x250 [ 527.924100][T19314] getname_flags+0xb8/0x3f0 [ 527.928615][T19314] ? vfs_write+0x667/0x950 [ 527.933045][T19314] getname+0x15/0x20 [ 527.935577][T19320] FAULT_INJECTION: forcing a failure. [ 527.935577][T19320] name failslab, interval 1, probability 0, space 0, times 0 [ 527.937018][T19314] do_sys_openat2+0x6d/0x2b0 [ 527.955152][T19314] __x64_sys_openat+0xef/0x110 [ 527.960419][T19314] do_syscall_64+0x44/0xd0 [ 527.964879][T19314] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 527.970790][T19314] RIP: 0033:0x7fcb0ee64a14 [ 527.975243][T19314] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 527.994927][T19314] RSP: 002b:00007fcb0e627ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 528.003355][T19314] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0ee64a14 [ 528.011393][T19314] RDX: 0000000000000002 RSI: 00007fcb0e628000 RDI: 00000000ffffff9c [ 528.019439][T19314] RBP: 00007fcb0e628000 R08: 0000000000000000 R09: ffffffffffffffff [ 528.027399][T19314] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 528.035413][T19314] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 528.043564][T19314] [ 528.046604][T19320] CPU: 1 PID: 19320 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 528.047052][T19319] loop5: detected capacity change from 0 to 4096 [ 528.055372][T19320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.055386][T19320] Call Trace: [ 528.055391][T19320] [ 528.078129][T19320] dump_stack_lvl+0xd6/0x122 [ 528.082728][T19320] dump_stack+0x11/0x1b [ 528.086934][T19320] should_fail+0x23c/0x250 [ 528.091355][T19320] ? __kernfs_new_node+0x6a/0x340 [ 528.096389][T19320] __should_failslab+0x81/0x90 [ 528.101247][T19320] should_failslab+0x5/0x20 [ 528.105836][T19320] kmem_cache_alloc+0x4f/0x320 [ 528.110676][T19320] ? __down_write_common+0x42/0x7b0 [ 528.116040][T19320] __kernfs_new_node+0x6a/0x340 [ 528.120953][T19320] ? up_write+0x25/0xc0 [ 528.125111][T19320] kernfs_new_node+0x5b/0xd0 [ 528.129712][T19320] __kernfs_create_file+0x45/0x1a0 [ 528.134845][T19320] ? dev_attr_show+0x90/0x90 [ 528.139436][T19320] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 528.144840][T19320] internal_create_group+0x2dd/0x840 [ 528.150208][T19320] sysfs_create_group+0x1b/0x20 [ 528.155138][T19320] loop_configure+0xc58/0xf30 [ 528.159828][T19320] lo_ioctl+0x583/0x1270 [ 528.164073][T19320] ? folio_mark_dirty+0x84/0xe0 [ 528.168931][T19320] ? unlock_page+0x37/0x50 [ 528.173412][T19320] ? __rcu_read_unlock+0x5c/0x290 [ 528.178440][T19320] ? blkdev_common_ioctl+0x438/0x1180 [ 528.183953][T19320] ? selinux_file_ioctl+0x522/0x590 [ 528.189150][T19320] ? do_vfs_ioctl+0x819/0x14a0 [ 528.193921][T19320] ? lo_release+0x120/0x120 [ 528.198423][T19320] blkdev_ioctl+0x20e/0x440 [ 528.202936][T19320] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 528.208464][T19320] __se_sys_ioctl+0xcb/0x140 [ 528.213060][T19320] __x64_sys_ioctl+0x3f/0x50 [ 528.217684][T19320] do_syscall_64+0x44/0xd0 [ 528.222125][T19320] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 528.228162][T19320] RIP: 0033:0x7f8a511278b7 [ 528.232583][T19320] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 528.252196][T19320] RSP: 002b:00007f8a5089df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 528.260617][T19320] RAX: ffffffffffffffda RBX: 00007f8a511719c8 RCX: 00007f8a511278b7 [ 528.268707][T19320] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 528.276677][T19320] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 528.284645][T19320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 22:15:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 15) 22:15:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 13) [ 528.292671][T19320] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 528.300841][T19320] [ 528.309374][T19320] loop3: detected capacity change from 0 to 5 [ 528.318526][T19319] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 22:15:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 22:15:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 32) [ 528.338439][T19320] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 528.339409][T19321] loop0: detected capacity change from 0 to 6 [ 528.362650][T19321] FAT-fs (loop0): Directory bread(block 6) failed 22:15:56 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 528.445475][T19325] FAULT_INJECTION: forcing a failure. [ 528.445475][T19325] name failslab, interval 1, probability 0, space 0, times 0 [ 528.458329][T19325] CPU: 1 PID: 19325 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 528.467099][T19325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.477156][T19325] Call Trace: [ 528.480444][T19325] [ 528.483370][T19325] dump_stack_lvl+0xd6/0x122 [ 528.487995][T19325] dump_stack+0x11/0x1b [ 528.492202][T19325] should_fail+0x23c/0x250 [ 528.496660][T19325] ? security_file_alloc+0x30/0x190 [ 528.502093][T19325] __should_failslab+0x81/0x90 [ 528.506948][T19325] should_failslab+0x5/0x20 [ 528.511451][T19325] kmem_cache_alloc+0x4f/0x320 [ 528.516285][T19325] security_file_alloc+0x30/0x190 [ 528.521390][T19325] __alloc_file+0x83/0x1a0 [ 528.525814][T19325] alloc_empty_file+0xcd/0x1c0 [ 528.530580][T19325] path_openat+0x6a/0x1eb0 [ 528.535089][T19325] ? __set_page_dirty_no_writeback+0x96/0xc0 [ 528.541074][T19325] ? folio_mark_dirty+0x84/0xe0 [ 528.545981][T19325] ? unlock_page+0x37/0x50 [ 528.550414][T19325] ? inode_to_bdi+0x43/0xa0 [ 528.554912][T19325] ? balance_dirty_pages_ratelimited+0x47/0x280 [ 528.561151][T19325] ? generic_perform_write+0x397/0x400 [ 528.566622][T19325] do_filp_open+0x105/0x220 [ 528.571197][T19325] do_sys_openat2+0xb5/0x2b0 [ 528.575795][T19325] __x64_sys_openat+0xef/0x110 [ 528.580594][T19325] do_syscall_64+0x44/0xd0 [ 528.585020][T19325] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 528.590918][T19325] RIP: 0033:0x7f867f547a14 [ 528.595537][T19325] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 528.615142][T19325] RSP: 002b:00007f867ed0aed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 528.623642][T19325] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f547a14 [ 528.631691][T19325] RDX: 0000000000000002 RSI: 00007f867ed0b000 RDI: 00000000ffffff9c 22:15:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 16) [ 528.639658][T19325] RBP: 00007f867ed0b000 R08: 0000000000000000 R09: ffffffffffffffff [ 528.647806][T19325] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 528.655781][T19325] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 528.663762][T19325] [ 528.684487][T19328] FAULT_INJECTION: forcing a failure. [ 528.684487][T19328] name failslab, interval 1, probability 0, space 0, times 0 [ 528.697169][T19328] CPU: 1 PID: 19328 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 528.706042][T19328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.716099][T19328] Call Trace: [ 528.719382][T19328] [ 528.722371][T19328] dump_stack_lvl+0xd6/0x122 [ 528.727126][T19328] dump_stack+0x11/0x1b [ 528.731444][T19328] should_fail+0x23c/0x250 [ 528.735859][T19328] ? __alloc_file+0x2e/0x1a0 [ 528.740498][T19328] __should_failslab+0x81/0x90 [ 528.745268][T19328] should_failslab+0x5/0x20 [ 528.749776][T19328] kmem_cache_alloc+0x4f/0x320 [ 528.754562][T19328] __alloc_file+0x2e/0x1a0 [ 528.759049][T19328] alloc_empty_file+0xcd/0x1c0 [ 528.763813][T19328] path_openat+0x6a/0x1eb0 [ 528.768295][T19328] ? __set_page_dirty_no_writeback+0x96/0xc0 [ 528.774286][T19328] ? folio_mark_dirty+0x84/0xe0 [ 528.779216][T19328] ? unlock_page+0x37/0x50 [ 528.783641][T19328] ? inode_to_bdi+0x43/0xa0 [ 528.788145][T19328] ? balance_dirty_pages_ratelimited+0x47/0x280 [ 528.794488][T19328] ? generic_perform_write+0x397/0x400 [ 528.799995][T19328] do_filp_open+0x105/0x220 [ 528.804522][T19328] do_sys_openat2+0xb5/0x2b0 [ 528.809117][T19328] __x64_sys_openat+0xef/0x110 [ 528.813891][T19328] do_syscall_64+0x44/0xd0 [ 528.818318][T19328] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 528.824227][T19328] RIP: 0033:0x7fcb0ee64a14 [ 528.828776][T19328] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 528.848385][T19328] RSP: 002b:00007fcb0e627ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 528.859376][T19328] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0ee64a14 [ 528.867614][T19328] RDX: 0000000000000002 RSI: 00007fcb0e628000 RDI: 00000000ffffff9c [ 528.875583][T19328] RBP: 00007fcb0e628000 R08: 0000000000000000 R09: ffffffffffffffff [ 528.883641][T19328] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 22:15:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 14) [ 528.891615][T19328] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 528.899636][T19328] 22:15:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 529.013739][T19330] loop5: detected capacity change from 0 to 4096 [ 529.040122][T19330] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 529.149600][T19335] FAULT_INJECTION: forcing a failure. [ 529.149600][T19335] name failslab, interval 1, probability 0, space 0, times 0 [ 529.162278][T19335] CPU: 0 PID: 19335 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 529.171040][T19335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.181094][T19335] Call Trace: [ 529.184370][T19335] [ 529.187299][T19335] dump_stack_lvl+0xd6/0x122 [ 529.191922][T19335] dump_stack+0x11/0x1b [ 529.196172][T19335] should_fail+0x23c/0x250 [ 529.200590][T19335] ? __kernfs_new_node+0x6a/0x340 [ 529.205622][T19335] __should_failslab+0x81/0x90 [ 529.210442][T19335] should_failslab+0x5/0x20 [ 529.214953][T19335] kmem_cache_alloc+0x4f/0x320 [ 529.219799][T19335] ? __down_write_common+0x42/0x7b0 [ 529.225000][T19335] __kernfs_new_node+0x6a/0x340 [ 529.229999][T19335] ? up_write+0x25/0xc0 [ 529.234204][T19335] kernfs_new_node+0x5b/0xd0 [ 529.238814][T19335] __kernfs_create_file+0x45/0x1a0 [ 529.244002][T19335] ? dev_attr_show+0x90/0x90 [ 529.248598][T19335] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 529.254059][T19335] internal_create_group+0x2dd/0x840 [ 529.259444][T19335] sysfs_create_group+0x1b/0x20 [ 529.264301][T19335] loop_configure+0xc58/0xf30 [ 529.268987][T19335] lo_ioctl+0x583/0x1270 [ 529.273234][T19335] ? folio_mark_dirty+0x84/0xe0 [ 529.278201][T19335] ? unlock_page+0x37/0x50 [ 529.282654][T19335] ? __rcu_read_unlock+0x5c/0x290 [ 529.287686][T19335] ? blkdev_common_ioctl+0x438/0x1180 [ 529.293063][T19335] ? selinux_file_ioctl+0x522/0x590 [ 529.298277][T19335] ? do_vfs_ioctl+0x819/0x14a0 [ 529.303079][T19335] ? lo_release+0x120/0x120 [ 529.303454][T19339] FAULT_INJECTION: forcing a failure. [ 529.303454][T19339] name failslab, interval 1, probability 0, space 0, times 0 [ 529.307608][T19335] blkdev_ioctl+0x20e/0x440 [ 529.324735][T19335] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 529.330224][T19335] __se_sys_ioctl+0xcb/0x140 [ 529.334812][T19335] __x64_sys_ioctl+0x3f/0x50 [ 529.339388][T19335] do_syscall_64+0x44/0xd0 [ 529.343794][T19335] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 529.349814][T19335] RIP: 0033:0x7f8a511278b7 [ 529.354316][T19335] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 529.373974][T19335] RSP: 002b:00007f8a5089df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 529.382445][T19335] RAX: ffffffffffffffda RBX: 00007f8a511719c8 RCX: 00007f8a511278b7 [ 529.390743][T19335] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 529.398702][T19335] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 529.406705][T19335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 529.414710][T19335] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 529.422716][T19335] [ 529.425735][T19339] CPU: 1 PID: 19339 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 529.434590][T19339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.444639][T19339] Call Trace: [ 529.447917][T19339] [ 529.450868][T19339] dump_stack_lvl+0xd6/0x122 [ 529.455506][T19339] dump_stack+0x11/0x1b [ 529.459651][T19339] should_fail+0x23c/0x250 [ 529.464705][T19339] ? kzalloc+0x16/0x20 [ 529.468765][T19339] __should_failslab+0x81/0x90 [ 529.473522][T19339] should_failslab+0x5/0x20 [ 529.478051][T19339] __kmalloc+0x6f/0x370 [ 529.482193][T19339] ? iput+0x1cd/0x580 [ 529.486164][T19339] kzalloc+0x16/0x20 [ 529.490151][T19339] alloc_workqueue+0x12f/0xad0 [ 529.495049][T19339] ? blkdev_get_by_dev+0xb8b/0xc60 [ 529.500281][T19339] ? preempt_count_add+0x4e/0x90 [ 529.505220][T19339] ? _raw_spin_unlock+0x2e/0x50 [ 529.510176][T19339] ? bd_prepare_to_claim+0x1ac/0x200 [ 529.515452][T19339] loop_configure+0x70e/0xf30 [ 529.520198][T19339] lo_ioctl+0x583/0x1270 [ 529.524430][T19339] ? folio_mark_dirty+0x84/0xe0 [ 529.529268][T19339] ? unlock_page+0x37/0x50 [ 529.533674][T19339] ? __rcu_read_unlock+0x5c/0x290 [ 529.538746][T19339] ? blkdev_common_ioctl+0x438/0x1180 [ 529.544122][T19339] ? selinux_file_ioctl+0x522/0x590 [ 529.549325][T19339] ? do_vfs_ioctl+0x819/0x14a0 [ 529.554091][T19339] ? lo_release+0x120/0x120 [ 529.558674][T19339] blkdev_ioctl+0x20e/0x440 [ 529.563169][T19339] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 529.568694][T19339] __se_sys_ioctl+0xcb/0x140 [ 529.573284][T19339] __x64_sys_ioctl+0x3f/0x50 [ 529.577906][T19339] do_syscall_64+0x44/0xd0 [ 529.582477][T19339] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 529.588409][T19339] RIP: 0033:0x7f867f5948b7 [ 529.592862][T19339] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 529.612457][T19339] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 529.620860][T19339] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 529.628906][T19339] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 529.636865][T19339] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 22:15:57 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0xfe, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 529.644824][T19339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 529.652810][T19339] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 529.660770][T19339] [ 529.665839][T19335] loop3: detected capacity change from 0 to 5 [ 529.684205][T19341] FAULT_INJECTION: forcing a failure. [ 529.684205][T19341] name failslab, interval 1, probability 0, space 0, times 0 [ 529.696860][T19341] CPU: 0 PID: 19341 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 529.705688][T19341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.715740][T19341] Call Trace: [ 529.719015][T19341] [ 529.722042][T19341] dump_stack_lvl+0xd6/0x122 [ 529.726640][T19341] dump_stack+0x11/0x1b [ 529.730997][T19341] should_fail+0x23c/0x250 [ 529.735452][T19341] ? security_file_alloc+0x30/0x190 [ 529.740677][T19341] __should_failslab+0x81/0x90 [ 529.745471][T19341] should_failslab+0x5/0x20 [ 529.750076][T19341] kmem_cache_alloc+0x4f/0x320 [ 529.754857][T19341] security_file_alloc+0x30/0x190 [ 529.759925][T19341] __alloc_file+0x83/0x1a0 [ 529.764352][T19341] alloc_empty_file+0xcd/0x1c0 [ 529.769184][T19341] path_openat+0x6a/0x1eb0 [ 529.773612][T19341] ? __set_page_dirty_no_writeback+0x96/0xc0 [ 529.779707][T19341] ? folio_mark_dirty+0x84/0xe0 [ 529.784643][T19341] ? unlock_page+0x37/0x50 [ 529.789143][T19341] ? inode_to_bdi+0x43/0xa0 [ 529.793697][T19341] ? balance_dirty_pages_ratelimited+0x47/0x280 [ 529.799951][T19341] ? generic_perform_write+0x397/0x400 [ 529.805503][T19341] do_filp_open+0x105/0x220 [ 529.810018][T19341] do_sys_openat2+0xb5/0x2b0 [ 529.814648][T19341] __x64_sys_openat+0xef/0x110 [ 529.819415][T19341] do_syscall_64+0x44/0xd0 [ 529.823845][T19341] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 529.829764][T19341] RIP: 0033:0x7fcb0ee64a14 [ 529.834200][T19341] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 529.853870][T19341] RSP: 002b:00007fcb0e627ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 529.862324][T19341] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0ee64a14 [ 529.870300][T19341] RDX: 0000000000000002 RSI: 00007fcb0e628000 RDI: 00000000ffffff9c [ 529.878318][T19341] RBP: 00007fcb0e628000 R08: 0000000000000000 R09: ffffffffffffffff [ 529.886279][T19341] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 529.894385][T19341] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 22:15:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 17) 22:15:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 15) 22:15:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 33) [ 529.902361][T19341] [ 529.905563][T19335] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 529.921927][T19342] loop0: detected capacity change from 0 to 6 [ 529.929758][T19342] FAT-fs (loop0): Directory bread(block 6) failed 22:15:58 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 529.999760][T19344] loop5: detected capacity change from 0 to 4096 [ 530.023071][T19344] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 22:15:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 530.082354][T19348] FAULT_INJECTION: forcing a failure. [ 530.082354][T19348] name failslab, interval 1, probability 0, space 0, times 0 [ 530.095211][T19348] CPU: 1 PID: 19348 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 530.104066][T19348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.114170][T19348] Call Trace: [ 530.117451][T19348] [ 530.120380][T19348] dump_stack_lvl+0xd6/0x122 [ 530.124979][T19348] dump_stack+0x11/0x1b [ 530.129155][T19348] should_fail+0x23c/0x250 [ 530.133572][T19348] ? alloc_workqueue+0x15d/0xad0 [ 530.138535][T19348] __should_failslab+0x81/0x90 [ 530.143307][T19348] should_failslab+0x5/0x20 [ 530.148020][T19348] kmem_cache_alloc_trace+0x52/0x350 [ 530.153367][T19348] ? kzalloc+0x16/0x20 [ 530.157452][T19348] alloc_workqueue+0x15d/0xad0 [ 530.162302][T19348] ? blkdev_get_by_dev+0xb8b/0xc60 [ 530.167418][T19348] ? preempt_count_add+0x4e/0x90 [ 530.172365][T19348] ? _raw_spin_unlock+0x2e/0x50 [ 530.177263][T19348] ? bd_prepare_to_claim+0x1ac/0x200 [ 530.182553][T19348] loop_configure+0x70e/0xf30 [ 530.187412][T19348] lo_ioctl+0x583/0x1270 [ 530.191656][T19348] ? folio_mark_dirty+0x84/0xe0 [ 530.196509][T19348] ? unlock_page+0x37/0x50 [ 530.200983][T19348] ? __rcu_read_unlock+0x5c/0x290 [ 530.206093][T19348] ? blkdev_common_ioctl+0x438/0x1180 [ 530.211470][T19348] ? selinux_file_ioctl+0x522/0x590 [ 530.216670][T19348] ? do_vfs_ioctl+0x819/0x14a0 [ 530.221500][T19348] ? lo_release+0x120/0x120 [ 530.225998][T19348] blkdev_ioctl+0x20e/0x440 [ 530.230506][T19348] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 530.235968][T19348] __se_sys_ioctl+0xcb/0x140 [ 530.240569][T19348] __x64_sys_ioctl+0x3f/0x50 [ 530.245168][T19348] do_syscall_64+0x44/0xd0 [ 530.249643][T19348] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 530.255558][T19348] RIP: 0033:0x7f867f5948b7 [ 530.259973][T19348] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 530.279689][T19348] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 530.288139][T19348] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 530.296133][T19348] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 530.304249][T19348] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 530.312268][T19348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 530.320544][T19348] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 530.328552][T19348] 22:15:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 18) [ 530.333790][T19349] FAULT_INJECTION: forcing a failure. [ 530.333790][T19349] name failslab, interval 1, probability 0, space 0, times 0 [ 530.346638][T19349] CPU: 1 PID: 19349 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 530.355719][T19349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.365828][T19349] Call Trace: [ 530.369206][T19349] [ 530.372146][T19349] dump_stack_lvl+0xd6/0x122 [ 530.376754][T19349] dump_stack+0x11/0x1b [ 530.381047][T19349] should_fail+0x23c/0x250 [ 530.385483][T19349] ? kzalloc+0x16/0x20 [ 530.389683][T19349] __should_failslab+0x81/0x90 [ 530.394477][T19349] should_failslab+0x5/0x20 [ 530.399001][T19349] __kmalloc+0x6f/0x370 [ 530.403163][T19349] ? iput+0x1cd/0x580 [ 530.407146][T19349] kzalloc+0x16/0x20 [ 530.411082][T19349] alloc_workqueue+0x12f/0xad0 [ 530.415855][T19349] ? blkdev_get_by_dev+0xb8b/0xc60 [ 530.421020][T19349] ? preempt_count_add+0x4e/0x90 [ 530.426064][T19349] ? _raw_spin_unlock+0x2e/0x50 [ 530.430915][T19349] ? bd_prepare_to_claim+0x1ac/0x200 [ 530.436317][T19349] loop_configure+0x70e/0xf30 [ 530.441001][T19349] lo_ioctl+0x583/0x1270 [ 530.445352][T19349] ? folio_mark_dirty+0x84/0xe0 [ 530.450219][T19349] ? unlock_page+0x37/0x50 [ 530.454673][T19349] ? __rcu_read_unlock+0x5c/0x290 [ 530.459709][T19349] ? blkdev_common_ioctl+0x438/0x1180 [ 530.465100][T19349] ? selinux_file_ioctl+0x522/0x590 [ 530.470312][T19349] ? do_vfs_ioctl+0x819/0x14a0 [ 530.475286][T19349] ? lo_release+0x120/0x120 [ 530.479809][T19349] blkdev_ioctl+0x20e/0x440 [ 530.484911][T19349] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 530.490385][T19349] __se_sys_ioctl+0xcb/0x140 [ 530.495091][T19349] __x64_sys_ioctl+0x3f/0x50 [ 530.499738][T19349] do_syscall_64+0x44/0xd0 [ 530.504160][T19349] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 530.510196][T19349] RIP: 0033:0x7fcb0eeb18b7 [ 530.514691][T19349] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 530.534405][T19349] RSP: 002b:00007fcb0e627f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 530.542834][T19349] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0eeb18b7 [ 530.550904][T19349] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 530.558885][T19349] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 530.566897][T19349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 530.574885][T19349] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 22:15:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 16) [ 530.583157][T19349] [ 530.742614][T19353] FAULT_INJECTION: forcing a failure. [ 530.742614][T19353] name failslab, interval 1, probability 0, space 0, times 0 [ 530.755437][T19353] CPU: 1 PID: 19353 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0 [ 530.764203][T19353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.774256][T19353] Call Trace: [ 530.777649][T19353] [ 530.780673][T19353] dump_stack_lvl+0xd6/0x122 [ 530.785461][T19353] dump_stack+0x11/0x1b [ 530.789681][T19353] should_fail+0x23c/0x250 [ 530.794107][T19353] ? __kernfs_new_node+0x6a/0x340 [ 530.799178][T19353] __should_failslab+0x81/0x90 [ 530.803947][T19353] should_failslab+0x5/0x20 [ 530.808557][T19353] kmem_cache_alloc+0x4f/0x320 [ 530.813385][T19353] ? __down_write_common+0x42/0x7b0 [ 530.818655][T19353] __kernfs_new_node+0x6a/0x340 [ 530.823545][T19353] ? up_write+0x25/0xc0 [ 530.827702][T19353] kernfs_new_node+0x5b/0xd0 [ 530.832348][T19353] __kernfs_create_file+0x45/0x1a0 [ 530.837589][T19353] ? dev_attr_show+0x90/0x90 [ 530.842178][T19353] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 530.847627][T19353] internal_create_group+0x2dd/0x840 [ 530.852981][T19353] sysfs_create_group+0x1b/0x20 [ 530.857962][T19353] loop_configure+0xc58/0xf30 [ 530.862638][T19353] lo_ioctl+0x583/0x1270 [ 530.866878][T19353] ? folio_mark_dirty+0x84/0xe0 [ 530.871733][T19353] ? unlock_page+0x37/0x50 [ 530.876224][T19353] ? __rcu_read_unlock+0x5c/0x290 [ 530.881312][T19353] ? blkdev_common_ioctl+0x438/0x1180 [ 530.886715][T19353] ? selinux_file_ioctl+0x522/0x590 [ 530.891953][T19353] ? do_vfs_ioctl+0x819/0x14a0 [ 530.897049][T19353] ? lo_release+0x120/0x120 [ 530.901557][T19353] blkdev_ioctl+0x20e/0x440 [ 530.906069][T19353] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 530.911530][T19353] __se_sys_ioctl+0xcb/0x140 [ 530.916135][T19353] __x64_sys_ioctl+0x3f/0x50 [ 530.920988][T19353] do_syscall_64+0x44/0xd0 [ 530.925490][T19353] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 530.931396][T19353] RIP: 0033:0x7f8a511278b7 [ 530.935808][T19353] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 530.955417][T19353] RSP: 002b:00007f8a5089df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 530.963849][T19353] RAX: ffffffffffffffda RBX: 00007f8a511719c8 RCX: 00007f8a511278b7 [ 530.971815][T19353] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 530.979959][T19353] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 530.988091][T19353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 530.996120][T19353] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 531.004092][T19353] [ 531.007796][T19353] loop3: detected capacity change from 0 to 5 [ 531.040144][T19353] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 531.060878][T19356] loop0: detected capacity change from 0 to 6 [ 531.071264][T19356] FAT-fs (loop0): Directory bread(block 6) failed [ 531.106944][T19360] FAULT_INJECTION: forcing a failure. [ 531.106944][T19360] name failslab, interval 1, probability 0, space 0, times 0 [ 531.107002][T19361] FAULT_INJECTION: forcing a failure. [ 531.107002][T19361] name failslab, interval 1, probability 0, space 0, times 0 [ 531.119654][T19360] CPU: 1 PID: 19360 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 531.140961][T19360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.151003][T19360] Call Trace: [ 531.154407][T19360] [ 531.157392][T19360] dump_stack_lvl+0xd6/0x122 [ 531.161973][T19360] dump_stack+0x11/0x1b [ 531.166134][T19360] should_fail+0x23c/0x250 [ 531.170592][T19360] ? alloc_workqueue+0x15d/0xad0 [ 531.175521][T19360] __should_failslab+0x81/0x90 [ 531.180293][T19360] should_failslab+0x5/0x20 [ 531.184881][T19360] kmem_cache_alloc_trace+0x52/0x350 [ 531.190178][T19360] ? kzalloc+0x16/0x20 [ 531.194261][T19360] alloc_workqueue+0x15d/0xad0 [ 531.199113][T19360] ? blkdev_get_by_dev+0xb8b/0xc60 [ 531.204213][T19360] ? preempt_count_add+0x4e/0x90 [ 531.209140][T19360] ? _raw_spin_unlock+0x2e/0x50 [ 531.213984][T19360] ? bd_prepare_to_claim+0x1ac/0x200 [ 531.219255][T19360] loop_configure+0x70e/0xf30 [ 531.223919][T19360] lo_ioctl+0x583/0x1270 [ 531.228159][T19360] ? folio_mark_dirty+0x84/0xe0 [ 531.233060][T19360] ? unlock_page+0x37/0x50 [ 531.237463][T19360] ? __rcu_read_unlock+0x5c/0x290 [ 531.242491][T19360] ? blkdev_common_ioctl+0x438/0x1180 [ 531.247849][T19360] ? selinux_file_ioctl+0x522/0x590 [ 531.253047][T19360] ? do_vfs_ioctl+0x819/0x14a0 [ 531.257799][T19360] ? lo_release+0x120/0x120 [ 531.262286][T19360] blkdev_ioctl+0x20e/0x440 [ 531.266774][T19360] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 531.272215][T19360] __se_sys_ioctl+0xcb/0x140 [ 531.276878][T19360] __x64_sys_ioctl+0x3f/0x50 [ 531.281494][T19360] do_syscall_64+0x44/0xd0 [ 531.285913][T19360] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 531.291887][T19360] RIP: 0033:0x7fcb0eeb18b7 [ 531.296284][T19360] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 531.315922][T19360] RSP: 002b:00007fcb0e627f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 531.324339][T19360] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0eeb18b7 [ 531.332382][T19360] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 531.340500][T19360] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 531.348493][T19360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 531.356456][T19360] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 531.364417][T19360] [ 531.367437][T19361] CPU: 0 PID: 19361 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 531.376288][T19361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.386348][T19361] Call Trace: [ 531.389624][T19361] [ 531.392603][T19361] dump_stack_lvl+0xd6/0x122 [ 531.397202][T19361] dump_stack+0x11/0x1b [ 531.401352][T19361] should_fail+0x23c/0x250 [ 531.405816][T19361] ? kzalloc+0x16/0x20 [ 531.409893][T19361] __should_failslab+0x81/0x90 [ 531.414659][T19361] should_failslab+0x5/0x20 [ 531.419167][T19361] __kmalloc+0x6f/0x370 [ 531.423325][T19361] ? number+0xa13/0xb60 [ 531.427480][T19361] kzalloc+0x16/0x20 [ 531.431404][T19361] apply_wqattrs_prepare+0x3a/0x630 [ 531.436784][T19361] ? vsnprintf+0xe8f/0xed0 [ 531.441202][T19361] apply_workqueue_attrs+0x9e/0x100 [ 531.446405][T19361] alloc_workqueue+0x777/0xad0 [ 531.451271][T19361] ? preempt_count_add+0x4e/0x90 [ 531.456212][T19361] ? _raw_spin_unlock+0x2e/0x50 [ 531.461068][T19361] ? bd_prepare_to_claim+0x1ac/0x200 [ 531.466351][T19361] loop_configure+0x70e/0xf30 [ 531.471035][T19361] lo_ioctl+0x583/0x1270 [ 531.475307][T19361] ? folio_mark_dirty+0x84/0xe0 [ 531.480165][T19361] ? unlock_page+0x37/0x50 [ 531.484601][T19361] ? __rcu_read_unlock+0x5c/0x290 [ 531.489637][T19361] ? blkdev_common_ioctl+0x438/0x1180 [ 531.495062][T19361] ? selinux_file_ioctl+0x522/0x590 [ 531.500301][T19361] ? do_vfs_ioctl+0x819/0x14a0 [ 531.505137][T19361] ? lo_release+0x120/0x120 [ 531.509637][T19361] blkdev_ioctl+0x20e/0x440 [ 531.514156][T19361] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 531.519657][T19361] __se_sys_ioctl+0xcb/0x140 [ 531.524364][T19361] __x64_sys_ioctl+0x3f/0x50 [ 531.529028][T19361] do_syscall_64+0x44/0xd0 [ 531.533465][T19361] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 531.539401][T19361] RIP: 0033:0x7f867f5948b7 [ 531.543813][T19361] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 531.563566][T19361] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 531.571982][T19361] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 531.579964][T19361] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 531.587928][T19361] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 531.596020][T19361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 22:15:59 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x169, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:15:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:15:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 19) 22:15:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 17) 22:15:59 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 531.603986][T19361] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 531.612130][T19361] [ 531.623386][T19366] loop5: detected capacity change from 0 to 4096 [ 531.642845][T19366] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 22:15:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, 0x0) [ 531.765828][T19373] loop3: detected capacity change from 0 to 5 [ 531.777326][T19375] FAULT_INJECTION: forcing a failure. [ 531.777326][T19375] name failslab, interval 1, probability 0, space 0, times 0 [ 531.790036][T19375] CPU: 0 PID: 19375 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 531.798832][T19375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.808990][T19375] Call Trace: [ 531.812272][T19375] [ 531.815257][T19375] dump_stack_lvl+0xd6/0x122 [ 531.819862][T19375] dump_stack+0x11/0x1b [ 531.824014][T19375] should_fail+0x23c/0x250 [ 531.828444][T19375] ? apply_wqattrs_prepare+0x5f/0x630 [ 531.833895][T19375] __should_failslab+0x81/0x90 [ 531.838670][T19375] should_failslab+0x5/0x20 [ 531.843176][T19375] kmem_cache_alloc_trace+0x52/0x350 [ 531.848512][T19375] ? kzalloc+0x16/0x20 [ 531.852612][T19375] apply_wqattrs_prepare+0x5f/0x630 [ 531.857820][T19375] ? vsnprintf+0xe8f/0xed0 [ 531.862236][T19375] apply_workqueue_attrs+0x9e/0x100 [ 531.867433][T19375] alloc_workqueue+0x777/0xad0 [ 531.872257][T19375] ? preempt_count_add+0x4e/0x90 [ 531.877206][T19375] ? _raw_spin_unlock+0x2e/0x50 [ 531.882074][T19375] ? bd_prepare_to_claim+0x1ac/0x200 [ 531.887423][T19375] loop_configure+0x70e/0xf30 [ 531.892140][T19375] lo_ioctl+0x583/0x1270 [ 531.896456][T19375] ? folio_mark_dirty+0x84/0xe0 [ 531.901359][T19375] ? unlock_page+0x37/0x50 [ 531.905775][T19375] ? __rcu_read_unlock+0x5c/0x290 [ 531.910807][T19375] ? blkdev_common_ioctl+0x438/0x1180 [ 531.916385][T19375] ? selinux_file_ioctl+0x522/0x590 [ 531.921585][T19375] ? do_vfs_ioctl+0x819/0x14a0 [ 531.926354][T19375] ? lo_release+0x120/0x120 [ 531.930868][T19375] blkdev_ioctl+0x20e/0x440 [ 531.935379][T19375] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 531.940960][T19375] __se_sys_ioctl+0xcb/0x140 [ 531.945593][T19375] __x64_sys_ioctl+0x3f/0x50 [ 531.950221][T19375] do_syscall_64+0x44/0xd0 [ 531.951549][T19373] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 531.954641][T19375] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 531.970773][T19375] RIP: 0033:0x7f867f5948b7 [ 531.975187][T19375] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 531.994802][T19375] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 532.003350][T19375] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 532.011386][T19375] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 532.019347][T19375] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 532.027313][T19375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 532.035283][T19375] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 532.043240][T19375] [ 532.053745][T19374] FAULT_INJECTION: forcing a failure. [ 532.053745][T19374] name failslab, interval 1, probability 0, space 0, times 0 [ 532.066444][T19374] CPU: 1 PID: 19374 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 532.075212][T19374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.085265][T19374] Call Trace: [ 532.088578][T19374] [ 532.091499][T19374] dump_stack_lvl+0xd6/0x122 [ 532.096155][T19374] dump_stack+0x11/0x1b [ 532.100309][T19374] should_fail+0x23c/0x250 [ 532.104779][T19374] ? kzalloc+0x16/0x20 [ 532.108844][T19374] __should_failslab+0x81/0x90 [ 532.113627][T19374] should_failslab+0x5/0x20 [ 532.118174][T19374] __kmalloc+0x6f/0x370 [ 532.122325][T19374] ? __schedule+0x44a/0x6a0 [ 532.126827][T19374] kzalloc+0x16/0x20 [ 532.130719][T19374] apply_wqattrs_prepare+0x3a/0x630 [ 532.135985][T19374] ? _raw_spin_unlock+0x2e/0x50 [ 532.140856][T19374] ? __mutex_lock+0x21d/0x5a0 [ 532.145535][T19374] apply_workqueue_attrs+0x9e/0x100 [ 532.150796][T19374] alloc_workqueue+0x777/0xad0 [ 532.155574][T19374] ? preempt_count_add+0x4e/0x90 [ 532.160524][T19374] ? _raw_spin_unlock+0x2e/0x50 [ 532.165384][T19374] ? bd_prepare_to_claim+0x1ac/0x200 [ 532.170715][T19374] loop_configure+0x70e/0xf30 [ 532.175395][T19374] lo_ioctl+0x583/0x1270 [ 532.179635][T19374] ? folio_mark_dirty+0x84/0xe0 [ 532.184592][T19374] ? unlock_page+0x37/0x50 [ 532.189010][T19374] ? __rcu_read_unlock+0x5c/0x290 [ 532.194037][T19374] ? blkdev_common_ioctl+0x438/0x1180 [ 532.199420][T19374] ? selinux_file_ioctl+0x522/0x590 [ 532.204646][T19374] ? do_vfs_ioctl+0x819/0x14a0 [ 532.210343][T19374] ? lo_release+0x120/0x120 [ 532.214855][T19374] blkdev_ioctl+0x20e/0x440 [ 532.219370][T19374] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 532.224825][T19374] __se_sys_ioctl+0xcb/0x140 [ 532.229428][T19374] __x64_sys_ioctl+0x3f/0x50 [ 532.234014][T19374] do_syscall_64+0x44/0xd0 [ 532.238433][T19374] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 532.244366][T19374] RIP: 0033:0x7fcb0eeb18b7 [ 532.248831][T19374] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 532.268605][T19374] RSP: 002b:00007fcb0e627f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 532.277023][T19374] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0eeb18b7 [ 532.285027][T19374] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 532.292998][T19374] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 532.301039][T19374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 532.309009][T19374] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 22:16:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 20) 22:16:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 18) 22:16:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 532.317066][T19374] [ 532.323669][T19378] loop0: detected capacity change from 0 to 6 [ 532.340860][T19378] FAT-fs (loop0): Directory bread(block 6) failed 22:16:00 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 22:16:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, 0x0) [ 532.401531][T19382] loop5: detected capacity change from 0 to 4096 [ 532.519873][T19386] FAULT_INJECTION: forcing a failure. [ 532.519873][T19386] name failslab, interval 1, probability 0, space 0, times 0 [ 532.532572][T19386] CPU: 0 PID: 19386 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 532.541518][T19386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.551823][T19386] Call Trace: [ 532.555243][T19386] [ 532.558170][T19386] dump_stack_lvl+0xd6/0x122 [ 532.562765][T19386] dump_stack+0x11/0x1b [ 532.566948][T19386] should_fail+0x23c/0x250 [ 532.571457][T19386] ? apply_wqattrs_prepare+0xbe/0x630 [ 532.576842][T19386] __should_failslab+0x81/0x90 [ 532.581603][T19386] should_failslab+0x5/0x20 [ 532.586105][T19386] kmem_cache_alloc_trace+0x52/0x350 [ 532.591396][T19386] ? apply_wqattrs_prepare+0x5f/0x630 [ 532.596773][T19386] apply_wqattrs_prepare+0xbe/0x630 [ 532.602030][T19386] ? vsnprintf+0xe8f/0xed0 [ 532.606524][T19386] apply_workqueue_attrs+0x9e/0x100 [ 532.611737][T19386] alloc_workqueue+0x777/0xad0 [ 532.616507][T19386] ? preempt_count_add+0x4e/0x90 [ 532.621511][T19386] ? _raw_spin_unlock+0x2e/0x50 [ 532.626418][T19386] ? bd_prepare_to_claim+0x1ac/0x200 [ 532.631704][T19386] loop_configure+0x70e/0xf30 [ 532.636499][T19386] lo_ioctl+0x583/0x1270 [ 532.640794][T19386] ? folio_mark_dirty+0x84/0xe0 [ 532.645658][T19386] ? unlock_page+0x37/0x50 [ 532.650089][T19386] ? __rcu_read_unlock+0x5c/0x290 [ 532.655118][T19386] ? blkdev_common_ioctl+0x438/0x1180 [ 532.660558][T19386] ? selinux_file_ioctl+0x522/0x590 [ 532.665756][T19386] ? do_vfs_ioctl+0x819/0x14a0 [ 532.670535][T19386] ? lo_release+0x120/0x120 [ 532.675036][T19386] blkdev_ioctl+0x20e/0x440 [ 532.679541][T19386] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 532.684998][T19386] __se_sys_ioctl+0xcb/0x140 [ 532.689600][T19386] __x64_sys_ioctl+0x3f/0x50 [ 532.694234][T19386] do_syscall_64+0x44/0xd0 [ 532.698651][T19386] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 532.704583][T19386] RIP: 0033:0x7f867f5948b7 [ 532.708991][T19386] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 532.728722][T19386] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 532.737212][T19386] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 532.745209][T19386] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 532.753278][T19386] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 532.761387][T19386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 532.769360][T19386] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 532.777338][T19386] [ 532.782279][T19387] FAULT_INJECTION: forcing a failure. [ 532.782279][T19387] name failslab, interval 1, probability 0, space 0, times 0 [ 532.795103][T19387] CPU: 1 PID: 19387 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 532.803916][T19387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.813966][T19387] Call Trace: [ 532.817233][T19387] [ 532.820168][T19387] dump_stack_lvl+0xd6/0x122 [ 532.824759][T19387] dump_stack+0x11/0x1b [ 532.828912][T19387] should_fail+0x23c/0x250 [ 532.833363][T19387] ? apply_wqattrs_prepare+0x5f/0x630 [ 532.838739][T19387] __should_failslab+0x81/0x90 [ 532.843527][T19387] should_failslab+0x5/0x20 [ 532.848373][T19387] kmem_cache_alloc_trace+0x52/0x350 [ 532.853701][T19387] ? kzalloc+0x16/0x20 [ 532.857772][T19387] apply_wqattrs_prepare+0x5f/0x630 [ 532.863021][T19387] ? _raw_spin_unlock+0x2e/0x50 [ 532.867870][T19387] ? __mutex_lock+0x21d/0x5a0 [ 532.872606][T19387] apply_workqueue_attrs+0x9e/0x100 [ 532.877809][T19387] alloc_workqueue+0x777/0xad0 [ 532.882637][T19387] ? preempt_count_add+0x4e/0x90 [ 532.887618][T19387] ? _raw_spin_unlock+0x2e/0x50 [ 532.892473][T19387] ? bd_prepare_to_claim+0x1ac/0x200 [ 532.897836][T19387] loop_configure+0x70e/0xf30 [ 532.902511][T19387] lo_ioctl+0x583/0x1270 [ 532.906754][T19387] ? folio_mark_dirty+0x84/0xe0 [ 532.911669][T19387] ? unlock_page+0x37/0x50 [ 532.916157][T19387] ? __rcu_read_unlock+0x5c/0x290 [ 532.921184][T19387] ? blkdev_common_ioctl+0x438/0x1180 [ 532.926681][T19387] ? selinux_file_ioctl+0x522/0x590 [ 532.931877][T19387] ? do_vfs_ioctl+0x819/0x14a0 [ 532.936671][T19387] ? lo_release+0x120/0x120 [ 532.941243][T19387] blkdev_ioctl+0x20e/0x440 [ 532.945783][T19387] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 532.951284][T19387] __se_sys_ioctl+0xcb/0x140 [ 532.955962][T19387] __x64_sys_ioctl+0x3f/0x50 [ 532.960575][T19387] do_syscall_64+0x44/0xd0 [ 532.964991][T19387] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 532.970884][T19387] RIP: 0033:0x7fcb0eeb18b7 [ 532.975317][T19387] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 532.995021][T19387] RSP: 002b:00007fcb0e627f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 533.003480][T19387] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0eeb18b7 [ 533.011578][T19387] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 22:16:01 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x203, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:16:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 21) 22:16:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 19) [ 533.019625][T19387] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 533.027593][T19387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 533.035588][T19387] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 533.043556][T19387] [ 533.050795][T19388] loop3: detected capacity change from 0 to 5 [ 533.093422][T19388] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 533.148478][T19395] loop5: detected capacity change from 0 to 4096 [ 533.161263][T19388] loop3: detected capacity change from 0 to 5 [ 533.167804][T19388] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 533.181698][T19396] loop0: detected capacity change from 0 to 6 [ 533.190138][T19396] FAT-fs (loop0): Directory bread(block 6) failed 22:16:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, 0x0) 22:16:01 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 533.313533][T19400] FAULT_INJECTION: forcing a failure. [ 533.313533][T19400] name failslab, interval 1, probability 0, space 0, times 0 [ 533.326275][T19400] CPU: 0 PID: 19400 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 533.335043][T19400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.345099][T19400] Call Trace: [ 533.348441][T19400] [ 533.351439][T19400] dump_stack_lvl+0xd6/0x122 [ 533.356066][T19400] dump_stack+0x11/0x1b [ 533.360273][T19400] should_fail+0x23c/0x250 [ 533.364689][T19400] __should_failslab+0x81/0x90 [ 533.369516][T19400] should_failslab+0x5/0x20 [ 533.374024][T19400] kmem_cache_alloc_node+0x61/0x2d0 [ 533.379250][T19400] ? should_fail+0xd6/0x250 [ 533.383839][T19400] ? should_fail+0xd6/0x250 [ 533.388352][T19400] ? alloc_unbound_pwq+0x3e6/0x780 [ 533.393542][T19400] alloc_unbound_pwq+0x3e6/0x780 [ 533.398488][T19400] apply_wqattrs_prepare+0x1ed/0x630 [ 533.403780][T19400] ? vsnprintf+0xe8f/0xed0 [ 533.408263][T19400] apply_workqueue_attrs+0x9e/0x100 [ 533.413474][T19400] alloc_workqueue+0x777/0xad0 [ 533.418245][T19400] ? preempt_count_add+0x4e/0x90 [ 533.423200][T19400] ? _raw_spin_unlock+0x2e/0x50 [ 533.428061][T19400] ? bd_prepare_to_claim+0x1ac/0x200 [ 533.433349][T19400] loop_configure+0x70e/0xf30 [ 533.438031][T19400] lo_ioctl+0x583/0x1270 [ 533.442364][T19400] ? folio_mark_dirty+0x84/0xe0 [ 533.447216][T19400] ? unlock_page+0x37/0x50 [ 533.451665][T19400] ? __rcu_read_unlock+0x5c/0x290 [ 533.456694][T19400] ? blkdev_common_ioctl+0x438/0x1180 [ 533.462326][T19400] ? selinux_file_ioctl+0x522/0x590 [ 533.467534][T19400] ? do_vfs_ioctl+0x819/0x14a0 [ 533.472342][T19400] ? lo_release+0x120/0x120 [ 533.476839][T19400] blkdev_ioctl+0x20e/0x440 [ 533.481425][T19400] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 533.486915][T19400] __se_sys_ioctl+0xcb/0x140 [ 533.491512][T19400] __x64_sys_ioctl+0x3f/0x50 [ 533.496163][T19400] do_syscall_64+0x44/0xd0 [ 533.500628][T19400] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 533.506786][T19400] RIP: 0033:0x7f867f5948b7 [ 533.511262][T19400] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 533.530938][T19400] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 533.539383][T19400] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 533.547349][T19400] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 533.555335][T19400] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 533.563410][T19400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 533.571379][T19400] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 533.579357][T19400] [ 533.582650][T19407] loop3: detected capacity change from 0 to 5 [ 533.588848][T19401] FAULT_INJECTION: forcing a failure. [ 533.588848][T19401] name failslab, interval 1, probability 0, space 0, times 0 [ 533.601629][T19401] CPU: 1 PID: 19401 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 533.610455][T19401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.620608][T19401] Call Trace: [ 533.623902][T19401] [ 533.626828][T19401] dump_stack_lvl+0xd6/0x122 [ 533.631520][T19401] dump_stack+0x11/0x1b [ 533.635670][T19401] should_fail+0x23c/0x250 [ 533.640118][T19401] ? apply_wqattrs_prepare+0xbe/0x630 [ 533.645490][T19401] __should_failslab+0x81/0x90 [ 533.650343][T19401] should_failslab+0x5/0x20 [ 533.655021][T19401] kmem_cache_alloc_trace+0x52/0x350 [ 533.660307][T19401] ? apply_wqattrs_prepare+0x5f/0x630 [ 533.665681][T19401] apply_wqattrs_prepare+0xbe/0x630 [ 533.671022][T19401] ? _raw_spin_unlock+0x2e/0x50 [ 533.675944][T19401] ? __mutex_lock+0x21d/0x5a0 [ 533.680617][T19401] apply_workqueue_attrs+0x9e/0x100 [ 533.685879][T19401] alloc_workqueue+0x777/0xad0 [ 533.690670][T19401] ? preempt_count_add+0x4e/0x90 [ 533.695610][T19401] ? _raw_spin_unlock+0x2e/0x50 [ 533.700574][T19401] ? bd_prepare_to_claim+0x1ac/0x200 [ 533.705869][T19401] loop_configure+0x70e/0xf30 [ 533.710555][T19401] lo_ioctl+0x583/0x1270 [ 533.714796][T19401] ? debug_smp_processor_id+0x18/0x20 [ 533.720380][T19401] ? delay_tsc+0x96/0xe0 [ 533.724632][T19401] ? __rcu_read_unlock+0x5c/0x290 [ 533.729720][T19401] ? blkdev_common_ioctl+0x438/0x1180 [ 533.735093][T19401] ? selinux_file_ioctl+0x522/0x590 [ 533.740401][T19401] ? do_vfs_ioctl+0x819/0x14a0 [ 533.745257][T19401] ? lo_release+0x120/0x120 [ 533.749759][T19401] blkdev_ioctl+0x20e/0x440 [ 533.754363][T19401] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 533.759845][T19401] __se_sys_ioctl+0xcb/0x140 [ 533.764468][T19401] __x64_sys_ioctl+0x3f/0x50 [ 533.769069][T19401] do_syscall_64+0x44/0xd0 [ 533.773560][T19401] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 533.779458][T19401] RIP: 0033:0x7fcb0eeb18b7 [ 533.783900][T19401] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 533.803591][T19401] RSP: 002b:00007fcb0e627f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 22:16:02 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x204, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:16:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 22) 22:16:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 20) [ 533.812004][T19401] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0eeb18b7 [ 533.819970][T19401] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 533.827938][T19401] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 533.835989][T19401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 533.843956][T19401] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 533.852012][T19401] [ 533.873274][T19407] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 533.874837][T19410] loop0: detected capacity change from 0 to 6 [ 533.891028][T19410] FAT-fs (loop0): Directory bread(block 6) failed 22:16:02 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2, r5}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x1000}]}}}]}, 0x40}}, 0x0) 22:16:02 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 22:16:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 533.922283][T19413] loop5: detected capacity change from 0 to 4096 [ 533.941333][T19407] loop3: detected capacity change from 0 to 5 [ 533.948025][T19407] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 534.016101][T19417] FAULT_INJECTION: forcing a failure. [ 534.016101][T19417] name failslab, interval 1, probability 0, space 0, times 0 [ 534.028785][T19417] CPU: 0 PID: 19417 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 534.034109][T19418] FAULT_INJECTION: forcing a failure. [ 534.034109][T19418] name failslab, interval 1, probability 0, space 0, times 0 [ 534.037635][T19417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.037648][T19417] Call Trace: [ 534.037655][T19417] [ 534.037662][T19417] dump_stack_lvl+0xd6/0x122 [ 534.037686][T19417] dump_stack+0x11/0x1b [ 534.037703][T19417] should_fail+0x23c/0x250 [ 534.079913][T19417] ? kobject_uevent_env+0x1a7/0xc40 [ 534.085146][T19417] __should_failslab+0x81/0x90 [ 534.089947][T19417] should_failslab+0x5/0x20 [ 534.094479][T19417] kmem_cache_alloc_trace+0x52/0x350 [ 534.099837][T19417] ? pwq_adjust_max_active+0x4c5/0x4e0 [ 534.105284][T19417] ? dev_uevent_filter+0x70/0x70 [ 534.110220][T19417] kobject_uevent_env+0x1a7/0xc40 [ 534.115294][T19417] ? preempt_count_add+0x4e/0x90 [ 534.120221][T19417] ? _raw_spin_unlock+0x2e/0x50 [ 534.125060][T19417] ? bd_prepare_to_claim+0x1ac/0x200 [ 534.130329][T19417] disk_force_media_change+0xe3/0x170 [ 534.135720][T19417] loop_configure+0x74d/0xf30 [ 534.140387][T19417] lo_ioctl+0x583/0x1270 [ 534.144611][T19417] ? folio_mark_dirty+0x84/0xe0 [ 534.149841][T19417] ? unlock_page+0x37/0x50 [ 534.154286][T19417] ? __rcu_read_unlock+0x5c/0x290 [ 534.159302][T19417] ? blkdev_common_ioctl+0x438/0x1180 [ 534.164657][T19417] ? selinux_file_ioctl+0x522/0x590 [ 534.169902][T19417] ? do_vfs_ioctl+0x819/0x14a0 [ 534.174742][T19417] ? lo_release+0x120/0x120 [ 534.179277][T19417] blkdev_ioctl+0x20e/0x440 [ 534.183774][T19417] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 534.189243][T19417] __se_sys_ioctl+0xcb/0x140 [ 534.194026][T19417] __x64_sys_ioctl+0x3f/0x50 [ 534.198613][T19417] do_syscall_64+0x44/0xd0 [ 534.203015][T19417] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 534.208926][T19417] RIP: 0033:0x7f867f5948b7 [ 534.213412][T19417] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 534.233012][T19417] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 534.241530][T19417] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 534.249534][T19417] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 534.257503][T19417] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 534.265763][T19417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 534.273815][T19417] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 534.281961][T19417] [ 534.285057][T19418] CPU: 1 PID: 19418 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 534.293828][T19418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.295147][T19417] loop2: detected capacity change from 0 to 264192 [ 534.303962][T19418] Call Trace: [ 534.303970][T19418] [ 534.303977][T19418] dump_stack_lvl+0xd6/0x122 [ 534.304020][T19418] dump_stack+0x11/0x1b [ 534.304039][T19418] should_fail+0x23c/0x250 [ 534.304057][T19418] __should_failslab+0x81/0x90 [ 534.334937][T19418] should_failslab+0x5/0x20 [ 534.339430][T19418] kmem_cache_alloc_node+0x61/0x2d0 [ 534.344790][T19418] ? should_fail+0xd6/0x250 [ 534.349287][T19418] ? should_fail+0xd6/0x250 [ 534.353882][T19418] ? alloc_unbound_pwq+0x3e6/0x780 [ 534.359014][T19418] alloc_unbound_pwq+0x3e6/0x780 [ 534.364010][T19418] apply_wqattrs_prepare+0x1ed/0x630 [ 534.369341][T19418] ? vsnprintf+0xe8f/0xed0 [ 534.373766][T19418] apply_workqueue_attrs+0x9e/0x100 [ 534.379117][T19418] alloc_workqueue+0x777/0xad0 [ 534.383910][T19418] ? preempt_count_add+0x4e/0x90 [ 534.388900][T19418] ? _raw_spin_unlock+0x2e/0x50 [ 534.393734][T19418] ? bd_prepare_to_claim+0x1ac/0x200 [ 534.399067][T19418] loop_configure+0x70e/0xf30 [ 534.403724][T19418] lo_ioctl+0x583/0x1270 [ 534.407951][T19418] ? folio_mark_dirty+0x84/0xe0 [ 534.412966][T19418] ? unlock_page+0x37/0x50 [ 534.417362][T19418] ? __rcu_read_unlock+0x5c/0x290 [ 534.422496][T19418] ? blkdev_common_ioctl+0x438/0x1180 [ 534.427949][T19418] ? selinux_file_ioctl+0x522/0x590 [ 534.433192][T19418] ? do_vfs_ioctl+0x819/0x14a0 [ 534.438001][T19418] ? lo_release+0x120/0x120 [ 534.442508][T19418] blkdev_ioctl+0x20e/0x440 [ 534.447190][T19418] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 534.452628][T19418] __se_sys_ioctl+0xcb/0x140 [ 534.457263][T19418] __x64_sys_ioctl+0x3f/0x50 [ 534.461834][T19418] do_syscall_64+0x44/0xd0 [ 534.466297][T19418] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 534.472244][T19418] RIP: 0033:0x7fcb0eeb18b7 [ 534.476718][T19418] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 534.496354][T19418] RSP: 002b:00007fcb0e627f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 534.504742][T19418] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0eeb18b7 22:16:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 21) [ 534.512702][T19418] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 534.520655][T19418] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 534.528617][T19418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 534.536874][T19418] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 534.544878][T19418] [ 534.563237][T19417] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 534.572498][T19417] EXT4-fs (loop2): group descriptors corrupted! 22:16:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 23) [ 534.745751][T19424] loop0: detected capacity change from 0 to 6 [ 534.755543][T19424] FAT-fs (loop0): Directory bread(block 6) failed 22:16:03 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="00000000000000001800120008000100736974000c00020008000200068cb4e51364732a10e9c16585ba4ad9cf590362d8cb0d12e6ab82377634b2365a6a47fe6bfa4fabaf353dc6b50141b33a44d8dd21f1a8b524fef9f5f8a7ecc491acfdd09b30939b0c92bbe4acffa35e08a72ff15edc8a18628d2c2fc903f6761336cc8cee536f5338932318509020802efcd693f1ca0937e56d2a3192226321d5a3dcfa568a585dad3219e9a5078957912cf400a015f50b581c0b6eadba592e39c796531fc1ae6969b8258160358398d0c1175c3f426b770f2a9c4bbad87df2c6fd27192fbbe0a2af4a70233acffaf84add1b82b0a7d9858997c30bdaae237c71171f83", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2, r5}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x1000}]}}}]}, 0x40}}, 0x0) [ 534.791861][T19427] loop3: detected capacity change from 0 to 5 [ 534.816012][T19429] loop5: detected capacity change from 0 to 6 [ 534.822571][T19430] FAULT_INJECTION: forcing a failure. [ 534.822571][T19430] name failslab, interval 1, probability 0, space 0, times 0 [ 534.835232][T19430] CPU: 0 PID: 19430 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 534.843991][T19430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.854051][T19430] Call Trace: [ 534.857334][T19430] [ 534.860260][T19430] dump_stack_lvl+0xd6/0x122 [ 534.864936][T19430] dump_stack+0x11/0x1b [ 534.869175][T19430] should_fail+0x23c/0x250 [ 534.873584][T19430] ? kobject_uevent_env+0x1a7/0xc40 [ 534.878858][T19430] __should_failslab+0x81/0x90 [ 534.883686][T19430] should_failslab+0x5/0x20 [ 534.888189][T19430] kmem_cache_alloc_trace+0x52/0x350 [ 534.893523][T19430] ? pwq_adjust_max_active+0x4c5/0x4e0 [ 534.899028][T19430] ? dev_uevent_filter+0x70/0x70 [ 534.903959][T19430] kobject_uevent_env+0x1a7/0xc40 [ 534.909036][T19430] ? preempt_count_add+0x4e/0x90 [ 534.913979][T19430] ? _raw_spin_unlock+0x2e/0x50 [ 534.918828][T19430] ? bd_prepare_to_claim+0x1ac/0x200 [ 534.924116][T19430] disk_force_media_change+0xe3/0x170 [ 534.929602][T19430] loop_configure+0x74d/0xf30 [ 534.934283][T19430] lo_ioctl+0x583/0x1270 [ 534.938518][T19430] ? folio_mark_dirty+0x84/0xe0 [ 534.938965][T19427] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 534.943414][T19430] ? unlock_page+0x37/0x50 [ 534.943437][T19430] ? __rcu_read_unlock+0x5c/0x290 [ 534.963000][T19430] ? blkdev_common_ioctl+0x438/0x1180 [ 534.968379][T19430] ? selinux_file_ioctl+0x522/0x590 [ 534.973586][T19430] ? do_vfs_ioctl+0x819/0x14a0 [ 534.978419][T19430] ? lo_release+0x120/0x120 [ 534.982929][T19430] blkdev_ioctl+0x20e/0x440 [ 534.987438][T19430] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 534.992902][T19430] __se_sys_ioctl+0xcb/0x140 [ 534.997504][T19430] __x64_sys_ioctl+0x3f/0x50 [ 535.002202][T19430] do_syscall_64+0x44/0xd0 [ 535.006622][T19430] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 535.012603][T19430] RIP: 0033:0x7fcb0eeb18b7 [ 535.017013][T19430] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 535.036680][T19430] RSP: 002b:00007fcb0e627f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 535.045092][T19430] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0eeb18b7 [ 535.053165][T19430] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 535.059690][T19429] FAT-fs (loop5): Directory bread(block 6) failed [ 535.061131][T19430] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 535.061147][T19430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 535.061159][T19430] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 22:16:03 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 535.092208][T19430] [ 535.098811][T19430] loop4: detected capacity change from 0 to 5 [ 535.113072][T19430] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 535.135698][T19427] loop3: detected capacity change from 0 to 5 [ 535.142628][T19427] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 535.155350][T19535] loop0: detected capacity change from 0 to 6 [ 535.155366][T19536] FAULT_INJECTION: forcing a failure. [ 535.155366][T19536] name failslab, interval 1, probability 0, space 0, times 0 [ 535.174062][T19536] CPU: 1 PID: 19536 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 535.182967][T19536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.193017][T19536] Call Trace: [ 535.196295][T19536] [ 535.199232][T19536] dump_stack_lvl+0xd6/0x122 [ 535.203822][T19536] dump_stack+0x11/0x1b [ 535.207981][T19536] should_fail+0x23c/0x250 [ 535.212571][T19536] ? kzalloc+0x1d/0x30 [ 535.216663][T19536] __should_failslab+0x81/0x90 [ 535.221426][T19536] should_failslab+0x5/0x20 [ 535.225935][T19536] __kmalloc+0x6f/0x370 [ 535.230087][T19536] kzalloc+0x1d/0x30 [ 535.234102][T19536] kobject_get_path+0x7c/0x110 [ 535.238871][T19536] kobject_uevent_env+0x1be/0xc40 [ 535.243901][T19536] ? preempt_count_add+0x4e/0x90 [ 535.248897][T19536] ? _raw_spin_unlock+0x2e/0x50 [ 535.253748][T19536] ? bd_prepare_to_claim+0x1ac/0x200 [ 535.259037][T19536] disk_force_media_change+0xe3/0x170 [ 535.264507][T19536] loop_configure+0x74d/0xf30 [ 535.269181][T19536] lo_ioctl+0x583/0x1270 [ 535.273442][T19536] ? folio_mark_dirty+0x84/0xe0 [ 535.278297][T19536] ? unlock_page+0x37/0x50 [ 535.282838][T19536] ? __rcu_read_unlock+0x5c/0x290 [ 535.287865][T19536] ? blkdev_common_ioctl+0x438/0x1180 [ 535.293236][T19536] ? selinux_file_ioctl+0x522/0x590 [ 535.298556][T19536] ? do_vfs_ioctl+0x819/0x14a0 [ 535.303316][T19536] ? lo_release+0x120/0x120 [ 535.307882][T19536] blkdev_ioctl+0x20e/0x440 [ 535.312394][T19536] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 535.317855][T19536] __se_sys_ioctl+0xcb/0x140 [ 535.322459][T19536] __x64_sys_ioctl+0x3f/0x50 [ 535.327046][T19536] do_syscall_64+0x44/0xd0 [ 535.331461][T19536] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 535.337446][T19536] RIP: 0033:0x7f867f5948b7 [ 535.341917][T19536] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 535.361522][T19536] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 535.369965][T19536] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 535.378003][T19536] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 535.386240][T19536] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 22:16:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 22) 22:16:03 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x296, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 535.394211][T19536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 535.402235][T19536] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 535.410434][T19536] [ 535.421650][T19536] loop2: detected capacity change from 0 to 264192 [ 535.429869][T19535] FAT-fs (loop0): Directory bread(block 6) failed 22:16:03 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2, r5}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x1000}]}}}]}, 0x40}}, 0x0) [ 535.486146][T19536] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 535.495409][T19536] EXT4-fs (loop2): group descriptors corrupted! 22:16:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 24) [ 535.680218][T19542] loop5: detected capacity change from 0 to 6 [ 535.686733][T19546] loop3: detected capacity change from 0 to 5 [ 535.696694][T19542] FAT-fs (loop5): Directory bread(block 6) failed [ 535.711721][T19549] FAULT_INJECTION: forcing a failure. [ 535.711721][T19549] name failslab, interval 1, probability 0, space 0, times 0 [ 535.711871][T19546] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 535.724388][T19549] CPU: 1 PID: 19549 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 535.743317][T19549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.753373][T19549] Call Trace: [ 535.756675][T19549] [ 535.759606][T19549] dump_stack_lvl+0xd6/0x122 [ 535.764224][T19549] dump_stack+0x11/0x1b [ 535.768382][T19549] should_fail+0x23c/0x250 [ 535.772799][T19549] ? kzalloc+0x1d/0x30 [ 535.776870][T19549] __should_failslab+0x81/0x90 [ 535.781644][T19549] should_failslab+0x5/0x20 [ 535.786174][T19549] __kmalloc+0x6f/0x370 [ 535.790427][T19549] kzalloc+0x1d/0x30 [ 535.794320][T19549] kobject_get_path+0x7c/0x110 [ 535.799095][T19549] kobject_uevent_env+0x1be/0xc40 [ 535.804165][T19549] ? preempt_count_add+0x4e/0x90 [ 535.809153][T19549] ? _raw_spin_unlock+0x2e/0x50 [ 535.814083][T19549] ? bd_prepare_to_claim+0x1ac/0x200 [ 535.819433][T19549] disk_force_media_change+0xe3/0x170 [ 535.824835][T19549] loop_configure+0x74d/0xf30 [ 535.829518][T19549] lo_ioctl+0x583/0x1270 [ 535.833761][T19549] ? folio_mark_dirty+0x84/0xe0 [ 535.838783][T19549] ? unlock_page+0x37/0x50 [ 535.843265][T19549] ? __rcu_read_unlock+0x5c/0x290 [ 535.848301][T19549] ? blkdev_common_ioctl+0x438/0x1180 [ 535.853700][T19549] ? selinux_file_ioctl+0x522/0x590 [ 535.858921][T19549] ? do_vfs_ioctl+0x819/0x14a0 [ 535.863691][T19549] ? lo_release+0x120/0x120 [ 535.868191][T19549] blkdev_ioctl+0x20e/0x440 [ 535.872692][T19549] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 535.878256][T19549] __se_sys_ioctl+0xcb/0x140 [ 535.882909][T19549] __x64_sys_ioctl+0x3f/0x50 [ 535.887582][T19549] do_syscall_64+0x44/0xd0 [ 535.891999][T19549] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 535.897941][T19549] RIP: 0033:0x7fcb0eeb18b7 [ 535.902426][T19549] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 535.922050][T19549] RSP: 002b:00007fcb0e627f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 535.930477][T19549] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0eeb18b7 [ 535.938439][T19549] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 535.946402][T19549] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 535.954383][T19549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 535.962437][T19549] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 535.970439][T19549] 22:16:04 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 535.980438][T19549] loop4: detected capacity change from 0 to 5 22:16:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 23) 22:16:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 536.007813][T19549] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 536.007963][T19651] loop0: detected capacity change from 0 to 6 [ 536.030031][T19651] FAT-fs (loop0): Directory bread(block 6) failed [ 536.034959][T19546] loop3: detected capacity change from 0 to 5 [ 536.043967][T19546] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 536.086181][T19652] FAULT_INJECTION: forcing a failure. [ 536.086181][T19652] name failslab, interval 1, probability 0, space 0, times 0 [ 536.098844][T19652] CPU: 1 PID: 19652 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 536.107611][T19652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.118011][T19652] Call Trace: [ 536.121324][T19652] [ 536.124253][T19652] dump_stack_lvl+0xd6/0x122 [ 536.128849][T19652] dump_stack+0x11/0x1b [ 536.132998][T19652] should_fail+0x23c/0x250 [ 536.137440][T19652] __should_failslab+0x81/0x90 [ 536.142207][T19652] should_failslab+0x5/0x20 [ 536.146782][T19652] kmem_cache_alloc_node+0x61/0x2d0 [ 536.152025][T19652] ? __alloc_skb+0xf0/0x450 [ 536.156538][T19652] __alloc_skb+0xf0/0x450 [ 536.160948][T19652] alloc_uevent_skb+0x5b/0x120 [ 536.165781][T19652] kobject_uevent_env+0x863/0xc40 [ 536.170811][T19652] ? preempt_count_add+0x4e/0x90 [ 536.175757][T19652] ? _raw_spin_unlock+0x2e/0x50 [ 536.180708][T19652] ? bd_prepare_to_claim+0x1ac/0x200 [ 536.185994][T19652] disk_force_media_change+0xe3/0x170 [ 536.191375][T19652] loop_configure+0x74d/0xf30 [ 536.196121][T19652] lo_ioctl+0x583/0x1270 [ 536.200444][T19652] ? folio_mark_dirty+0x84/0xe0 [ 536.205296][T19652] ? unlock_page+0x37/0x50 [ 536.209770][T19652] ? __rcu_read_unlock+0x5c/0x290 [ 536.214851][T19652] ? blkdev_common_ioctl+0x438/0x1180 [ 536.220282][T19652] ? selinux_file_ioctl+0x522/0x590 [ 536.225509][T19652] ? do_vfs_ioctl+0x819/0x14a0 [ 536.230273][T19652] ? lo_release+0x120/0x120 [ 536.234831][T19652] blkdev_ioctl+0x20e/0x440 [ 536.239334][T19652] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 536.244792][T19652] __se_sys_ioctl+0xcb/0x140 [ 536.249458][T19652] __x64_sys_ioctl+0x3f/0x50 [ 536.254144][T19652] do_syscall_64+0x44/0xd0 [ 536.258561][T19652] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 536.264457][T19652] RIP: 0033:0x7f867f5948b7 [ 536.268899][T19652] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 536.288591][T19652] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 536.297076][T19652] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 536.305193][T19652] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 536.313171][T19652] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 536.321216][T19652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 536.329186][T19652] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 22:16:04 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="00000000000000001800120008000100736974000c00020008000200068cb4e51364732a10e9c16585ba4ad9cf590362d8cb0d12e6ab82377634b2365a6a47fe6bfa4fabaf353dc6b50141b33a44d8dd21f1a8b524fef9f5f8a7ecc491acfdd09b30939b0c92bbe4acffa35e08a72ff15edc8a18628d2c2fc903f6761336cc8cee536f5338932318509020802efcd693f1ca0937e56d2a3192226321d5a3dcfa568a585dad3219e9a5078957912cf400a015f50b581c0b6eadba592e39c796531fc1ae6969b8258160358398d0c1175c3f426b770f2a9c4bbad87df2c6fd27192fbbe0a2af4a70233acffaf84add1b82b0a7d9858997c30bdaae237c71171f83", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2, r5}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x1000}]}}}]}, 0x40}}, 0x0) [ 536.337159][T19652] [ 536.344032][T19652] loop2: detected capacity change from 0 to 264192 22:16:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 25) [ 536.380587][T19652] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 536.389954][T19652] EXT4-fs (loop2): group descriptors corrupted! 22:16:04 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x2e2, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 536.565607][T19660] loop5: detected capacity change from 0 to 6 [ 536.580339][T19660] FAT-fs (loop5): Directory bread(block 6) failed [ 536.588316][T19661] FAULT_INJECTION: forcing a failure. [ 536.588316][T19661] name failslab, interval 1, probability 0, space 0, times 0 [ 536.600933][T19661] CPU: 0 PID: 19661 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 536.609699][T19661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.619752][T19661] Call Trace: [ 536.623235][T19661] [ 536.626194][T19661] dump_stack_lvl+0xd6/0x122 [ 536.630914][T19661] dump_stack+0x11/0x1b [ 536.635105][T19661] should_fail+0x23c/0x250 [ 536.639524][T19661] __should_failslab+0x81/0x90 [ 536.644290][T19661] should_failslab+0x5/0x20 [ 536.648899][T19661] kmem_cache_alloc_node+0x61/0x2d0 [ 536.654097][T19661] ? __alloc_skb+0xf0/0x450 [ 536.658604][T19661] __alloc_skb+0xf0/0x450 [ 536.662937][T19661] alloc_uevent_skb+0x5b/0x120 [ 536.667745][T19661] kobject_uevent_env+0x863/0xc40 [ 536.672889][T19661] ? preempt_count_add+0x4e/0x90 [ 536.677911][T19661] ? _raw_spin_unlock+0x2e/0x50 [ 536.682764][T19661] ? bd_prepare_to_claim+0x1ac/0x200 [ 536.688192][T19661] disk_force_media_change+0xe3/0x170 [ 536.693665][T19661] loop_configure+0x74d/0xf30 [ 536.698463][T19661] lo_ioctl+0x583/0x1270 [ 536.702737][T19661] ? folio_mark_dirty+0x84/0xe0 [ 536.707603][T19661] ? unlock_page+0x37/0x50 [ 536.712022][T19661] ? __rcu_read_unlock+0x5c/0x290 [ 536.717092][T19661] ? blkdev_common_ioctl+0x438/0x1180 [ 536.722468][T19661] ? selinux_file_ioctl+0x522/0x590 [ 536.727694][T19661] ? do_vfs_ioctl+0x819/0x14a0 [ 536.732473][T19661] ? lo_release+0x120/0x120 [ 536.736977][T19661] blkdev_ioctl+0x20e/0x440 [ 536.741529][T19661] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 536.746988][T19661] __se_sys_ioctl+0xcb/0x140 [ 536.751584][T19661] __x64_sys_ioctl+0x3f/0x50 [ 536.756172][T19661] do_syscall_64+0x44/0xd0 [ 536.760644][T19661] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 536.766535][T19661] RIP: 0033:0x7fcb0eeb18b7 [ 536.770988][T19661] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 536.790666][T19661] RSP: 002b:00007fcb0e627f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 536.799083][T19661] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0eeb18b7 [ 536.807119][T19661] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 536.815088][T19661] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 536.823065][T19661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 536.831205][T19661] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 536.839179][T19661] [ 536.842639][T19661] loop4: detected capacity change from 0 to 5 [ 536.849679][T19762] loop3: detected capacity change from 0 to 5 [ 536.855965][T19763] loop0: detected capacity change from 0 to 6 [ 536.867633][T19765] FAULT_INJECTION: forcing a failure. [ 536.867633][T19765] name failslab, interval 1, probability 0, space 0, times 0 [ 536.880275][T19765] CPU: 1 PID: 19765 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 536.889035][T19765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.899085][T19765] Call Trace: [ 536.902359][T19765] [ 536.905281][T19765] dump_stack_lvl+0xd6/0x122 [ 536.909871][T19765] dump_stack+0x11/0x1b [ 536.914043][T19765] should_fail+0x23c/0x250 [ 536.918454][T19765] __should_failslab+0x81/0x90 [ 536.923240][T19765] should_failslab+0x5/0x20 [ 536.927808][T19765] kmem_cache_alloc_node+0x61/0x2d0 [ 536.933067][T19765] ? __alloc_skb+0xf0/0x450 [ 536.937595][T19765] __alloc_skb+0xf0/0x450 [ 536.941944][T19765] alloc_uevent_skb+0x5b/0x120 [ 536.946709][T19765] kobject_uevent_env+0x863/0xc40 [ 536.951767][T19765] ? preempt_count_add+0x4e/0x90 [ 536.956767][T19765] ? _raw_spin_unlock+0x2e/0x50 [ 536.961666][T19765] ? bd_prepare_to_claim+0x1ac/0x200 [ 536.966942][T19765] disk_force_media_change+0xe3/0x170 [ 536.972385][T19765] loop_configure+0x74d/0xf30 [ 536.977140][T19765] lo_ioctl+0x583/0x1270 [ 536.981380][T19765] ? folio_mark_dirty+0x84/0xe0 [ 536.986236][T19765] ? unlock_page+0x37/0x50 [ 536.990650][T19765] ? __rcu_read_unlock+0x5c/0x290 [ 536.995718][T19765] ? blkdev_common_ioctl+0x438/0x1180 [ 537.001093][T19765] ? selinux_file_ioctl+0x522/0x590 [ 537.006363][T19765] ? do_vfs_ioctl+0x819/0x14a0 [ 537.011125][T19765] ? lo_release+0x120/0x120 [ 537.015624][T19765] blkdev_ioctl+0x20e/0x440 [ 537.020126][T19765] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 537.025599][T19765] __se_sys_ioctl+0xcb/0x140 [ 537.030193][T19765] __x64_sys_ioctl+0x3f/0x50 [ 537.034782][T19765] do_syscall_64+0x44/0xd0 [ 537.039237][T19765] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 537.045133][T19765] RIP: 0033:0x7f867f5948b7 [ 537.049557][T19765] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 537.069163][T19765] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 537.077615][T19765] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 537.085585][T19765] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 537.093661][T19765] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 537.101707][T19765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 537.109715][T19765] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 22:16:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 1) [ 537.117768][T19765] [ 537.124979][T19765] loop2: detected capacity change from 0 to 264192 [ 537.136045][T19763] FAT-fs (loop0): Directory bread(block 6) failed [ 537.146194][T19765] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 537.155519][T19765] EXT4-fs (loop2): group descriptors corrupted! [ 537.168863][T19661] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 537.179230][T19762] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 24) 22:16:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 26) 22:16:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 537.220828][T19762] loop3: detected capacity change from 0 to 5 [ 537.235111][T19770] FAULT_INJECTION: forcing a failure. [ 537.235111][T19770] name failslab, interval 1, probability 0, space 0, times 0 [ 537.242905][T19762] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 537.247960][T19770] CPU: 0 PID: 19770 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 537.266858][T19770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.277102][T19770] Call Trace: [ 537.280373][T19770] [ 537.283293][T19770] dump_stack_lvl+0xd6/0x122 [ 537.287912][T19770] dump_stack+0x11/0x1b [ 537.292135][T19770] should_fail+0x23c/0x250 [ 537.296536][T19770] ? __se_sys_memfd_create+0xe9/0x350 [ 537.301954][T19770] __should_failslab+0x81/0x90 [ 537.306710][T19770] should_failslab+0x5/0x20 [ 537.311199][T19770] __kmalloc+0x6f/0x370 [ 537.315358][T19770] ? strnlen_user+0x137/0x1c0 [ 537.320143][T19770] __se_sys_memfd_create+0xe9/0x350 [ 537.325495][T19770] __x64_sys_memfd_create+0x2d/0x40 [ 537.331462][T19770] do_syscall_64+0x44/0xd0 [ 537.335924][T19770] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 537.341809][T19770] RIP: 0033:0x7f7ca8c30af9 [ 537.346283][T19770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 537.347895][T19774] FAULT_INJECTION: forcing a failure. [ 537.347895][T19774] name failslab, interval 1, probability 0, space 0, times 0 [ 537.365939][T19770] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 537.365999][T19770] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c30af9 [ 537.366011][T19770] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007f7ca8c8a180 [ 537.366022][T19770] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 537.366034][T19770] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 22:16:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 2) [ 537.418805][T19770] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 537.426764][T19770] [ 537.429776][T19774] CPU: 1 PID: 19774 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 537.438537][T19774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.448610][T19774] Call Trace: [ 537.451870][T19774] [ 537.454781][T19774] dump_stack_lvl+0xd6/0x122 [ 537.459395][T19774] dump_stack+0x11/0x1b [ 537.463541][T19774] should_fail+0x23c/0x250 [ 537.468009][T19774] ? skb_clone+0x12c/0x1f0 [ 537.472414][T19774] __should_failslab+0x81/0x90 [ 537.477176][T19774] should_failslab+0x5/0x20 [ 537.481714][T19774] kmem_cache_alloc+0x4f/0x320 [ 537.486466][T19774] skb_clone+0x12c/0x1f0 [ 537.490720][T19774] netlink_broadcast+0x4e9/0xad0 [ 537.495682][T19774] kobject_uevent_env+0x8c9/0xc40 [ 537.500694][T19774] ? preempt_count_add+0x4e/0x90 [ 537.505617][T19774] ? _raw_spin_unlock+0x2e/0x50 [ 537.510454][T19774] ? bd_prepare_to_claim+0x1ac/0x200 [ 537.515723][T19774] disk_force_media_change+0xe3/0x170 [ 537.521152][T19774] loop_configure+0x74d/0xf30 [ 537.525811][T19774] lo_ioctl+0x583/0x1270 [ 537.530031][T19774] ? folio_mark_dirty+0x84/0xe0 [ 537.534860][T19774] ? unlock_page+0x37/0x50 [ 537.539257][T19774] ? __rcu_read_unlock+0x5c/0x290 [ 537.544282][T19774] ? blkdev_common_ioctl+0x438/0x1180 [ 537.549724][T19774] ? selinux_file_ioctl+0x522/0x590 [ 537.554921][T19774] ? do_vfs_ioctl+0x819/0x14a0 [ 537.559680][T19774] ? lo_release+0x120/0x120 [ 537.564203][T19774] blkdev_ioctl+0x20e/0x440 [ 537.568770][T19774] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 537.574320][T19774] __se_sys_ioctl+0xcb/0x140 [ 537.578939][T19774] __x64_sys_ioctl+0x3f/0x50 [ 537.583530][T19774] do_syscall_64+0x44/0xd0 [ 537.587980][T19774] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 537.593875][T19774] RIP: 0033:0x7f867f5948b7 [ 537.598315][T19774] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 537.618117][T19774] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 537.626597][T19774] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 537.634586][T19774] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 537.642541][T19774] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 537.650578][T19774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 537.658524][T19774] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 537.666551][T19774] 22:16:05 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2, r5}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x1000}]}}}]}, 0x40}}, 0x0) 22:16:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 27) [ 537.671136][T19774] loop2: detected capacity change from 0 to 264192 [ 537.684442][T19774] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 537.693701][T19774] EXT4-fs (loop2): group descriptors corrupted! [ 537.801217][T19777] loop3: detected capacity change from 0 to 5 [ 537.808269][T19778] FAULT_INJECTION: forcing a failure. [ 537.808269][T19778] name failslab, interval 1, probability 0, space 0, times 0 [ 537.820902][T19778] CPU: 0 PID: 19778 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 537.829724][T19778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.839789][T19778] Call Trace: [ 537.843086][T19778] [ 537.846023][T19778] dump_stack_lvl+0xd6/0x122 [ 537.850706][T19778] dump_stack+0x11/0x1b [ 537.854860][T19778] should_fail+0x23c/0x250 [ 537.859404][T19778] __should_failslab+0x81/0x90 [ 537.864238][T19778] should_failslab+0x5/0x20 [ 537.868818][T19778] kmem_cache_alloc_node_trace+0x61/0x310 [ 537.874542][T19778] ? __kmalloc_node_track_caller+0x30/0x40 [ 537.879446][T19777] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 537.880498][T19778] __kmalloc_node_track_caller+0x30/0x40 [ 537.896269][T19778] ? alloc_uevent_skb+0x5b/0x120 [ 537.901226][T19778] __alloc_skb+0x19d/0x450 [ 537.905687][T19778] alloc_uevent_skb+0x5b/0x120 [ 537.910509][T19778] kobject_uevent_env+0x863/0xc40 [ 537.915599][T19778] ? preempt_count_add+0x4e/0x90 [ 537.918871][T19782] FAULT_INJECTION: forcing a failure. [ 537.918871][T19782] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 537.920566][T19778] ? _raw_spin_unlock+0x2e/0x50 [ 537.938414][T19778] ? bd_prepare_to_claim+0x1ac/0x200 [ 537.943700][T19778] disk_force_media_change+0xe3/0x170 [ 537.949066][T19778] loop_configure+0x74d/0xf30 [ 537.953731][T19778] lo_ioctl+0x583/0x1270 [ 537.958046][T19778] ? folio_mark_dirty+0x84/0xe0 [ 537.962878][T19778] ? unlock_page+0x37/0x50 [ 537.967286][T19778] ? __rcu_read_unlock+0x5c/0x290 [ 537.972360][T19778] ? blkdev_common_ioctl+0x438/0x1180 [ 537.977719][T19778] ? selinux_file_ioctl+0x522/0x590 [ 537.982901][T19778] ? do_vfs_ioctl+0x819/0x14a0 [ 537.987664][T19778] ? lo_release+0x120/0x120 [ 537.992151][T19778] blkdev_ioctl+0x20e/0x440 [ 537.996767][T19778] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 538.002281][T19778] __se_sys_ioctl+0xcb/0x140 [ 538.006947][T19778] __x64_sys_ioctl+0x3f/0x50 [ 538.011543][T19778] do_syscall_64+0x44/0xd0 [ 538.016020][T19778] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 538.021958][T19778] RIP: 0033:0x7fcb0eeb18b7 [ 538.026363][T19778] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 538.046033][T19778] RSP: 002b:00007fcb0e627f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 538.054455][T19778] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0eeb18b7 [ 538.062496][T19778] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 538.070451][T19778] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 538.078522][T19778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 538.086481][T19778] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 538.094515][T19778] [ 538.097516][T19782] CPU: 1 PID: 19782 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 538.102987][T19778] loop4: detected capacity change from 0 to 5 [ 538.106285][T19782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.106297][T19782] Call Trace: [ 538.106303][T19782] [ 538.106310][T19782] dump_stack_lvl+0xd6/0x122 [ 538.133125][T19782] dump_stack+0x11/0x1b [ 538.137308][T19782] should_fail+0x23c/0x250 [ 538.141773][T19782] should_fail_usercopy+0x16/0x20 [ 538.146874][T19782] _copy_from_user+0x1c/0xd0 [ 538.151567][T19782] __se_sys_memfd_create+0x125/0x350 [ 538.156926][T19782] __x64_sys_memfd_create+0x2d/0x40 [ 538.162120][T19782] do_syscall_64+0x44/0xd0 [ 538.166664][T19782] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 538.172546][T19782] RIP: 0033:0x7f7ca8c30af9 [ 538.176997][T19782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 538.196588][T19782] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 538.205069][T19782] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c30af9 [ 538.213118][T19782] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007f7ca8c8a180 [ 538.221112][T19782] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 538.229102][T19782] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 538.237086][T19782] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 538.245043][T19782] 22:16:06 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x300, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:16:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 3) 22:16:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 25) [ 538.263305][T19778] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 538.280750][T19777] loop3: detected capacity change from 0 to 5 [ 538.285524][T19783] loop0: detected capacity change from 0 to 6 [ 538.293808][T19783] FAT-fs (loop0): Directory bread(block 6) failed [ 538.300816][T19777] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 538.334898][T19787] FAULT_INJECTION: forcing a failure. [ 538.334898][T19787] name failslab, interval 1, probability 0, space 0, times 0 [ 538.347622][T19787] CPU: 0 PID: 19787 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 538.356409][T19787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.366507][T19787] Call Trace: [ 538.369860][T19787] [ 538.372792][T19787] dump_stack_lvl+0xd6/0x122 [ 538.377399][T19787] dump_stack+0x11/0x1b [ 538.381555][T19787] should_fail+0x23c/0x250 [ 538.385966][T19787] ? __kernfs_new_node+0x6a/0x340 [ 538.391059][T19787] __should_failslab+0x81/0x90 [ 538.395841][T19787] should_failslab+0x5/0x20 [ 538.400422][T19787] kmem_cache_alloc+0x4f/0x320 [ 538.405240][T19787] __kernfs_new_node+0x6a/0x340 [ 538.410101][T19787] ? ___cache_free+0x46/0x300 [ 538.414765][T19787] ? kmem_cache_free+0x65/0x110 [ 538.419602][T19787] ? kfree+0xf8/0x1f0 [ 538.423571][T19787] kernfs_create_dir_ns+0x5e/0x140 [ 538.428671][T19787] internal_create_group+0x13e/0x840 [ 538.433942][T19787] sysfs_create_group+0x1b/0x20 [ 538.438794][T19787] loop_configure+0xc58/0xf30 [ 538.443466][T19787] lo_ioctl+0x583/0x1270 [ 538.447691][T19787] ? folio_mark_dirty+0x84/0xe0 [ 538.452527][T19787] ? unlock_page+0x37/0x50 [ 538.456935][T19787] ? __rcu_read_unlock+0x5c/0x290 [ 538.462017][T19787] ? blkdev_common_ioctl+0x438/0x1180 [ 538.467406][T19787] ? selinux_file_ioctl+0x522/0x590 [ 538.472652][T19787] ? do_vfs_ioctl+0x819/0x14a0 [ 538.477448][T19787] ? lo_release+0x120/0x120 [ 538.481939][T19787] blkdev_ioctl+0x20e/0x440 [ 538.486429][T19787] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 538.491978][T19787] __se_sys_ioctl+0xcb/0x140 [ 538.496559][T19787] __x64_sys_ioctl+0x3f/0x50 [ 538.501168][T19787] do_syscall_64+0x44/0xd0 [ 538.505640][T19787] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 538.511550][T19787] RIP: 0033:0x7f867f5948b7 [ 538.515956][T19787] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 538.535549][T19787] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 538.543997][T19787] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 538.551953][T19787] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 538.560023][T19787] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 538.567982][T19787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 538.576039][T19787] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 22:16:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:06 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2, r5}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x1000}]}}}]}, 0x40}}, 0x0) [ 538.584029][T19787] [ 538.587087][T19787] loop2: detected capacity change from 0 to 264192 [ 538.617016][T19787] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 538.626312][T19787] EXT4-fs (loop2): group descriptors corrupted! 22:16:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 28) [ 538.736575][T19791] FAULT_INJECTION: forcing a failure. [ 538.736575][T19791] name failslab, interval 1, probability 0, space 0, times 0 [ 538.749392][T19791] CPU: 1 PID: 19791 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 538.758196][T19791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.768313][T19791] Call Trace: [ 538.771621][T19791] [ 538.774544][T19791] dump_stack_lvl+0xd6/0x122 [ 538.779156][T19791] dump_stack+0x11/0x1b [ 538.783311][T19791] should_fail+0x23c/0x250 [ 538.787745][T19791] ? shmem_alloc_inode+0x22/0x30 [ 538.792713][T19791] __should_failslab+0x81/0x90 [ 538.797469][T19791] ? shmem_match+0xa0/0xa0 [ 538.802031][T19791] should_failslab+0x5/0x20 [ 538.806603][T19791] kmem_cache_alloc+0x4f/0x320 [ 538.811438][T19791] ? shmem_match+0xa0/0xa0 [ 538.815936][T19791] shmem_alloc_inode+0x22/0x30 [ 538.820731][T19791] new_inode_pseudo+0x38/0x190 [ 538.825557][T19791] new_inode+0x21/0x100 [ 538.829716][T19791] shmem_get_inode+0xb7/0x490 [ 538.834463][T19791] __shmem_file_setup+0xf1/0x1d0 [ 538.839729][T19791] shmem_file_setup+0x37/0x40 [ 538.844400][T19791] __se_sys_memfd_create+0x1c1/0x350 [ 538.849693][T19791] __x64_sys_memfd_create+0x2d/0x40 [ 538.854891][T19791] do_syscall_64+0x44/0xd0 [ 538.859336][T19791] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 538.865232][T19791] RIP: 0033:0x7f7ca8c30af9 [ 538.869693][T19791] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 538.889302][T19791] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 538.897711][T19791] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c30af9 [ 538.905678][T19791] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007f7ca8c8a180 [ 538.913652][T19791] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 538.922225][T19791] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 22:16:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 4) [ 538.930188][T19791] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 538.938296][T19791] [ 538.963136][T19795] FAULT_INJECTION: forcing a failure. [ 538.963136][T19795] name failslab, interval 1, probability 0, space 0, times 0 [ 538.975852][T19795] CPU: 1 PID: 19795 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 538.984620][T19795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.994797][T19795] Call Trace: [ 538.998072][T19795] [ 539.000998][T19795] dump_stack_lvl+0xd6/0x122 [ 539.005687][T19795] dump_stack+0x11/0x1b [ 539.009845][T19795] should_fail+0x23c/0x250 [ 539.014250][T19795] ? skb_clone+0x12c/0x1f0 [ 539.018686][T19795] __should_failslab+0x81/0x90 [ 539.023454][T19795] should_failslab+0x5/0x20 [ 539.028028][T19795] kmem_cache_alloc+0x4f/0x320 [ 539.032825][T19795] skb_clone+0x12c/0x1f0 [ 539.037094][T19795] netlink_broadcast+0x4e9/0xad0 [ 539.042039][T19795] kobject_uevent_env+0x8c9/0xc40 [ 539.047182][T19795] ? preempt_count_add+0x4e/0x90 [ 539.052204][T19795] ? _raw_spin_unlock+0x2e/0x50 [ 539.057067][T19795] ? bd_prepare_to_claim+0x1ac/0x200 [ 539.062345][T19795] disk_force_media_change+0xe3/0x170 [ 539.067728][T19795] loop_configure+0x74d/0xf30 [ 539.072480][T19795] lo_ioctl+0x583/0x1270 [ 539.076714][T19795] ? folio_mark_dirty+0x84/0xe0 [ 539.081562][T19795] ? unlock_page+0x37/0x50 [ 539.085977][T19795] ? __rcu_read_unlock+0x5c/0x290 [ 539.091036][T19795] ? blkdev_common_ioctl+0x438/0x1180 [ 539.096479][T19795] ? selinux_file_ioctl+0x522/0x590 [ 539.101695][T19795] ? do_vfs_ioctl+0x819/0x14a0 [ 539.106468][T19795] ? lo_release+0x120/0x120 [ 539.110968][T19795] blkdev_ioctl+0x20e/0x440 [ 539.115468][T19795] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 539.120928][T19795] __se_sys_ioctl+0xcb/0x140 [ 539.125516][T19795] __x64_sys_ioctl+0x3f/0x50 [ 539.130104][T19795] do_syscall_64+0x44/0xd0 [ 539.134520][T19795] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 539.140853][T19795] RIP: 0033:0x7fcb0eeb18b7 [ 539.145256][T19795] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 539.164861][T19795] RSP: 002b:00007fcb0e627f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 539.173398][T19795] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0eeb18b7 [ 539.181426][T19795] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 539.189393][T19795] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 539.197361][T19795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 539.205423][T19795] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 539.213428][T19795] [ 539.217730][T19795] loop4: detected capacity change from 0 to 5 [ 539.248259][T19797] loop0: detected capacity change from 0 to 6 [ 539.255194][T19798] loop3: detected capacity change from 0 to 5 [ 539.255408][T19795] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 539.274888][T19797] FAT-fs (loop0): Directory bread(block 6) failed [ 539.303381][T19798] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 26) 22:16:07 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="00000000000000001800120008000100736974000c00020008000200068cb4e51364732a10e9c16585ba4ad9cf590362d8cb0d12e6ab82377634b2365a6a47fe6bfa4fabaf353dc6b50141b33a44d8dd21f1a8b524fef9f5f8a7ecc491acfdd09b30939b0c92bbe4acffa35e08a72ff15edc8a18628d2c2fc903f6761336cc8cee536f5338932318509020802efcd693f1ca0937e56d2a3192226321d5a3dcfa568a585dad3219e9a5078957912cf400a015f50b581c0b6eadba592e39c796531fc1ae6969b8258160358398d0c1175c3f426b770f2a9c4bbad87df2c6fd27192fbbe0a2af4a70233acffaf84add1b82b0a7d9858997c30bdaae237c71171f83", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) [ 539.319470][T19798] loop3: detected capacity change from 0 to 5 [ 539.328429][T19798] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 539.371000][T19801] FAULT_INJECTION: forcing a failure. [ 539.371000][T19801] name failslab, interval 1, probability 0, space 0, times 0 [ 539.383744][T19801] CPU: 0 PID: 19801 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 539.392519][T19801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.402574][T19801] Call Trace: [ 539.405852][T19801] [ 539.408777][T19801] dump_stack_lvl+0xd6/0x122 [ 539.413362][T19801] dump_stack+0x11/0x1b [ 539.417609][T19801] should_fail+0x23c/0x250 [ 539.422024][T19801] ? __kernfs_new_node+0x6a/0x340 [ 539.427051][T19801] __should_failslab+0x81/0x90 [ 539.431868][T19801] should_failslab+0x5/0x20 [ 539.436371][T19801] kmem_cache_alloc+0x4f/0x320 [ 539.441176][T19801] __kernfs_new_node+0x6a/0x340 [ 539.446034][T19801] ? __down_write_common+0x42/0x7b0 [ 539.451254][T19801] ? idr_alloc_cyclic+0x26b/0x2f0 [ 539.456350][T19801] ? __down_write_common+0x42/0x7b0 [ 539.461601][T19801] ? rb_insert_color+0x7e/0x310 [ 539.466523][T19801] kernfs_new_node+0x5b/0xd0 [ 539.471227][T19801] __kernfs_create_file+0x45/0x1a0 [ 539.476359][T19801] ? dev_attr_show+0x90/0x90 [ 539.480959][T19801] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 539.486369][T19801] internal_create_group+0x2dd/0x840 [ 539.491660][T19801] sysfs_create_group+0x1b/0x20 [ 539.496528][T19801] loop_configure+0xc58/0xf30 [ 539.501242][T19801] lo_ioctl+0x583/0x1270 [ 539.505547][T19801] ? folio_mark_dirty+0x84/0xe0 [ 539.510564][T19801] ? unlock_page+0x37/0x50 [ 539.514990][T19801] ? __rcu_read_unlock+0x5c/0x290 [ 539.520256][T19801] ? blkdev_common_ioctl+0x438/0x1180 [ 539.525797][T19801] ? selinux_file_ioctl+0x522/0x590 [ 539.531000][T19801] ? do_vfs_ioctl+0x819/0x14a0 [ 539.535773][T19801] ? lo_release+0x120/0x120 [ 539.540372][T19801] blkdev_ioctl+0x20e/0x440 [ 539.544939][T19801] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 539.550525][T19801] __se_sys_ioctl+0xcb/0x140 [ 539.555197][T19801] __x64_sys_ioctl+0x3f/0x50 [ 539.559801][T19801] do_syscall_64+0x44/0xd0 [ 539.564220][T19801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 539.570117][T19801] RIP: 0033:0x7f867f5948b7 [ 539.574527][T19801] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 539.585884][T19805] FAULT_INJECTION: forcing a failure. [ 539.585884][T19805] name failslab, interval 1, probability 0, space 0, times 0 [ 539.594139][T19801] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 539.594171][T19801] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 539.594182][T19801] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 539.594194][T19801] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 539.639028][T19801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 539.647063][T19801] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 539.655021][T19801] [ 539.658022][T19805] CPU: 1 PID: 19805 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 539.666892][T19805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.677041][T19805] Call Trace: [ 539.680312][T19805] [ 539.683227][T19805] dump_stack_lvl+0xd6/0x122 [ 539.687850][T19805] dump_stack+0x11/0x1b [ 539.691990][T19805] should_fail+0x23c/0x250 [ 539.696479][T19805] ? __kernfs_new_node+0x6a/0x340 [ 539.701491][T19805] __should_failslab+0x81/0x90 [ 539.706310][T19805] should_failslab+0x5/0x20 [ 539.710801][T19805] kmem_cache_alloc+0x4f/0x320 [ 539.715552][T19805] __kernfs_new_node+0x6a/0x340 [ 539.720390][T19805] ? ___cache_free+0x46/0x300 [ 539.725126][T19805] ? kmem_cache_free+0x65/0x110 [ 539.729963][T19805] ? kfree+0xf8/0x1f0 [ 539.733927][T19805] kernfs_create_dir_ns+0x5e/0x140 [ 539.739034][T19805] internal_create_group+0x13e/0x840 [ 539.744413][T19805] sysfs_create_group+0x1b/0x20 [ 539.749247][T19805] loop_configure+0xc58/0xf30 [ 539.753931][T19805] lo_ioctl+0x583/0x1270 [ 539.758192][T19805] ? folio_mark_dirty+0x84/0xe0 [ 539.763026][T19805] ? unlock_page+0x37/0x50 [ 539.767493][T19805] ? __rcu_read_unlock+0x5c/0x290 [ 539.772506][T19805] ? blkdev_common_ioctl+0x438/0x1180 [ 539.777885][T19805] ? selinux_file_ioctl+0x522/0x590 [ 539.783134][T19805] ? do_vfs_ioctl+0x819/0x14a0 [ 539.787910][T19805] ? lo_release+0x120/0x120 [ 539.792403][T19805] blkdev_ioctl+0x20e/0x440 [ 539.796914][T19805] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 539.802359][T19805] __se_sys_ioctl+0xcb/0x140 [ 539.807020][T19805] __x64_sys_ioctl+0x3f/0x50 [ 539.811595][T19805] do_syscall_64+0x44/0xd0 [ 539.816057][T19805] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 539.821941][T19805] RIP: 0033:0x7fcb0eeb18b7 [ 539.826341][T19805] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 539.845930][T19805] RSP: 002b:00007fcb0e627f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 539.854325][T19805] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0eeb18b7 [ 539.862326][T19805] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 22:16:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 539.870319][T19805] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 539.878274][T19805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 539.886226][T19805] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 539.894184][T19805] [ 539.897390][T19805] loop4: detected capacity change from 0 to 5 [ 539.905875][T19801] loop2: detected capacity change from 0 to 264192 22:16:08 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x302, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 539.921115][T19805] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 539.935336][T19806] loop0: detected capacity change from 0 to 6 [ 539.937255][T19801] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 539.950906][T19801] EXT4-fs (loop2): group descriptors corrupted! [ 539.959495][T19806] FAT-fs (loop0): Directory bread(block 6) failed [ 539.986474][T19809] FAULT_INJECTION: forcing a failure. [ 539.986474][T19809] name failslab, interval 1, probability 0, space 0, times 0 [ 539.999161][T19809] CPU: 1 PID: 19809 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 540.007926][T19809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.018157][T19809] Call Trace: [ 540.021433][T19809] [ 540.024361][T19809] dump_stack_lvl+0xd6/0x122 [ 540.028953][T19809] dump_stack+0x11/0x1b [ 540.033112][T19809] should_fail+0x23c/0x250 [ 540.037533][T19809] ? security_inode_alloc+0x30/0x180 [ 540.042842][T19809] __should_failslab+0x81/0x90 [ 540.047602][T19809] should_failslab+0x5/0x20 [ 540.052113][T19809] kmem_cache_alloc+0x4f/0x320 [ 540.056891][T19809] security_inode_alloc+0x30/0x180 [ 540.062006][T19809] inode_init_always+0x214/0x3e0 [ 540.066982][T19809] ? shmem_match+0xa0/0xa0 [ 540.071430][T19809] new_inode_pseudo+0x6f/0x190 [ 540.076196][T19809] new_inode+0x21/0x100 [ 540.080347][T19809] shmem_get_inode+0xb7/0x490 [ 540.085039][T19809] __shmem_file_setup+0xf1/0x1d0 [ 540.089978][T19809] shmem_file_setup+0x37/0x40 [ 540.094654][T19809] __se_sys_memfd_create+0x1c1/0x350 [ 540.099961][T19809] __x64_sys_memfd_create+0x2d/0x40 [ 540.105209][T19809] do_syscall_64+0x44/0xd0 [ 540.109630][T19809] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 540.115570][T19809] RIP: 0033:0x7f7ca8c30af9 [ 540.119985][T19809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 540.139590][T19809] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 540.148024][T19809] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c30af9 [ 540.155993][T19809] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007f7ca8c8a180 [ 540.163969][T19809] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 540.171939][T19809] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 22:16:08 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 22:16:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 29) 22:16:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 27) [ 540.179909][T19809] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 540.187945][T19809] 22:16:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 5) [ 540.386450][T19814] loop3: detected capacity change from 0 to 5 [ 540.404624][T19814] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 540.426888][T19819] FAULT_INJECTION: forcing a failure. [ 540.426888][T19819] name failslab, interval 1, probability 0, space 0, times 0 [ 540.439666][T19819] CPU: 0 PID: 19819 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 540.448461][T19819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.458515][T19819] Call Trace: [ 540.461800][T19819] [ 540.464727][T19819] dump_stack_lvl+0xd6/0x122 [ 540.469394][T19819] dump_stack+0x11/0x1b [ 540.473631][T19819] should_fail+0x23c/0x250 [ 540.478061][T19819] ? __d_alloc+0x36/0x370 [ 540.482646][T19819] __should_failslab+0x81/0x90 [ 540.487464][T19819] should_failslab+0x5/0x20 [ 540.491983][T19819] kmem_cache_alloc+0x4f/0x320 [ 540.496911][T19819] ? security_inode_alloc+0x138/0x180 [ 540.502300][T19819] ? __init_rwsem+0x59/0x70 [ 540.506800][T19819] __d_alloc+0x36/0x370 [ 540.511396][T19819] ? debug_smp_processor_id+0x18/0x20 [ 540.516774][T19819] d_alloc_pseudo+0x1a/0x50 [ 540.521348][T19819] alloc_file_pseudo+0x77/0x150 [ 540.526206][T19819] __shmem_file_setup+0x14c/0x1d0 [ 540.531236][T19819] shmem_file_setup+0x37/0x40 [ 540.536019][T19819] __se_sys_memfd_create+0x1c1/0x350 [ 540.541650][T19819] __x64_sys_memfd_create+0x2d/0x40 [ 540.546926][T19819] do_syscall_64+0x44/0xd0 [ 540.551345][T19819] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 540.557343][T19819] RIP: 0033:0x7f7ca8c30af9 [ 540.561758][T19819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 540.581419][T19819] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 540.589833][T19819] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c30af9 [ 540.597798][T19819] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007f7ca8c8a180 [ 540.605763][T19819] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 540.613742][T19819] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 540.621718][T19819] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 540.629748][T19819] [ 540.641051][T19814] loop3: detected capacity change from 0 to 5 [ 540.652819][T19814] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 540.668482][T19821] FAULT_INJECTION: forcing a failure. [ 540.668482][T19821] name failslab, interval 1, probability 0, space 0, times 0 [ 540.681143][T19821] CPU: 0 PID: 19821 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 22:16:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 6) [ 540.689920][T19821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.700031][T19821] Call Trace: [ 540.703312][T19821] [ 540.706242][T19821] dump_stack_lvl+0xd6/0x122 [ 540.710845][T19821] dump_stack+0x11/0x1b [ 540.715004][T19821] should_fail+0x23c/0x250 [ 540.719452][T19821] ? __kernfs_new_node+0x6a/0x340 [ 540.724624][T19821] __should_failslab+0x81/0x90 [ 540.729487][T19821] should_failslab+0x5/0x20 [ 540.733987][T19821] kmem_cache_alloc+0x4f/0x320 [ 540.738817][T19821] ? __down_write_common+0x42/0x7b0 [ 540.744031][T19821] __kernfs_new_node+0x6a/0x340 [ 540.748920][T19821] ? up_write+0x25/0xc0 [ 540.753074][T19821] kernfs_new_node+0x5b/0xd0 [ 540.757705][T19821] __kernfs_create_file+0x45/0x1a0 [ 540.762863][T19821] ? dev_attr_show+0x90/0x90 [ 540.767444][T19821] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 540.772887][T19821] internal_create_group+0x2dd/0x840 [ 540.778160][T19821] sysfs_create_group+0x1b/0x20 [ 540.783032][T19821] loop_configure+0xc58/0xf30 [ 540.787696][T19821] lo_ioctl+0x583/0x1270 [ 540.791977][T19821] ? folio_mark_dirty+0x84/0xe0 [ 540.796817][T19821] ? unlock_page+0x37/0x50 [ 540.801223][T19821] ? __rcu_read_unlock+0x5c/0x290 [ 540.806239][T19821] ? blkdev_common_ioctl+0x438/0x1180 [ 540.811600][T19821] ? selinux_file_ioctl+0x522/0x590 [ 540.816794][T19821] ? do_vfs_ioctl+0x819/0x14a0 [ 540.821566][T19821] ? lo_release+0x120/0x120 [ 540.826063][T19821] blkdev_ioctl+0x20e/0x440 [ 540.830565][T19821] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 540.836152][T19821] __se_sys_ioctl+0xcb/0x140 [ 540.840834][T19821] __x64_sys_ioctl+0x3f/0x50 [ 540.845423][T19821] do_syscall_64+0x44/0xd0 [ 540.849889][T19821] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 540.855848][T19821] RIP: 0033:0x7f867f5948b7 [ 540.860244][T19821] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 540.879868][T19821] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 540.888275][T19821] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 540.896242][T19821] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 540.904213][T19821] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 540.912182][T19821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 540.920218][T19821] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 540.928221][T19821] [ 540.931805][T19823] FAULT_INJECTION: forcing a failure. [ 540.931805][T19823] name failslab, interval 1, probability 0, space 0, times 0 [ 540.944413][T19823] CPU: 0 PID: 19823 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 540.953196][T19823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.963256][T19823] Call Trace: [ 540.966532][T19823] [ 540.969461][T19823] dump_stack_lvl+0xd6/0x122 [ 540.974162][T19823] dump_stack+0x11/0x1b [ 540.978356][T19823] should_fail+0x23c/0x250 [ 540.982956][T19823] ? __kernfs_new_node+0x6a/0x340 [ 540.987978][T19823] __should_failslab+0x81/0x90 [ 540.992765][T19823] should_failslab+0x5/0x20 [ 540.997313][T19823] kmem_cache_alloc+0x4f/0x320 [ 541.002081][T19823] __kernfs_new_node+0x6a/0x340 [ 541.006936][T19823] ? __down_write_common+0x42/0x7b0 [ 541.012195][T19823] ? idr_alloc_cyclic+0x26b/0x2f0 [ 541.017273][T19823] ? __down_write_common+0x42/0x7b0 [ 541.022468][T19823] ? rb_insert_color+0x7e/0x310 [ 541.027431][T19823] kernfs_new_node+0x5b/0xd0 [ 541.032042][T19823] __kernfs_create_file+0x45/0x1a0 [ 541.037158][T19823] ? dev_attr_show+0x90/0x90 [ 541.041749][T19823] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 541.047130][T19823] internal_create_group+0x2dd/0x840 [ 541.052415][T19823] sysfs_create_group+0x1b/0x20 [ 541.057262][T19823] loop_configure+0xc58/0xf30 [ 541.061943][T19823] lo_ioctl+0x583/0x1270 [ 541.066261][T19823] ? folio_mark_dirty+0x84/0xe0 [ 541.071230][T19823] ? unlock_page+0x37/0x50 [ 541.075710][T19823] ? __rcu_read_unlock+0x5c/0x290 [ 541.080750][T19823] ? blkdev_common_ioctl+0x438/0x1180 [ 541.086219][T19823] ? selinux_file_ioctl+0x522/0x590 [ 541.091412][T19823] ? do_vfs_ioctl+0x819/0x14a0 [ 541.096216][T19823] ? lo_release+0x120/0x120 [ 541.100716][T19823] blkdev_ioctl+0x20e/0x440 [ 541.105220][T19823] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 541.110682][T19823] __se_sys_ioctl+0xcb/0x140 [ 541.115272][T19823] __x64_sys_ioctl+0x3f/0x50 [ 541.118147][T19821] loop2: detected capacity change from 0 to 264192 [ 541.119868][T19823] do_syscall_64+0x44/0xd0 [ 541.119926][T19823] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 541.119950][T19823] RIP: 0033:0x7fcb0eeb18b7 [ 541.119963][T19823] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 541.137190][T19821] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 541.141117][T19823] RSP: 002b:00007fcb0e627f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 541.141139][T19823] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0eeb18b7 [ 541.141151][T19823] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 541.141163][T19823] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 541.160879][T19821] EXT4-fs (loop2): group descriptors corrupted! [ 541.169976][T19823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 541.169992][T19823] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 541.224505][T19823] [ 541.228175][T19825] FAULT_INJECTION: forcing a failure. [ 541.228175][T19825] name failslab, interval 1, probability 0, space 0, times 0 [ 541.240808][T19825] CPU: 0 PID: 19825 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 541.249600][T19825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.259654][T19825] Call Trace: [ 541.263003][T19825] [ 541.265933][T19825] dump_stack_lvl+0xd6/0x122 [ 541.270595][T19825] dump_stack+0x11/0x1b [ 541.274753][T19825] should_fail+0x23c/0x250 [ 541.279296][T19825] ? __alloc_file+0x2e/0x1a0 [ 541.279488][T19823] loop4: detected capacity change from 0 to 5 [ 541.283880][T19825] __should_failslab+0x81/0x90 [ 541.294694][T19825] should_failslab+0x5/0x20 [ 541.299206][T19825] kmem_cache_alloc+0x4f/0x320 [ 541.303981][T19825] __alloc_file+0x2e/0x1a0 [ 541.305561][T19823] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 541.308395][T19825] alloc_empty_file+0xcd/0x1c0 [ 541.323327][T19825] alloc_file+0x3a/0x280 [ 541.327644][T19825] alloc_file_pseudo+0xfa/0x150 [ 541.332494][T19825] __shmem_file_setup+0x14c/0x1d0 [ 541.337563][T19825] shmem_file_setup+0x37/0x40 [ 541.342238][T19825] __se_sys_memfd_create+0x1c1/0x350 [ 541.347585][T19825] __x64_sys_memfd_create+0x2d/0x40 [ 541.352798][T19825] do_syscall_64+0x44/0xd0 [ 541.357287][T19825] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 541.363177][T19825] RIP: 0033:0x7f7ca8c30af9 [ 541.367575][T19825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:16:09 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x31e, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 541.387218][T19825] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 541.395614][T19825] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c30af9 [ 541.403573][T19825] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007f7ca8c8a180 [ 541.411665][T19825] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 541.419631][T19825] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 541.427590][T19825] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 541.435550][T19825] 22:16:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 30) 22:16:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 28) 22:16:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 7) [ 541.447950][T19829] loop0: detected capacity change from 0 to 6 [ 541.468525][T19829] FAT-fs (loop0): Directory bread(block 6) failed 22:16:09 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) [ 541.591504][T19836] loop3: detected capacity change from 0 to 5 [ 541.607821][T19837] FAULT_INJECTION: forcing a failure. [ 541.607821][T19837] name failslab, interval 1, probability 0, space 0, times 0 [ 541.608374][T19839] FAULT_INJECTION: forcing a failure. [ 541.608374][T19839] name failslab, interval 1, probability 0, space 0, times 0 [ 541.620557][T19837] CPU: 0 PID: 19837 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 541.641865][T19837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.652046][T19837] Call Trace: [ 541.655307][T19837] [ 541.658245][T19837] dump_stack_lvl+0xd6/0x122 [ 541.662887][T19837] dump_stack+0x11/0x1b [ 541.667030][T19837] should_fail+0x23c/0x250 [ 541.671455][T19837] ? __kernfs_new_node+0x6a/0x340 [ 541.676470][T19837] __should_failslab+0x81/0x90 [ 541.681306][T19837] should_failslab+0x5/0x20 [ 541.685817][T19837] kmem_cache_alloc+0x4f/0x320 [ 541.690570][T19837] ? __down_write_common+0x42/0x7b0 [ 541.695833][T19837] __kernfs_new_node+0x6a/0x340 [ 541.700671][T19837] ? up_write+0x25/0xc0 [ 541.704815][T19837] kernfs_new_node+0x5b/0xd0 [ 541.709395][T19837] __kernfs_create_file+0x45/0x1a0 [ 541.714493][T19837] ? dev_attr_show+0x90/0x90 [ 541.719098][T19837] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 541.724459][T19837] internal_create_group+0x2dd/0x840 [ 541.729737][T19837] sysfs_create_group+0x1b/0x20 [ 541.734615][T19837] loop_configure+0xc58/0xf30 [ 541.739278][T19837] lo_ioctl+0x583/0x1270 [ 541.743668][T19837] ? folio_mark_dirty+0x84/0xe0 [ 541.748560][T19837] ? unlock_page+0x37/0x50 [ 541.752986][T19837] ? __rcu_read_unlock+0x5c/0x290 [ 541.758103][T19837] ? blkdev_common_ioctl+0x438/0x1180 [ 541.763520][T19837] ? selinux_file_ioctl+0x522/0x590 [ 541.768793][T19837] ? do_vfs_ioctl+0x819/0x14a0 [ 541.773738][T19837] ? lo_release+0x120/0x120 [ 541.778232][T19837] blkdev_ioctl+0x20e/0x440 [ 541.782731][T19837] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 541.788263][T19837] __se_sys_ioctl+0xcb/0x140 [ 541.792843][T19837] __x64_sys_ioctl+0x3f/0x50 [ 541.797419][T19837] do_syscall_64+0x44/0xd0 [ 541.801878][T19837] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 541.807807][T19837] RIP: 0033:0x7fcb0eeb18b7 [ 541.812222][T19837] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 541.831915][T19837] RSP: 002b:00007fcb0e627f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 541.840353][T19837] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0eeb18b7 [ 541.848308][T19837] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 541.856315][T19837] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 541.864271][T19837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 541.872226][T19837] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 541.880190][T19837] [ 541.883199][T19839] CPU: 1 PID: 19839 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 541.887692][T19838] FAULT_INJECTION: forcing a failure. [ 541.887692][T19838] name failslab, interval 1, probability 0, space 0, times 0 [ 541.892066][T19839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.892078][T19839] Call Trace: [ 541.892084][T19839] [ 541.892090][T19839] dump_stack_lvl+0xd6/0x122 [ 541.925602][T19839] dump_stack+0x11/0x1b [ 541.929758][T19839] should_fail+0x23c/0x250 [ 541.934246][T19839] ? __kernfs_new_node+0x6a/0x340 [ 541.939259][T19839] __should_failslab+0x81/0x90 [ 541.944013][T19839] should_failslab+0x5/0x20 [ 541.948573][T19839] kmem_cache_alloc+0x4f/0x320 [ 541.953328][T19839] ? __down_write_common+0x42/0x7b0 [ 541.958525][T19839] __kernfs_new_node+0x6a/0x340 [ 541.963428][T19839] ? up_write+0x25/0xc0 [ 541.967618][T19839] kernfs_new_node+0x5b/0xd0 [ 541.972196][T19839] __kernfs_create_file+0x45/0x1a0 [ 541.977294][T19839] ? dev_attr_show+0x90/0x90 [ 541.981871][T19839] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 541.987232][T19839] internal_create_group+0x2dd/0x840 [ 541.992502][T19839] sysfs_create_group+0x1b/0x20 [ 541.997343][T19839] loop_configure+0xc58/0xf30 [ 542.002019][T19839] lo_ioctl+0x583/0x1270 [ 542.006242][T19839] ? folio_mark_dirty+0x84/0xe0 [ 542.011079][T19839] ? unlock_page+0x37/0x50 [ 542.015489][T19839] ? __rcu_read_unlock+0x5c/0x290 [ 542.020590][T19839] ? blkdev_common_ioctl+0x438/0x1180 [ 542.026004][T19839] ? selinux_file_ioctl+0x522/0x590 [ 542.031190][T19839] ? do_vfs_ioctl+0x819/0x14a0 [ 542.036047][T19839] ? lo_release+0x120/0x120 [ 542.040603][T19839] blkdev_ioctl+0x20e/0x440 [ 542.045091][T19839] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 542.050535][T19839] __se_sys_ioctl+0xcb/0x140 [ 542.055119][T19839] __x64_sys_ioctl+0x3f/0x50 [ 542.059695][T19839] do_syscall_64+0x44/0xd0 [ 542.064113][T19839] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 542.069999][T19839] RIP: 0033:0x7f867f5948b7 [ 542.074406][T19839] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 542.094084][T19839] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 542.102520][T19839] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 542.110478][T19839] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 542.118434][T19839] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 542.126587][T19839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 542.134556][T19839] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 542.142513][T19839] [ 542.145515][T19838] CPU: 0 PID: 19838 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 542.148301][T19839] loop2: detected capacity change from 0 to 264192 [ 542.154281][T19838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.154293][T19838] Call Trace: [ 542.154299][T19838] [ 542.154305][T19838] dump_stack_lvl+0xd6/0x122 [ 542.154329][T19838] dump_stack+0x11/0x1b [ 542.185966][T19838] should_fail+0x23c/0x250 [ 542.190479][T19838] ? security_file_alloc+0x30/0x190 [ 542.195741][T19838] __should_failslab+0x81/0x90 [ 542.200507][T19838] should_failslab+0x5/0x20 [ 542.205026][T19838] kmem_cache_alloc+0x4f/0x320 [ 542.210315][T19838] security_file_alloc+0x30/0x190 [ 542.215375][T19838] __alloc_file+0x83/0x1a0 [ 542.219789][T19838] alloc_empty_file+0xcd/0x1c0 [ 542.224594][T19838] alloc_file+0x3a/0x280 [ 542.227670][T19837] loop4: detected capacity change from 0 to 5 [ 542.228842][T19838] alloc_file_pseudo+0xfa/0x150 [ 542.236893][T19836] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 542.239745][T19838] __shmem_file_setup+0x14c/0x1d0 [ 542.239771][T19838] shmem_file_setup+0x37/0x40 [ 542.239789][T19838] __se_sys_memfd_create+0x1c1/0x350 [ 542.251148][T19839] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 542.254945][T19838] __x64_sys_memfd_create+0x2d/0x40 [ 542.254971][T19838] do_syscall_64+0x44/0xd0 [ 542.259882][T19839] EXT4-fs (loop2): group descriptors corrupted! [ 542.265010][T19838] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 542.285724][T19837] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 542.290015][T19838] RIP: 0033:0x7f7ca8c30af9 [ 542.290034][T19838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 542.290050][T19838] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 22:16:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 8) [ 542.338461][T19838] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c30af9 [ 542.346553][T19838] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007f7ca8c8a180 [ 542.354520][T19838] RBP: 0000000000000003 R08: 0000000000001000 R09: ffffffffffffffff [ 542.362494][T19838] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 542.370489][T19838] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 542.378464][T19838] 22:16:10 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x402, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:16:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 29) 22:16:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 31) 22:16:10 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="00000000000000001800120008000100736974000c00020008000200068cb4e51364732a10e9c16585ba4ad9cf590362d8cb0d12e6ab82377634b2365a6a47fe6bfa4fabaf353dc6b50141b33a44d8dd21f1a8b524fef9f5f8a7ecc491acfdd09b30939b0c92bbe4acffa35e08a72ff15edc8a18628d2c2fc903f6761336cc8cee536f5338932318509020802efcd693f1ca0937e56d2a3192226321d5a3dcfa568a585dad3219e9a5078957912cf400a015f50b581c0b6eadba592e39c796531fc1ae6969b8258160358398d0c1175c3f426b770f2a9c4bbad87df2c6fd27192fbbe0a2af4a70233acffaf84add1b82b0a7d9858997c30bdaae237c71171f83", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2, r5}]}}}]}, 0x38}}, 0x0) [ 542.409476][T19843] loop0: detected capacity change from 0 to 6 [ 542.416351][T19843] FAT-fs (loop0): Directory bread(block 6) failed [ 542.426427][T19836] loop3: detected capacity change from 0 to 5 [ 542.439584][T19836] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 542.542958][T19847] FAULT_INJECTION: forcing a failure. [ 542.542958][T19847] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 542.556312][T19847] CPU: 0 PID: 19847 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 542.565177][T19847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.575224][T19847] Call Trace: [ 542.578528][T19847] [ 542.581461][T19847] dump_stack_lvl+0xd6/0x122 [ 542.586061][T19847] dump_stack+0x11/0x1b [ 542.590225][T19847] should_fail+0x23c/0x250 [ 542.594639][T19847] __alloc_pages+0x102/0x330 [ 542.599257][T19847] alloc_pages_vma+0x5ee/0x770 [ 542.604020][T19847] shmem_getpage_gfp+0x8bc/0x12c0 [ 542.609154][T19847] shmem_write_begin+0x7e/0x100 [ 542.614078][T19847] generic_perform_write+0x1c8/0x400 [ 542.619368][T19847] ? current_time+0xed/0x1a0 [ 542.623960][T19847] __generic_file_write_iter+0xf7/0x2b0 [ 542.629567][T19847] ? generic_write_checks+0x250/0x290 [ 542.634937][T19847] generic_file_write_iter+0x75/0x130 [ 542.640304][T19847] vfs_write+0x7f5/0x950 [ 542.644556][T19847] __x64_sys_pwrite64+0xf5/0x150 [ 542.649497][T19847] do_syscall_64+0x44/0xd0 [ 542.653911][T19847] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 542.659951][T19847] RIP: 0033:0x7f7ca8be3ac7 [ 542.664364][T19847] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 542.684049][T19847] RSP: 002b:00007f7ca83a6f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 542.692471][T19847] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8be3ac7 [ 542.700446][T19847] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 542.708705][T19847] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 542.716701][T19847] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 542.724733][T19847] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 542.732703][T19847] [ 542.738161][T19852] FAULT_INJECTION: forcing a failure. [ 542.738161][T19852] name failslab, interval 1, probability 0, space 0, times 0 [ 542.750804][T19852] CPU: 0 PID: 19852 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 542.759622][T19852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.769669][T19852] Call Trace: [ 542.772953][T19852] [ 542.775907][T19852] dump_stack_lvl+0xd6/0x122 [ 542.780491][T19852] dump_stack+0x11/0x1b [ 542.784634][T19852] should_fail+0x23c/0x250 [ 542.789109][T19852] ? __kernfs_new_node+0x6a/0x340 [ 542.794204][T19852] __should_failslab+0x81/0x90 [ 542.799025][T19852] should_failslab+0x5/0x20 [ 542.803516][T19852] kmem_cache_alloc+0x4f/0x320 [ 542.808266][T19852] ? __down_write_common+0x42/0x7b0 [ 542.813521][T19852] __kernfs_new_node+0x6a/0x340 [ 542.818359][T19852] ? up_write+0x25/0xc0 [ 542.822500][T19852] kernfs_new_node+0x5b/0xd0 [ 542.827079][T19852] __kernfs_create_file+0x45/0x1a0 [ 542.832311][T19852] ? dev_attr_show+0x90/0x90 [ 542.836908][T19852] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 542.842277][T19852] internal_create_group+0x2dd/0x840 [ 542.847603][T19852] sysfs_create_group+0x1b/0x20 [ 542.852508][T19852] loop_configure+0xc58/0xf30 [ 542.857251][T19852] lo_ioctl+0x583/0x1270 [ 542.861486][T19852] ? folio_mark_dirty+0x84/0xe0 [ 542.866320][T19852] ? unlock_page+0x37/0x50 [ 542.870747][T19852] ? __rcu_read_unlock+0x5c/0x290 [ 542.875763][T19852] ? blkdev_common_ioctl+0x438/0x1180 [ 542.881166][T19852] ? selinux_file_ioctl+0x522/0x590 [ 542.886350][T19852] ? do_vfs_ioctl+0x819/0x14a0 [ 542.891101][T19852] ? lo_release+0x120/0x120 [ 542.895587][T19852] blkdev_ioctl+0x20e/0x440 [ 542.900123][T19852] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 542.905605][T19852] __se_sys_ioctl+0xcb/0x140 [ 542.910617][T19852] __x64_sys_ioctl+0x3f/0x50 [ 542.915197][T19852] do_syscall_64+0x44/0xd0 [ 542.919776][T19852] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 542.925713][T19852] RIP: 0033:0x7f867f5948b7 [ 542.930133][T19852] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 542.949728][T19852] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 542.958150][T19852] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 542.966126][T19852] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 542.974081][T19852] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 542.982038][T19852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 542.989996][T19852] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 542.997957][T19852] [ 543.004751][T19847] loop5: detected capacity change from 0 to 4096 [ 543.011753][T19852] loop2: detected capacity change from 0 to 264192 [ 543.013481][T19855] loop3: detected capacity change from 0 to 5 [ 543.028501][T19854] loop0: detected capacity change from 0 to 6 [ 543.036056][T19847] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 543.044683][T19852] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 543.046244][T19855] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 543.053942][T19852] EXT4-fs (loop2): group descriptors corrupted! [ 543.071525][T19854] FAT-fs (loop0): Directory bread(block 6) failed [ 543.083137][T19857] FAULT_INJECTION: forcing a failure. [ 543.083137][T19857] name failslab, interval 1, probability 0, space 0, times 0 [ 543.095878][T19857] CPU: 1 PID: 19857 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 543.104643][T19857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.114836][T19857] Call Trace: [ 543.118104][T19857] [ 543.121025][T19857] dump_stack_lvl+0xd6/0x122 [ 543.125630][T19857] dump_stack+0x11/0x1b [ 543.130256][T19857] should_fail+0x23c/0x250 [ 543.134673][T19857] ? __kernfs_new_node+0x6a/0x340 [ 543.139761][T19857] __should_failslab+0x81/0x90 [ 543.144549][T19857] should_failslab+0x5/0x20 [ 543.149138][T19857] kmem_cache_alloc+0x4f/0x320 [ 543.153964][T19857] ? __down_write_common+0x42/0x7b0 [ 543.159171][T19857] __kernfs_new_node+0x6a/0x340 [ 543.164039][T19857] ? up_write+0x25/0xc0 [ 543.168236][T19857] kernfs_new_node+0x5b/0xd0 [ 543.172864][T19857] __kernfs_create_file+0x45/0x1a0 [ 543.178023][T19857] ? dev_attr_show+0x90/0x90 [ 543.182653][T19857] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 543.188140][T19857] internal_create_group+0x2dd/0x840 [ 543.193427][T19857] sysfs_create_group+0x1b/0x20 [ 543.198278][T19857] loop_configure+0xc58/0xf30 [ 543.202957][T19857] lo_ioctl+0x583/0x1270 [ 543.207195][T19857] ? folio_mark_dirty+0x84/0xe0 [ 543.212047][T19857] ? unlock_page+0x37/0x50 [ 543.216515][T19857] ? __rcu_read_unlock+0x5c/0x290 [ 543.221555][T19857] ? blkdev_common_ioctl+0x438/0x1180 [ 543.226929][T19857] ? selinux_file_ioctl+0x522/0x590 [ 543.232184][T19857] ? do_vfs_ioctl+0x819/0x14a0 [ 543.237032][T19857] ? lo_release+0x120/0x120 [ 543.241532][T19857] blkdev_ioctl+0x20e/0x440 [ 543.246035][T19857] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 543.251559][T19857] __se_sys_ioctl+0xcb/0x140 [ 543.256151][T19857] __x64_sys_ioctl+0x3f/0x50 [ 543.260740][T19857] do_syscall_64+0x44/0xd0 [ 543.265230][T19857] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 543.271192][T19857] RIP: 0033:0x7fcb0eeb18b7 [ 543.275679][T19857] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 543.295284][T19857] RSP: 002b:00007fcb0e627f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 543.303705][T19857] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0eeb18b7 [ 543.311681][T19857] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 543.319649][T19857] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 543.327619][T19857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 543.335584][T19857] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 543.343660][T19857] 22:16:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 9) 22:16:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 32) [ 543.353381][T19857] loop4: detected capacity change from 0 to 5 [ 543.371834][T19855] loop3: detected capacity change from 0 to 5 [ 543.380250][T19855] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:11 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x406, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:16:11 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="00000000000000001800120008000100736974000c00020008000200068cb4e51364732a10e9c16585ba4ad9cf590362d8cb0d12e6ab82377634b2365a6a47fe6bfa4fabaf353dc6b50141b33a44d8dd21f1a8b524fef9f5f8a7ecc491acfdd09b30939b0c92bbe4acffa35e08a72ff15edc8a18628d2c2fc903f6761336cc8cee536f5338932318509020802efcd693f1ca0937e56d2a3192226321d5a3dcfa568a585dad3219e9a5078957912cf400a015f50b581c0b6eadba592e39c796531fc1ae6969b8258160358398d0c1175c3f426b770f2a9c4bbad87df2c6fd27192fbbe0a2af4a70233acffaf84add1b82b0a7d9858997c30bdaae237c71171f83", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2, r5}]}}}]}, 0x38}}, 0x0) 22:16:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) (fail_nth: 30) [ 543.395462][T19857] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 543.517055][T19867] FAULT_INJECTION: forcing a failure. [ 543.517055][T19867] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 543.530336][T19867] CPU: 1 PID: 19867 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 543.539169][T19867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.549242][T19867] Call Trace: [ 543.552625][T19867] [ 543.555557][T19867] dump_stack_lvl+0xd6/0x122 [ 543.560155][T19867] dump_stack+0x11/0x1b [ 543.564309][T19867] should_fail+0x23c/0x250 [ 543.568722][T19867] should_fail_usercopy+0x16/0x20 [ 543.573794][T19867] copy_page_from_iter_atomic+0x2f1/0xc60 [ 543.579644][T19867] ? shmem_write_begin+0x7e/0x100 [ 543.584749][T19867] generic_perform_write+0x211/0x400 [ 543.590084][T19867] ? current_time+0xed/0x1a0 [ 543.594688][T19867] __generic_file_write_iter+0xf7/0x2b0 [ 543.600293][T19867] ? generic_write_checks+0x250/0x290 [ 543.605771][T19867] generic_file_write_iter+0x75/0x130 [ 543.611204][T19867] vfs_write+0x7f5/0x950 [ 543.615595][T19867] __x64_sys_pwrite64+0xf5/0x150 [ 543.620603][T19867] do_syscall_64+0x44/0xd0 [ 543.625029][T19867] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 543.630952][T19867] RIP: 0033:0x7f7ca8be3ac7 [ 543.635380][T19867] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 543.655074][T19867] RSP: 002b:00007f7ca83a6f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 543.663513][T19867] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8be3ac7 [ 543.671478][T19867] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 543.679541][T19867] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 543.687513][T19867] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 543.695500][T19867] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 543.703614][T19867] [ 543.713527][T19867] loop5: detected capacity change from 0 to 4096 [ 543.724606][T19868] FAULT_INJECTION: forcing a failure. [ 543.724606][T19868] name failslab, interval 1, probability 0, space 0, times 0 [ 543.737270][T19868] CPU: 1 PID: 19868 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 543.746192][T19868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.756264][T19868] Call Trace: [ 543.759593][T19868] [ 543.762514][T19868] dump_stack_lvl+0xd6/0x122 [ 543.767150][T19868] dump_stack+0x11/0x1b [ 543.771368][T19868] should_fail+0x23c/0x250 [ 543.775783][T19868] ? __kernfs_new_node+0x6a/0x340 [ 543.780892][T19868] __should_failslab+0x81/0x90 [ 543.785812][T19868] should_failslab+0x5/0x20 [ 543.790402][T19868] kmem_cache_alloc+0x4f/0x320 [ 543.795173][T19868] ? __down_write_common+0x42/0x7b0 [ 543.800520][T19868] __kernfs_new_node+0x6a/0x340 [ 543.805428][T19868] ? up_write+0x25/0xc0 [ 543.809583][T19868] kernfs_new_node+0x5b/0xd0 [ 543.814180][T19868] __kernfs_create_file+0x45/0x1a0 [ 543.819301][T19868] ? dev_attr_show+0x90/0x90 [ 543.823982][T19868] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 543.829420][T19868] internal_create_group+0x2dd/0x840 [ 543.834793][T19868] sysfs_create_group+0x1b/0x20 [ 543.839683][T19868] loop_configure+0xc58/0xf30 [ 543.844354][T19868] lo_ioctl+0x583/0x1270 [ 543.848724][T19868] ? folio_mark_dirty+0x84/0xe0 [ 543.853577][T19868] ? unlock_page+0x37/0x50 [ 543.858077][T19868] ? __rcu_read_unlock+0x5c/0x290 [ 543.863191][T19868] ? blkdev_common_ioctl+0x438/0x1180 [ 543.868562][T19868] ? selinux_file_ioctl+0x522/0x590 [ 543.873784][T19868] ? do_vfs_ioctl+0x819/0x14a0 [ 543.878550][T19868] ? lo_release+0x120/0x120 [ 543.883087][T19868] blkdev_ioctl+0x20e/0x440 [ 543.887598][T19868] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 543.893100][T19868] __se_sys_ioctl+0xcb/0x140 [ 543.897702][T19868] __x64_sys_ioctl+0x3f/0x50 [ 543.902324][T19868] do_syscall_64+0x44/0xd0 [ 543.906741][T19868] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 543.912855][T19868] RIP: 0033:0x7f867f5948b7 [ 543.917282][T19868] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 543.936976][T19868] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 543.945431][T19868] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 543.953398][T19868] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 543.961375][T19868] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 543.969368][T19868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 543.977335][T19868] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 543.985314][T19868] [ 543.992842][T19868] loop2: detected capacity change from 0 to 264192 [ 544.005771][T19867] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 544.015028][T19867] EXT4-fs (loop5): group descriptors corrupted! [ 544.025951][T19868] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 544.035561][T19868] EXT4-fs (loop2): group descriptors corrupted! 22:16:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 10) 22:16:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 33) [ 544.065452][T19874] loop3: detected capacity change from 0 to 5 [ 544.095110][T19873] loop0: detected capacity change from 0 to 6 [ 544.095108][T19874] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 544.096236][T19875] FAULT_INJECTION: forcing a failure. [ 544.096236][T19875] name failslab, interval 1, probability 0, space 0, times 0 [ 544.124224][T19875] CPU: 0 PID: 19875 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 544.133021][T19875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.143091][T19875] Call Trace: [ 544.146368][T19875] [ 544.149307][T19875] dump_stack_lvl+0xd6/0x122 [ 544.153906][T19875] dump_stack+0x11/0x1b [ 544.158177][T19875] should_fail+0x23c/0x250 [ 544.162596][T19875] ? __kernfs_new_node+0x6a/0x340 [ 544.167624][T19875] __should_failslab+0x81/0x90 [ 544.172464][T19875] should_failslab+0x5/0x20 [ 544.177061][T19875] kmem_cache_alloc+0x4f/0x320 [ 544.181823][T19875] ? __down_write_common+0x42/0x7b0 [ 544.187022][T19875] __kernfs_new_node+0x6a/0x340 [ 544.191964][T19875] ? up_write+0x25/0xc0 [ 544.196121][T19875] kernfs_new_node+0x5b/0xd0 [ 544.200750][T19875] __kernfs_create_file+0x45/0x1a0 [ 544.205906][T19875] ? dev_attr_show+0x90/0x90 [ 544.210512][T19875] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 544.215948][T19875] internal_create_group+0x2dd/0x840 [ 544.221320][T19875] sysfs_create_group+0x1b/0x20 [ 544.226233][T19875] loop_configure+0xc58/0xf30 [ 544.231018][T19875] lo_ioctl+0x583/0x1270 [ 544.235291][T19875] ? folio_mark_dirty+0x84/0xe0 [ 544.240199][T19875] ? unlock_page+0x37/0x50 [ 544.243951][T19879] FAULT_INJECTION: forcing a failure. [ 544.243951][T19879] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 544.244615][T19875] ? __rcu_read_unlock+0x5c/0x290 [ 544.244644][T19875] ? blkdev_common_ioctl+0x438/0x1180 [ 544.267994][T19875] ? selinux_file_ioctl+0x522/0x590 [ 544.273187][T19875] ? do_vfs_ioctl+0x819/0x14a0 [ 544.278369][T19875] ? lo_release+0x120/0x120 [ 544.282868][T19875] blkdev_ioctl+0x20e/0x440 [ 544.287411][T19875] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 544.293285][T19875] __se_sys_ioctl+0xcb/0x140 [ 544.297861][T19875] __x64_sys_ioctl+0x3f/0x50 [ 544.302440][T19875] do_syscall_64+0x44/0xd0 [ 544.306861][T19875] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 544.312746][T19875] RIP: 0033:0x7fcb0eeb18b7 [ 544.317142][T19875] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 544.336843][T19875] RSP: 002b:00007fcb0e627f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 544.345239][T19875] RAX: ffffffffffffffda RBX: 00007fcb0eefb9c8 RCX: 00007fcb0eeb18b7 [ 544.353192][T19875] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 544.361152][T19875] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 544.369104][T19875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 544.377064][T19875] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 544.385096][T19875] [ 544.388122][T19879] CPU: 1 PID: 19879 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 544.393634][T19873] FAT-fs (loop0): Directory bread(block 6) failed [ 544.396900][T19879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.396913][T19879] Call Trace: [ 544.396919][T19879] [ 544.419555][T19879] dump_stack_lvl+0xd6/0x122 [ 544.424159][T19879] dump_stack+0x11/0x1b [ 544.428313][T19879] should_fail+0x23c/0x250 [ 544.432808][T19879] should_fail_usercopy+0x16/0x20 [ 544.437834][T19879] copy_page_from_iter_atomic+0x2f1/0xc60 [ 544.443556][T19879] ? shmem_write_begin+0x7e/0x100 [ 544.448585][T19879] generic_perform_write+0x211/0x400 [ 544.453910][T19879] ? current_time+0xed/0x1a0 [ 544.458675][T19879] __generic_file_write_iter+0xf7/0x2b0 [ 544.464268][T19879] ? generic_write_checks+0x250/0x290 [ 544.469640][T19879] generic_file_write_iter+0x75/0x130 [ 544.475093][T19879] vfs_write+0x7f5/0x950 [ 544.479342][T19879] __x64_sys_pwrite64+0xf5/0x150 [ 544.484318][T19879] do_syscall_64+0x44/0xd0 [ 544.488732][T19879] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 544.494629][T19879] RIP: 0033:0x7f7ca8be3ac7 [ 544.499042][T19879] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 544.518644][T19879] RSP: 002b:00007f7ca83a6f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 544.527055][T19879] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8be3ac7 [ 544.535025][T19879] RDX: 000000000000001f RSI: 0000000020010100 RDI: 0000000000000004 [ 544.542996][T19879] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 544.550966][T19879] R10: 00000000000004e0 R11: 0000000000000293 R12: 0000000000000004 [ 544.558932][T19879] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 544.566900][T19879] [ 544.576302][T19879] loop5: detected capacity change from 0 to 4096 [ 544.591689][T19875] loop4: detected capacity change from 0 to 5 [ 544.598156][T19874] loop3: detected capacity change from 0 to 5 [ 544.606744][T19874] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 544.619188][T19879] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 544.628509][T19879] EXT4-fs (loop5): group descriptors corrupted! [ 544.640438][T19884] FAULT_INJECTION: forcing a failure. [ 544.640438][T19884] name failslab, interval 1, probability 0, space 0, times 0 [ 544.653128][T19884] CPU: 1 PID: 19884 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 544.661893][T19884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.671939][T19884] Call Trace: [ 544.675232][T19884] [ 544.678146][T19884] dump_stack_lvl+0xd6/0x122 [ 544.682725][T19884] dump_stack+0x11/0x1b [ 544.687389][T19884] should_fail+0x23c/0x250 [ 544.691876][T19884] ? radix_tree_node_alloc+0x142/0x200 [ 544.697316][T19884] __should_failslab+0x81/0x90 [ 544.702068][T19884] should_failslab+0x5/0x20 [ 544.706568][T19884] kmem_cache_alloc+0x4f/0x320 [ 544.711381][T19884] radix_tree_node_alloc+0x142/0x200 [ 544.717876][T19884] ? delete_node+0x45c/0x480 [ 544.722532][T19884] ? selinux_socket_sock_rcv_skb+0x156/0x730 [ 544.728522][T19884] idr_get_free+0x22a/0x5d0 [ 544.733013][T19884] ? kernfs_xattr_get+0x63/0x70 [ 544.737910][T19884] idr_alloc_cyclic+0xf4/0x2f0 [ 544.742669][T19884] __kernfs_new_node+0xb4/0x340 [ 544.747593][T19884] ? up_write+0x25/0xc0 [ 544.751956][T19884] kernfs_new_node+0x5b/0xd0 [ 544.756535][T19884] __kernfs_create_file+0x45/0x1a0 [ 544.761640][T19884] ? dev_attr_show+0x90/0x90 [ 544.766385][T19884] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 544.771879][T19884] internal_create_group+0x2dd/0x840 [ 544.777163][T19884] sysfs_create_group+0x1b/0x20 [ 544.782054][T19884] loop_configure+0xc58/0xf30 [ 544.786848][T19884] lo_ioctl+0x583/0x1270 [ 544.791095][T19884] ? folio_mark_dirty+0x84/0xe0 [ 544.795999][T19884] ? unlock_page+0x37/0x50 [ 544.800412][T19884] ? __rcu_read_unlock+0x5c/0x290 [ 544.805434][T19884] ? blkdev_common_ioctl+0x438/0x1180 [ 544.810798][T19884] ? selinux_file_ioctl+0x522/0x590 [ 544.815986][T19884] ? do_vfs_ioctl+0x819/0x14a0 [ 544.820757][T19884] ? lo_release+0x120/0x120 [ 544.825262][T19884] blkdev_ioctl+0x20e/0x440 [ 544.829751][T19884] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 544.835287][T19884] __se_sys_ioctl+0xcb/0x140 [ 544.839882][T19884] __x64_sys_ioctl+0x3f/0x50 [ 544.844536][T19884] do_syscall_64+0x44/0xd0 [ 544.849720][T19884] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 544.855745][T19884] RIP: 0033:0x7f867f5948b7 [ 544.860142][T19884] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 544.879830][T19884] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 544.888226][T19884] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 544.896183][T19884] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 544.904138][T19884] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 544.912177][T19884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 22:16:12 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2, r5}]}}}]}, 0x38}}, 0x0) 22:16:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 11) [ 544.920137][T19884] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 544.928167][T19884] [ 544.934154][T19884] loop2: detected capacity change from 0 to 264192 [ 544.959938][T19884] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) 22:16:13 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x604, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 544.969220][T19884] EXT4-fs (loop2): group descriptors corrupted! 22:16:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 34) [ 544.998883][T19875] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 545.105043][T19891] loop0: detected capacity change from 0 to 6 [ 545.111707][T19892] FAULT_INJECTION: forcing a failure. [ 545.111707][T19892] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 545.124936][T19892] CPU: 0 PID: 19892 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 545.133754][T19892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.143808][T19892] Call Trace: [ 545.147087][T19892] [ 545.150091][T19892] dump_stack_lvl+0xd6/0x122 [ 545.154726][T19892] dump_stack+0x11/0x1b [ 545.158886][T19892] should_fail+0x23c/0x250 [ 545.163341][T19892] __alloc_pages+0x102/0x330 [ 545.167939][T19892] alloc_pages_vma+0x5ee/0x770 [ 545.168091][T19891] FAT-fs (loop0): Directory bread(block 6) failed [ 545.172700][T19892] shmem_getpage_gfp+0x8bc/0x12c0 [ 545.184153][T19892] shmem_write_begin+0x7e/0x100 [ 545.189074][T19892] generic_perform_write+0x1c8/0x400 [ 545.194360][T19892] ? current_time+0xed/0x1a0 [ 545.198965][T19892] __generic_file_write_iter+0xf7/0x2b0 [ 545.204528][T19892] ? generic_write_checks+0x250/0x290 [ 545.209952][T19892] generic_file_write_iter+0x75/0x130 [ 545.215327][T19892] vfs_write+0x7f5/0x950 [ 545.219691][T19892] __x64_sys_pwrite64+0xf5/0x150 [ 545.224629][T19892] do_syscall_64+0x44/0xd0 [ 545.229043][T19892] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 545.234940][T19892] RIP: 0033:0x7f7ca8be3ac7 [ 545.239347][T19892] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 545.259626][T19892] RSP: 002b:00007f7ca83a6f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 545.259797][T19893] loop3: detected capacity change from 0 to 5 [ 545.268035][T19892] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8be3ac7 [ 545.268051][T19892] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 545.268064][T19892] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 545.268075][T19892] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 545.268086][T19892] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 545.268101][T19892] [ 545.268885][T19896] loop2: detected capacity change from 0 to 264192 [ 545.286039][T19893] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 545.304681][T19896] FAULT_INJECTION: forcing a failure. [ 545.304681][T19896] name failslab, interval 1, probability 0, space 0, times 0 [ 545.349550][T19896] CPU: 0 PID: 19896 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 545.358349][T19896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.368391][T19896] Call Trace: [ 545.371652][T19896] [ 545.374573][T19896] dump_stack_lvl+0xd6/0x122 [ 545.379230][T19896] dump_stack+0x11/0x1b [ 545.383371][T19896] should_fail+0x23c/0x250 [ 545.387770][T19896] ? kobject_uevent_env+0x1a7/0xc40 [ 545.392967][T19896] __should_failslab+0x81/0x90 [ 545.397744][T19896] should_failslab+0x5/0x20 [ 545.402328][T19896] kmem_cache_alloc_trace+0x52/0x350 [ 545.407603][T19896] ? _printk+0x76/0x97 [ 545.411654][T19896] ? dev_uevent_filter+0x70/0x70 [ 545.416580][T19896] kobject_uevent_env+0x1a7/0xc40 [ 545.421644][T19896] kobject_uevent+0x18/0x20 [ 545.426172][T19896] loop_configure+0xd70/0xf30 [ 545.430914][T19896] lo_ioctl+0x583/0x1270 [ 545.435138][T19896] ? folio_mark_dirty+0x84/0xe0 [ 545.439974][T19896] ? unlock_page+0x37/0x50 [ 545.444441][T19896] ? __rcu_read_unlock+0x5c/0x290 [ 545.449455][T19896] ? blkdev_common_ioctl+0x438/0x1180 [ 545.454877][T19896] ? selinux_file_ioctl+0x522/0x590 [ 545.460057][T19896] ? do_vfs_ioctl+0x819/0x14a0 [ 545.464806][T19896] ? lo_release+0x120/0x120 [ 545.469291][T19896] blkdev_ioctl+0x20e/0x440 [ 545.473903][T19896] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 545.479349][T19896] __se_sys_ioctl+0xcb/0x140 [ 545.483956][T19896] __x64_sys_ioctl+0x3f/0x50 [ 545.488691][T19896] do_syscall_64+0x44/0xd0 [ 545.493094][T19896] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 545.499047][T19896] RIP: 0033:0x7f867f5948b7 [ 545.503441][T19896] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 545.523047][T19896] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 545.531454][T19896] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 545.539436][T19896] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 545.547401][T19896] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 545.555364][T19896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 545.563377][T19896] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 545.571347][T19896] [ 545.578847][T19892] loop5: detected capacity change from 0 to 4096 [ 545.593871][T19893] loop3: detected capacity change from 0 to 5 22:16:13 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2, r5}, @IFLA_IPTUN_FWMARK={0x8}]}}}]}, 0x40}}, 0x0) [ 545.600804][T19893] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:13 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x700, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 545.627772][T19896] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 545.627827][T19892] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 545.637082][T19896] EXT4-fs (loop2): group descriptors corrupted! [ 545.646786][T19892] EXT4-fs (loop5): group descriptors corrupted! 22:16:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 35) 22:16:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 12) 22:16:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 545.677650][T19902] loop4: detected capacity change from 0 to 5 [ 545.696192][T19902] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 545.810703][T19905] loop0: detected capacity change from 0 to 6 [ 545.817974][T19905] FAT-fs (loop0): Directory bread(block 6) failed [ 545.833029][T19909] loop2: detected capacity change from 0 to 264192 [ 545.844200][T19909] FAULT_INJECTION: forcing a failure. [ 545.844200][T19909] name failslab, interval 1, probability 0, space 0, times 0 [ 545.844684][T19910] loop3: detected capacity change from 0 to 5 [ 545.856880][T19909] CPU: 1 PID: 19909 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 545.871675][T19909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.881733][T19909] Call Trace: [ 545.885001][T19909] [ 545.887918][T19909] dump_stack_lvl+0xd6/0x122 [ 545.892499][T19909] dump_stack+0x11/0x1b [ 545.896640][T19909] should_fail+0x23c/0x250 [ 545.901091][T19909] ? kzalloc+0x1d/0x30 [ 545.905261][T19909] __should_failslab+0x81/0x90 [ 545.910012][T19909] should_failslab+0x5/0x20 [ 545.914503][T19909] __kmalloc+0x6f/0x370 [ 545.918647][T19909] kzalloc+0x1d/0x30 [ 545.922570][T19909] kobject_get_path+0x7c/0x110 [ 545.927321][T19909] kobject_uevent_env+0x1be/0xc40 [ 545.932385][T19909] kobject_uevent+0x18/0x20 [ 545.936943][T19909] loop_configure+0xd70/0xf30 [ 545.941673][T19909] lo_ioctl+0x583/0x1270 [ 545.945986][T19909] ? folio_mark_dirty+0x84/0xe0 [ 545.950886][T19909] ? unlock_page+0x37/0x50 [ 545.955306][T19909] ? __rcu_read_unlock+0x5c/0x290 [ 545.960335][T19909] ? blkdev_common_ioctl+0x438/0x1180 [ 545.965748][T19909] ? selinux_file_ioctl+0x522/0x590 [ 545.971017][T19909] ? do_vfs_ioctl+0x819/0x14a0 [ 545.975890][T19909] ? lo_release+0x120/0x120 [ 545.980388][T19909] blkdev_ioctl+0x20e/0x440 [ 545.984885][T19909] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 545.990390][T19909] __se_sys_ioctl+0xcb/0x140 [ 545.994985][T19909] __x64_sys_ioctl+0x3f/0x50 [ 545.999645][T19909] do_syscall_64+0x44/0xd0 [ 546.004161][T19909] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 546.010057][T19909] RIP: 0033:0x7f867f5948b7 [ 546.014466][T19909] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 546.034124][T19909] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 546.042524][T19909] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 546.050625][T19909] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 546.058669][T19909] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 546.066693][T19909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 546.074659][T19909] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 546.082745][T19909] 22:16:14 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="00000000000000001800120008000100736974000c00020008000200068cb4e51364732a10e9c16585ba4ad9cf590362d8cb0d12e6ab82377634b2365a6a47fe6bfa4fabaf353dc6b50141b33a44d8dd21f1a8b524fef9f5f8a7ecc491acfdd09b30939b0c92bbe4acffa35e08a72ff15edc8a18628d2c2fc903f6761336cc8cee536f5338932318509020802efcd693f1ca0937e56d2a3192226321d5a3dcfa568a585dad3219e9a5078957912cf400a015f50b581c0b6eadba592e39c796531fc1ae6969b8258160358398d0c1175c3f426b770f2a9c4bbad87df2c6fd27192fbbe0a2af4a70233acffaf84add1b82b0a7d9858997c30bdaae237c71171f83", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2, r5}, @IFLA_IPTUN_FWMARK={0x8}]}}}]}, 0x40}}, 0x0) [ 546.122796][T19910] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 546.135352][T19909] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 546.144723][T19909] EXT4-fs (loop2): group descriptors corrupted! [ 546.195322][T19910] loop3: detected capacity change from 0 to 5 [ 546.204250][T19915] loop4: detected capacity change from 0 to 5 [ 546.207152][T19910] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 546.211000][T19916] FAULT_INJECTION: forcing a failure. [ 546.211000][T19916] name failslab, interval 1, probability 0, space 0, times 0 [ 546.233298][T19916] CPU: 0 PID: 19916 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 22:16:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 36) [ 546.242064][T19916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 546.252270][T19916] Call Trace: [ 546.255546][T19916] [ 546.258469][T19916] dump_stack_lvl+0xd6/0x122 [ 546.263057][T19916] dump_stack+0x11/0x1b [ 546.267240][T19916] should_fail+0x23c/0x250 [ 546.271653][T19916] ? xas_create+0x3fb/0xb10 [ 546.276159][T19916] __should_failslab+0x81/0x90 [ 546.280965][T19916] should_failslab+0x5/0x20 [ 546.285467][T19916] kmem_cache_alloc+0x4f/0x320 [ 546.290241][T19916] xas_create+0x3fb/0xb10 [ 546.294578][T19916] ? memcg_check_events+0x40/0x410 [ 546.299748][T19916] xas_create_range+0x146/0x360 [ 546.304688][T19916] shmem_add_to_page_cache+0x3dd/0x670 [ 546.310194][T19915] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 546.310611][T19916] shmem_getpage_gfp+0xaf1/0x12c0 [ 546.325759][T19916] shmem_write_begin+0x7e/0x100 [ 546.330620][T19916] generic_perform_write+0x1c8/0x400 [ 546.335948][T19916] ? current_time+0xed/0x1a0 [ 546.340541][T19916] __generic_file_write_iter+0xf7/0x2b0 [ 546.346171][T19916] ? generic_write_checks+0x250/0x290 [ 546.351597][T19916] generic_file_write_iter+0x75/0x130 [ 546.357097][T19916] vfs_write+0x7f5/0x950 [ 546.361345][T19916] __x64_sys_pwrite64+0xf5/0x150 [ 546.366302][T19916] do_syscall_64+0x44/0xd0 [ 546.370778][T19916] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 546.376679][T19916] RIP: 0033:0x7f7ca8be3ac7 [ 546.381094][T19916] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 546.400698][T19916] RSP: 002b:00007f7ca83a6f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 546.409116][T19916] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8be3ac7 [ 546.417123][T19916] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 546.425094][T19916] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 546.433186][T19916] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 546.441203][T19916] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 546.449179][T19916] [ 546.454487][T19919] loop2: detected capacity change from 0 to 264192 [ 546.461280][T19919] FAULT_INJECTION: forcing a failure. [ 546.461280][T19919] name failslab, interval 1, probability 0, space 0, times 0 [ 546.473970][T19919] CPU: 0 PID: 19919 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 546.482771][T19919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 546.492823][T19919] Call Trace: [ 546.496102][T19919] [ 546.499031][T19919] dump_stack_lvl+0xd6/0x122 [ 546.503627][T19919] dump_stack+0x11/0x1b [ 546.507779][T19919] should_fail+0x23c/0x250 [ 546.512233][T19919] __should_failslab+0x81/0x90 [ 546.517037][T19919] should_failslab+0x5/0x20 [ 546.521535][T19919] kmem_cache_alloc_node+0x61/0x2d0 [ 546.526758][T19919] ? __alloc_skb+0xf0/0x450 [ 546.531263][T19919] __alloc_skb+0xf0/0x450 [ 546.535596][T19919] alloc_uevent_skb+0x5b/0x120 [ 546.540466][T19919] kobject_uevent_env+0x863/0xc40 [ 546.545497][T19919] kobject_uevent+0x18/0x20 [ 546.550012][T19919] loop_configure+0xd70/0xf30 [ 546.554690][T19919] lo_ioctl+0x583/0x1270 [ 546.558927][T19919] ? folio_mark_dirty+0x84/0xe0 [ 546.563777][T19919] ? unlock_page+0x37/0x50 [ 546.568195][T19919] ? __rcu_read_unlock+0x5c/0x290 [ 546.573313][T19919] ? blkdev_common_ioctl+0x438/0x1180 [ 546.578689][T19919] ? selinux_file_ioctl+0x522/0x590 [ 546.583891][T19919] ? do_vfs_ioctl+0x819/0x14a0 [ 546.588782][T19919] ? lo_release+0x120/0x120 [ 546.593290][T19919] blkdev_ioctl+0x20e/0x440 [ 546.597792][T19919] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 546.603286][T19919] __se_sys_ioctl+0xcb/0x140 [ 546.607881][T19919] __x64_sys_ioctl+0x3f/0x50 [ 546.612599][T19919] do_syscall_64+0x44/0xd0 [ 546.617059][T19919] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 546.622968][T19919] RIP: 0033:0x7f867f5948b7 [ 546.627437][T19919] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 546.647181][T19919] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 546.655594][T19919] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 546.663564][T19919] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 546.671581][T19919] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 546.679555][T19919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 546.687599][T19919] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 22:16:14 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x1e03, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:16:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 546.695566][T19919] [ 546.704656][T19916] loop5: detected capacity change from 0 to 4096 [ 546.718708][T19915] loop4: detected capacity change from 0 to 5 [ 546.728806][T19915] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 546.732884][T19919] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 546.748269][T19919] EXT4-fs (loop2): group descriptors corrupted! [ 546.757395][T19920] loop0: detected capacity change from 0 to 6 [ 546.765275][T19920] FAT-fs (loop0): Directory bread(block 6) failed 22:16:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 37) 22:16:15 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="00000000000000001800120008000100736974000c00020008000200068cb4e51364732a10e9c16585ba4ad9cf590362d8cb0d12e6ab82377634b2365a6a47fe6bfa4fabaf353dc6b50141b33a44d8dd21f1a8b524fef9f5f8a7ecc491acfdd09b30939b0c92bbe4acffa35e08a72ff15edc8a18628d2c2fc903f6761336cc8cee536f5338932318509020802efcd693f1ca0937e56d2a3192226321d5a3dcfa568a585dad3219e9a5078957912cf400a015f50b581c0b6eadba592e39c796531fc1ae6969b8258160358398d0c1175c3f426b770f2a9c4bbad87df2c6fd27192fbbe0a2af4a70233acffaf84add1b82b0a7d9858997c30bdaae237c71171f83", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2, r5}, @IFLA_IPTUN_FWMARK={0x8}]}}}]}, 0x40}}, 0x0) [ 546.789503][T19916] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 546.798823][T19916] EXT4-fs (loop5): group descriptors corrupted! 22:16:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 13) [ 546.949213][T19928] loop3: detected capacity change from 0 to 5 [ 546.959994][T19930] loop4: detected capacity change from 0 to 5 [ 546.970096][T19928] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 546.988809][T19930] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 547.000643][T19928] loop3: detected capacity change from 0 to 5 [ 547.002527][T19932] loop2: detected capacity change from 0 to 264192 [ 547.009451][T19928] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 547.014063][T19932] FAULT_INJECTION: forcing a failure. [ 547.014063][T19932] name failslab, interval 1, probability 0, space 0, times 0 [ 547.036257][T19932] CPU: 1 PID: 19932 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 547.044997][T19932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.055030][T19932] Call Trace: [ 547.058329][T19932] [ 547.061237][T19932] dump_stack_lvl+0xd6/0x122 [ 547.065824][T19932] dump_stack+0x11/0x1b [ 547.069986][T19932] should_fail+0x23c/0x250 [ 547.074380][T19932] __should_failslab+0x81/0x90 [ 547.079125][T19932] should_failslab+0x5/0x20 [ 547.083697][T19932] kmem_cache_alloc_node_trace+0x61/0x310 [ 547.089416][T19932] ? __kmalloc_node_track_caller+0x30/0x40 [ 547.095275][T19932] __kmalloc_node_track_caller+0x30/0x40 [ 547.100934][T19932] ? alloc_uevent_skb+0x5b/0x120 [ 547.105873][T19932] __alloc_skb+0x19d/0x450 [ 547.110388][T19932] alloc_uevent_skb+0x5b/0x120 [ 547.115150][T19932] kobject_uevent_env+0x863/0xc40 [ 547.120245][T19932] kobject_uevent+0x18/0x20 [ 547.124729][T19932] loop_configure+0xd70/0xf30 [ 547.129403][T19932] lo_ioctl+0x583/0x1270 [ 547.133624][T19932] ? folio_mark_dirty+0x84/0xe0 [ 547.138462][T19932] ? unlock_page+0x37/0x50 [ 547.142862][T19932] ? __rcu_read_unlock+0x5c/0x290 [ 547.147934][T19932] ? blkdev_common_ioctl+0x438/0x1180 [ 547.153339][T19932] ? selinux_file_ioctl+0x522/0x590 [ 547.158543][T19932] ? do_vfs_ioctl+0x819/0x14a0 [ 547.163288][T19932] ? lo_release+0x120/0x120 [ 547.167786][T19932] blkdev_ioctl+0x20e/0x440 [ 547.172284][T19932] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 547.177751][T19932] __se_sys_ioctl+0xcb/0x140 [ 547.182329][T19932] __x64_sys_ioctl+0x3f/0x50 [ 547.186901][T19932] do_syscall_64+0x44/0xd0 [ 547.191387][T19932] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 547.197259][T19932] RIP: 0033:0x7f867f5948b7 [ 547.201666][T19932] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 547.221532][T19932] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 547.230066][T19932] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 547.238016][T19932] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 547.246040][T19932] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 547.254050][T19932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 547.262001][T19932] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 547.269969][T19932] [ 547.289596][T19930] loop4: detected capacity change from 0 to 5 22:16:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 547.296087][T19930] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 547.306965][T19935] loop0: detected capacity change from 0 to 6 [ 547.318440][T19932] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 547.320559][T19935] FAT-fs (loop0): Directory bread(block 6) failed [ 547.327969][T19932] EXT4-fs (loop2): group descriptors corrupted! [ 547.344771][T19936] FAULT_INJECTION: forcing a failure. [ 547.344771][T19936] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 547.358034][T19936] CPU: 1 PID: 19936 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 547.366796][T19936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.376876][T19936] Call Trace: [ 547.380146][T19936] [ 547.383071][T19936] dump_stack_lvl+0xd6/0x122 [ 547.387674][T19936] dump_stack+0x11/0x1b [ 547.391824][T19936] should_fail+0x23c/0x250 [ 547.396235][T19936] should_fail_usercopy+0x16/0x20 [ 547.401258][T19936] copy_page_from_iter_atomic+0x2f1/0xc60 [ 547.407004][T19936] ? shmem_write_begin+0x7e/0x100 [ 547.412116][T19936] generic_perform_write+0x211/0x400 [ 547.417492][T19936] ? current_time+0xed/0x1a0 [ 547.422139][T19936] __generic_file_write_iter+0xf7/0x2b0 [ 547.427763][T19936] ? generic_write_checks+0x250/0x290 [ 547.433166][T19936] generic_file_write_iter+0x75/0x130 [ 547.438554][T19936] vfs_write+0x7f5/0x950 [ 547.442893][T19936] __x64_sys_pwrite64+0xf5/0x150 [ 547.447836][T19936] do_syscall_64+0x44/0xd0 [ 547.452318][T19936] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 547.458272][T19936] RIP: 0033:0x7f7ca8be3ac7 [ 547.462677][T19936] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 547.482351][T19936] RSP: 002b:00007f7ca83a6f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 547.490796][T19936] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8be3ac7 22:16:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:15 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="00000000000000001800120008000100736974000c00020008000200068cb4e51364732a10e9c16585ba4ad9cf590362d8cb0d12e6ab82377634b2365a6a47fe6bfa4fabaf353dc6b50141b33a44d8dd21f1a8b524fef9f5f8a7ecc491acfdd09b30939b0c92bbe4acffa35e08a72ff15edc8a18628d2c2fc903f6761336cc8cee536f5338932318509020802efcd693f1ca0937e56d2a3192226321d5a3dcfa568a585dad3219e9a5078957912cf400a015f50b581c0b6eadba592e39c796531fc1ae6969b8258160358398d0c1175c3f426b770f2a9c4bbad87df2c6fd27192fbbe0a2af4a70233acffaf84add1b82b0a7d9858997c30bdaae237c71171f83", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FWMARK={0x8, 0x14, 0x1000}]}}}]}, 0x38}}, 0x0) [ 547.498766][T19936] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 547.506732][T19936] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 547.515110][T19936] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000004 [ 547.523077][T19936] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 547.531107][T19936] [ 547.536548][T19936] loop5: detected capacity change from 0 to 4096 22:16:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 38) 22:16:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 14) [ 547.566568][T19936] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 547.575860][T19936] EXT4-fs (loop5): group descriptors corrupted! [ 547.723237][T19939] loop3: detected capacity change from 0 to 5 [ 547.742673][T19939] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 547.767175][T19945] loop4: detected capacity change from 0 to 5 [ 547.767848][T19943] loop0: detected capacity change from 0 to 6 [ 547.781881][T19943] FAT-fs (loop0): Directory bread(block 6) failed [ 547.791112][T19945] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 547.792068][T19948] loop2: detected capacity change from 0 to 264192 [ 547.801750][T19939] loop3: detected capacity change from 0 to 5 [ 547.814243][T19949] FAULT_INJECTION: forcing a failure. [ 547.814243][T19949] name failslab, interval 1, probability 0, space 0, times 0 [ 547.822681][T19948] FAULT_INJECTION: forcing a failure. [ 547.822681][T19948] name failslab, interval 1, probability 0, space 0, times 0 [ 547.826852][T19949] CPU: 0 PID: 19949 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 547.848154][T19949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.858296][T19949] Call Trace: [ 547.861572][T19949] [ 547.864486][T19949] dump_stack_lvl+0xd6/0x122 [ 547.869098][T19949] dump_stack+0x11/0x1b [ 547.873235][T19949] should_fail+0x23c/0x250 [ 547.877634][T19949] ? getname_flags+0x84/0x3f0 [ 547.882294][T19949] __should_failslab+0x81/0x90 [ 547.887192][T19949] should_failslab+0x5/0x20 [ 547.891757][T19949] kmem_cache_alloc+0x4f/0x320 [ 547.896531][T19949] getname_flags+0x84/0x3f0 [ 547.901016][T19949] ? vfs_write+0x667/0x950 [ 547.905486][T19949] getname+0x15/0x20 [ 547.909365][T19949] do_sys_openat2+0x6d/0x2b0 [ 547.914010][T19949] __x64_sys_openat+0xef/0x110 [ 547.918808][T19949] do_syscall_64+0x44/0xd0 [ 547.923226][T19949] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 547.929129][T19949] RIP: 0033:0x7f7ca8be3a14 [ 547.933544][T19949] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 547.953132][T19949] RSP: 002b:00007f7ca83a6ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 547.961564][T19949] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8be3a14 [ 547.969518][T19949] RDX: 0000000000000002 RSI: 00007f7ca83a7000 RDI: 00000000ffffff9c [ 547.977537][T19949] RBP: 00007f7ca83a7000 R08: 0000000000000000 R09: ffffffffffffffff [ 547.985493][T19949] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 547.993449][T19949] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 548.001408][T19949] [ 548.004414][T19948] CPU: 1 PID: 19948 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 548.013178][T19948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.023230][T19948] Call Trace: [ 548.026530][T19948] [ 548.029458][T19948] dump_stack_lvl+0xd6/0x122 [ 548.034100][T19948] dump_stack+0x11/0x1b [ 548.038262][T19948] should_fail+0x23c/0x250 [ 548.042717][T19948] __should_failslab+0x81/0x90 [ 548.047494][T19948] should_failslab+0x5/0x20 [ 548.051995][T19948] kmem_cache_alloc_node_trace+0x61/0x310 [ 548.057742][T19948] ? __kmalloc_node_track_caller+0x30/0x40 [ 548.063621][T19948] __kmalloc_node_track_caller+0x30/0x40 [ 548.069265][T19948] ? alloc_uevent_skb+0x5b/0x120 [ 548.074214][T19948] __alloc_skb+0x19d/0x450 [ 548.078634][T19948] alloc_uevent_skb+0x5b/0x120 [ 548.083442][T19948] kobject_uevent_env+0x863/0xc40 [ 548.088481][T19948] kobject_uevent+0x18/0x20 [ 548.093062][T19948] loop_configure+0xd70/0xf30 [ 548.097733][T19948] lo_ioctl+0x583/0x1270 [ 548.101970][T19948] ? folio_mark_dirty+0x84/0xe0 [ 548.106820][T19948] ? unlock_page+0x37/0x50 [ 548.111236][T19948] ? __rcu_read_unlock+0x5c/0x290 [ 548.116322][T19948] ? blkdev_common_ioctl+0x438/0x1180 [ 548.121752][T19948] ? selinux_file_ioctl+0x522/0x590 [ 548.126956][T19948] ? do_vfs_ioctl+0x819/0x14a0 [ 548.131789][T19948] ? lo_release+0x120/0x120 [ 548.136298][T19948] blkdev_ioctl+0x20e/0x440 [ 548.140868][T19948] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 548.146355][T19948] __se_sys_ioctl+0xcb/0x140 [ 548.150956][T19948] __x64_sys_ioctl+0x3f/0x50 [ 548.155600][T19948] do_syscall_64+0x44/0xd0 [ 548.160018][T19948] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 548.165917][T19948] RIP: 0033:0x7f867f5948b7 [ 548.170327][T19948] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 548.189929][T19948] RSP: 002b:00007f867ed0af48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 548.198382][T19948] RAX: ffffffffffffffda RBX: 00007f867f5de9c8 RCX: 00007f867f5948b7 [ 548.206356][T19948] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 548.214322][T19948] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 22:16:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 15) 22:16:16 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x2000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 548.222284][T19948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 548.230607][T19948] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 548.238579][T19948] [ 548.256935][T19948] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 548.266234][T19948] EXT4-fs (loop2): group descriptors corrupted! 22:16:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x11, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 39) 22:16:16 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FWMARK={0x8, 0x14, 0x1000}]}}}]}, 0x38}}, 0x0) 22:16:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 548.277098][T19945] loop4: detected capacity change from 0 to 5 [ 548.285139][T19945] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 548.400509][T19955] FAULT_INJECTION: forcing a failure. [ 548.400509][T19955] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 548.413678][T19955] CPU: 0 PID: 19955 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 548.422457][T19955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.433014][T19955] Call Trace: [ 548.436286][T19955] [ 548.439212][T19955] dump_stack_lvl+0xd6/0x122 [ 548.443896][T19955] dump_stack+0x11/0x1b [ 548.448050][T19955] should_fail+0x23c/0x250 [ 548.452538][T19955] should_fail_usercopy+0x16/0x20 [ 548.457555][T19955] strncpy_from_user+0x21/0x250 [ 548.462476][T19955] getname_flags+0xb8/0x3f0 [ 548.467039][T19955] ? vfs_write+0x667/0x950 [ 548.471458][T19955] getname+0x15/0x20 [ 548.475414][T19955] do_sys_openat2+0x6d/0x2b0 [ 548.480155][T19955] __x64_sys_openat+0xef/0x110 [ 548.484920][T19955] do_syscall_64+0x44/0xd0 [ 548.489438][T19955] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 548.495415][T19955] RIP: 0033:0x7f7ca8be3a14 [ 548.499826][T19955] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 548.519446][T19955] RSP: 002b:00007f7ca83a6ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 548.527900][T19955] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8be3a14 [ 548.535919][T19955] RDX: 0000000000000002 RSI: 00007f7ca83a7000 RDI: 00000000ffffff9c 22:16:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 16) [ 548.543883][T19955] RBP: 00007f7ca83a7000 R08: 0000000000000000 R09: ffffffffffffffff [ 548.551972][T19955] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 548.559950][T19955] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 548.567974][T19955] [ 548.606449][T19961] loop2: detected capacity change from 0 to 264192 [ 548.608822][T19960] loop0: detected capacity change from 0 to 6 [ 548.613583][T19962] loop3: detected capacity change from 0 to 5 [ 548.627289][T19961] FAULT_INJECTION: forcing a failure. [ 548.627289][T19961] name failslab, interval 1, probability 0, space 0, times 0 [ 548.639977][T19961] CPU: 0 PID: 19961 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 548.648741][T19961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.658969][T19961] Call Trace: [ 548.662241][T19961] [ 548.665165][T19961] dump_stack_lvl+0xd6/0x122 [ 548.669845][T19961] dump_stack+0x11/0x1b [ 548.673998][T19961] should_fail+0x23c/0x250 [ 548.678489][T19961] ? getname_flags+0x84/0x3f0 [ 548.683257][T19961] __should_failslab+0x81/0x90 [ 548.688056][T19961] should_failslab+0x5/0x20 [ 548.692608][T19961] kmem_cache_alloc+0x4f/0x320 [ 548.697372][T19961] getname_flags+0x84/0x3f0 [ 548.701889][T19961] __x64_sys_mkdir+0x31/0x50 [ 548.706504][T19961] do_syscall_64+0x44/0xd0 [ 548.710921][T19961] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 548.716874][T19961] RIP: 0033:0x7f867f593c07 [ 548.721280][T19961] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 548.740961][T19961] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 548.749294][T19960] FAT-fs (loop0): Directory bread(block 6) failed [ 548.749420][T19961] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f593c07 [ 548.763847][T19961] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 548.771908][T19961] RBP: 00007f867ed0b040 R08: 0000000000000000 R09: ffffffffffffffff [ 548.779883][T19961] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 548.787873][T19961] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 548.796016][T19961] 22:16:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 40) 22:16:17 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FWMARK={0x8, 0x14, 0x1000}]}}}]}, 0x38}}, 0x0) [ 548.805629][T19962] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 548.830756][T19966] loop4: detected capacity change from 0 to 5 [ 548.847195][T19966] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 548.865292][T19962] loop3: detected capacity change from 0 to 5 [ 548.873886][T19962] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 548.912212][T19968] FAULT_INJECTION: forcing a failure. [ 548.912212][T19968] name failslab, interval 1, probability 0, space 0, times 0 [ 548.924921][T19968] CPU: 0 PID: 19968 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 548.933682][T19968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.943729][T19968] Call Trace: [ 548.947003][T19968] [ 548.949924][T19968] dump_stack_lvl+0xd6/0x122 [ 548.954515][T19968] dump_stack+0x11/0x1b [ 548.958714][T19968] should_fail+0x23c/0x250 [ 548.963128][T19968] ? __alloc_file+0x2e/0x1a0 [ 548.967790][T19968] __should_failslab+0x81/0x90 [ 548.972556][T19968] should_failslab+0x5/0x20 [ 548.977117][T19968] kmem_cache_alloc+0x4f/0x320 [ 548.981886][T19968] __alloc_file+0x2e/0x1a0 [ 548.986309][T19968] alloc_empty_file+0xcd/0x1c0 [ 548.991079][T19968] path_openat+0x6a/0x1eb0 [ 548.995499][T19968] ? __set_page_dirty_no_writeback+0x7d/0xc0 [ 549.001654][T19968] ? folio_mark_dirty+0x84/0xe0 [ 549.006539][T19968] ? unlock_page+0x37/0x50 [ 549.011225][T19968] ? inode_to_bdi+0x43/0xa0 [ 549.015736][T19968] ? balance_dirty_pages_ratelimited+0x47/0x280 [ 549.022012][T19968] ? generic_perform_write+0x397/0x400 [ 549.027539][T19968] do_filp_open+0x105/0x220 [ 549.032079][T19968] do_sys_openat2+0xb5/0x2b0 [ 549.036693][T19968] __x64_sys_openat+0xef/0x110 [ 549.041500][T19968] do_syscall_64+0x44/0xd0 [ 549.046002][T19968] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 549.051893][T19968] RIP: 0033:0x7f7ca8be3a14 [ 549.056364][T19968] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 549.075967][T19968] RSP: 002b:00007f7ca83a6ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 549.084478][T19968] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8be3a14 [ 549.092452][T19968] RDX: 0000000000000002 RSI: 00007f7ca83a7000 RDI: 00000000ffffff9c [ 549.100457][T19968] RBP: 00007f7ca83a7000 R08: 0000000000000000 R09: ffffffffffffffff [ 549.108565][T19968] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 549.112382][T19971] loop2: detected capacity change from 0 to 264192 [ 549.116543][T19968] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 549.116564][T19968] [ 549.132383][T19971] FAULT_INJECTION: forcing a failure. [ 549.132383][T19971] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 549.147060][T19971] CPU: 1 PID: 19971 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 549.155900][T19971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.166023][T19971] Call Trace: [ 549.169301][T19971] [ 549.172263][T19971] dump_stack_lvl+0xd6/0x122 [ 549.176860][T19971] dump_stack+0x11/0x1b [ 549.181060][T19971] should_fail+0x23c/0x250 [ 549.185471][T19971] should_fail_usercopy+0x16/0x20 [ 549.190494][T19971] strncpy_from_user+0x21/0x250 [ 549.195347][T19971] getname_flags+0xb8/0x3f0 [ 549.199930][T19971] __x64_sys_mkdir+0x31/0x50 [ 549.204573][T19971] do_syscall_64+0x44/0xd0 [ 549.208987][T19971] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 549.214922][T19971] RIP: 0033:0x7f867f593c07 [ 549.219336][T19971] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 549.238990][T19971] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 549.247400][T19971] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f593c07 [ 549.255368][T19971] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 22:16:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 17) 22:16:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x12, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 549.263337][T19971] RBP: 00007f867ed0b040 R08: 0000000000000000 R09: ffffffffffffffff [ 549.271304][T19971] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 549.279293][T19971] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 549.287259][T19971] [ 549.299965][T19966] loop4: detected capacity change from 0 to 5 22:16:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 41) 22:16:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 549.306755][T19966] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 549.354492][T19972] loop0: detected capacity change from 0 to 6 [ 549.361539][T19972] FAT-fs (loop0): Directory bread(block 6) failed [ 549.425690][T19974] FAULT_INJECTION: forcing a failure. [ 549.425690][T19974] name failslab, interval 1, probability 0, space 0, times 0 [ 549.438395][T19974] CPU: 0 PID: 19974 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 549.447223][T19974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.457283][T19974] Call Trace: [ 549.460569][T19974] [ 549.463494][T19974] dump_stack_lvl+0xd6/0x122 [ 549.468090][T19974] dump_stack+0x11/0x1b [ 549.472249][T19974] should_fail+0x23c/0x250 [ 549.476666][T19974] ? security_file_alloc+0x30/0x190 [ 549.481866][T19974] __should_failslab+0x81/0x90 [ 549.486635][T19974] should_failslab+0x5/0x20 [ 549.491155][T19974] kmem_cache_alloc+0x4f/0x320 [ 549.496006][T19974] security_file_alloc+0x30/0x190 [ 549.501204][T19974] __alloc_file+0x83/0x1a0 [ 549.505686][T19974] alloc_empty_file+0xcd/0x1c0 [ 549.510484][T19974] path_openat+0x6a/0x1eb0 [ 549.514972][T19974] ? __set_page_dirty_no_writeback+0x7d/0xc0 [ 549.521051][T19974] ? folio_mark_dirty+0x84/0xe0 [ 549.525940][T19974] ? unlock_page+0x37/0x50 [ 549.530410][T19974] ? inode_to_bdi+0x43/0xa0 [ 549.534921][T19974] ? balance_dirty_pages_ratelimited+0x47/0x280 [ 549.537547][T19980] loop4: detected capacity change from 0 to 5 [ 549.541174][T19974] ? generic_perform_write+0x397/0x400 [ 549.541204][T19974] do_filp_open+0x105/0x220 [ 549.555352][T19980] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 549.557278][T19974] do_sys_openat2+0xb5/0x2b0 [ 549.557309][T19974] __x64_sys_openat+0xef/0x110 [ 549.577053][T19974] do_syscall_64+0x44/0xd0 [ 549.581472][T19974] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 549.587435][T19974] RIP: 0033:0x7f7ca8be3a14 [ 549.591851][T19974] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 549.611482][T19974] RSP: 002b:00007f7ca83a6ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 549.613856][T19981] loop3: detected capacity change from 0 to 5 [ 549.619897][T19974] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8be3a14 [ 549.619912][T19974] RDX: 0000000000000002 RSI: 00007f7ca83a7000 RDI: 00000000ffffff9c [ 549.619946][T19974] RBP: 00007f7ca83a7000 R08: 0000000000000000 R09: ffffffffffffffff [ 549.636279][T19981] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 549.642274][T19974] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 549.642335][T19974] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 22:16:17 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x3000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:16:17 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="00000000000000001800120008000100736974000c00020008000200068cb4e51364732a10e9c16585ba4ad9cf590362d8cb0d12e6ab82377634b2365a6a47fe6bfa4fabaf353dc6b50141b33a44d8dd21f1a8b524fef9f5f8a7ecc491acfdd09b30939b0c92bbe4acffa35e08a72ff15edc8a18628d2c2fc903f6761336cc8cee536f5338932318509020802efcd693f1ca0937e56d2a3192226321d5a3dcfa568a585dad3219e9a5078957912cf400a015f50b581c0b6eadba592e39c796531fc1ae6969b8258160358398d0c1175c3f426b770f2a9c4bbad87df2c6fd27192fbbe0a2af4a70233acffaf84add1b82b0a7d9858997c30bdaae237c71171f83", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x1000}]}}}]}, 0x40}}, 0x0) [ 549.676413][T19974] 22:16:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 18) [ 549.711279][T19984] loop2: detected capacity change from 0 to 264192 [ 549.720370][T19984] FAULT_INJECTION: forcing a failure. [ 549.720370][T19984] name failslab, interval 1, probability 0, space 0, times 0 [ 549.733072][T19984] CPU: 1 PID: 19984 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 549.741901][T19984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.751957][T19984] Call Trace: [ 549.755227][T19984] [ 549.758150][T19984] dump_stack_lvl+0xd6/0x122 [ 549.762751][T19984] dump_stack+0x11/0x1b [ 549.766988][T19984] should_fail+0x23c/0x250 [ 549.771408][T19984] ? __d_alloc+0x36/0x370 [ 549.775733][T19984] __should_failslab+0x81/0x90 [ 549.780501][T19984] should_failslab+0x5/0x20 [ 549.785010][T19984] kmem_cache_alloc+0x4f/0x320 [ 549.789772][T19984] __d_alloc+0x36/0x370 [ 549.794124][T19984] d_alloc+0x2a/0x110 [ 549.798105][T19984] __lookup_hash+0x8f/0x180 [ 549.802605][T19984] filename_create+0xfc/0x270 [ 549.807344][T19984] do_mkdirat+0x53/0x2c0 [ 549.811587][T19984] __x64_sys_mkdir+0x40/0x50 [ 549.816175][T19984] do_syscall_64+0x44/0xd0 [ 549.820657][T19984] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 549.826555][T19984] RIP: 0033:0x7f867f593c07 [ 549.830961][T19984] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 549.850595][T19984] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 549.859012][T19984] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f593c07 [ 549.866980][T19984] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 549.875046][T19984] RBP: 00007f867ed0b040 R08: 0000000000000000 R09: ffffffffffffffff [ 549.883010][T19984] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 549.891021][T19984] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 549.899048][T19984] 22:16:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 42) 22:16:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x22, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 549.908711][T19985] loop0: detected capacity change from 0 to 6 [ 549.916783][T19981] loop3: detected capacity change from 0 to 5 [ 549.924144][T19981] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 549.935390][T19985] FAT-fs (loop0): Directory bread(block 6) failed 22:16:18 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x1000}]}}}]}, 0x40}}, 0x0) [ 550.036019][T19989] FAULT_INJECTION: forcing a failure. [ 550.036019][T19989] name failslab, interval 1, probability 0, space 0, times 0 [ 550.048701][T19989] CPU: 0 PID: 19989 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 550.057467][T19989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.067524][T19989] Call Trace: [ 550.070797][T19989] [ 550.073730][T19989] dump_stack_lvl+0xd6/0x122 [ 550.078373][T19989] dump_stack+0x11/0x1b [ 550.082532][T19989] should_fail+0x23c/0x250 [ 550.086994][T19989] ? kzalloc+0x16/0x20 [ 550.091078][T19989] __should_failslab+0x81/0x90 [ 550.095888][T19989] should_failslab+0x5/0x20 [ 550.100395][T19989] __kmalloc+0x6f/0x370 [ 550.104546][T19989] ? iput+0x1cd/0x580 [ 550.108560][T19989] kzalloc+0x16/0x20 [ 550.112457][T19989] alloc_workqueue+0x12f/0xad0 [ 550.117295][T19989] ? blkdev_get_by_dev+0xb8b/0xc60 [ 550.122403][T19989] ? preempt_count_add+0x4e/0x90 [ 550.127352][T19989] ? _raw_spin_unlock+0x2e/0x50 [ 550.132216][T19989] ? bd_prepare_to_claim+0x1ac/0x200 [ 550.137503][T19989] loop_configure+0x70e/0xf30 [ 550.142185][T19989] lo_ioctl+0x583/0x1270 [ 550.146478][T19989] ? folio_mark_dirty+0x84/0xe0 [ 550.151330][T19989] ? unlock_page+0x37/0x50 [ 550.155797][T19989] ? __rcu_read_unlock+0x5c/0x290 [ 550.160835][T19989] ? blkdev_common_ioctl+0x438/0x1180 [ 550.166247][T19989] ? selinux_file_ioctl+0x522/0x590 [ 550.171443][T19989] ? do_vfs_ioctl+0x819/0x14a0 [ 550.176206][T19989] ? lo_release+0x120/0x120 [ 550.180738][T19989] blkdev_ioctl+0x20e/0x440 [ 550.185238][T19989] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 550.190707][T19989] __se_sys_ioctl+0xcb/0x140 [ 550.195366][T19989] __x64_sys_ioctl+0x3f/0x50 [ 550.200038][T19989] do_syscall_64+0x44/0xd0 [ 550.204473][T19989] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 550.210374][T19989] RIP: 0033:0x7f7ca8c308b7 [ 550.214788][T19989] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 550.227066][T19997] loop3: detected capacity change from 0 to 5 [ 550.234508][T19989] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 550.234533][T19989] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 550.234545][T19989] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 550.234557][T19989] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 550.234568][T19989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 22:16:18 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x4000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:16:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 19) [ 550.234579][T19989] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 550.268059][T19997] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 550.273084][T19989] [ 550.280335][T19996] loop4: detected capacity change from 0 to 5 [ 550.319478][T19996] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 550.336448][T19997] loop3: detected capacity change from 0 to 5 [ 550.349054][T19997] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 550.364016][T20003] loop0: detected capacity change from 0 to 6 [ 550.370856][T20003] FAT-fs (loop0): Directory bread(block 6) failed [ 550.383658][T19996] loop4: detected capacity change from 0 to 5 [ 550.390639][T20004] loop2: detected capacity change from 0 to 264192 [ 550.397252][T20004] FAULT_INJECTION: forcing a failure. [ 550.397252][T20004] name failslab, interval 1, probability 0, space 0, times 0 [ 550.409951][T20004] CPU: 0 PID: 20004 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 550.418797][T20004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.428854][T20004] Call Trace: [ 550.432135][T20004] [ 550.435067][T20004] dump_stack_lvl+0xd6/0x122 [ 550.439663][T20004] dump_stack+0x11/0x1b [ 550.443815][T20004] should_fail+0x23c/0x250 [ 550.448228][T20004] ? ext4_alloc_inode+0x27/0x300 [ 550.453176][T20004] __should_failslab+0x81/0x90 [ 550.457941][T20004] ? set_qf_name+0x230/0x230 [ 550.460139][T19996] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 550.462532][T20004] should_failslab+0x5/0x20 [ 550.477187][T20004] kmem_cache_alloc+0x4f/0x320 [ 550.482010][T20004] ? set_qf_name+0x230/0x230 [ 550.486598][T20004] ext4_alloc_inode+0x27/0x300 [ 550.491414][T20004] ? set_qf_name+0x230/0x230 [ 550.496013][T20004] new_inode_pseudo+0x38/0x190 [ 550.500774][T20004] new_inode+0x21/0x100 [ 550.504924][T20004] __ext4_new_inode+0x13f/0x2fc0 [ 550.510043][T20004] ? avc_has_perm+0xd5/0x160 [ 550.514706][T20004] ext4_mkdir+0x28a/0x760 [ 550.519052][T20004] vfs_mkdir+0x2c8/0x3d0 [ 550.523353][T20004] do_mkdirat+0x12e/0x2c0 [ 550.527667][T20004] __x64_sys_mkdir+0x40/0x50 [ 550.532309][T20004] do_syscall_64+0x44/0xd0 [ 550.536758][T20004] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 550.542662][T20004] RIP: 0033:0x7f867f593c07 [ 550.547065][T20004] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 550.566716][T20004] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 550.575196][T20004] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f593c07 22:16:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 550.583241][T20004] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 550.591362][T20004] RBP: 00007f867ed0b040 R08: 0000000000000000 R09: ffffffffffffffff [ 550.599358][T20004] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 550.607324][T20004] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 550.615297][T20004] 22:16:18 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0xa1, 0x7f, 0x0, 0x10, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x4}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001}, 0x0, 0xf7fffbffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000080)='\x00', &(0x7f00000003c0)="1594a826b83b66d2210c3a36c78ec3bfd589e0b32daff198a4ca47d65b9fc88faf269475525c7bb0782d0ba3c9cc1acf16acd1b91e0f8419e992df25fc0f82cf1210c771c84facf28bbe005277362fcf424ecbada3032c0c8a91fe39f3159f7104b71325068a58b6739eea6c3ef21b1b674cd305cc3bae7338cfee3538c8f2887aff77da98c8882f31740f4d75461d630b2971e70e2229e1fe715c50b466a27ea0045495de7d379922fdf9ceeeaa5567763b68d4e5a9a816563c465de59bf60667a631d6", 0xc4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x1, 0x7, 0x9, 0xff, {{0x12, 0x4, 0x3, 0x10, 0x48, 0x68, 0x0, 0x5, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x14, 0xfe, 0x0, 0x8, [0xfffffffd, 0x4, 0x1ff, 0xecc]}, @timestamp_addr={0x44, 0x14, 0x69, 0x1, 0xb, [{@multicast2, 0xffffffff}, {@broadcast, 0xfffffffd}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xe1, [@multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f00000006c0)={'sit0\x00', r4, 0x2f, 0x0, 0x20, 0x1, 0x8, @loopback, @mcast2, 0x1, 0x80, 0x8, 0x1}}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x1000}]}}}]}, 0x40}}, 0x0) 22:16:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 43) [ 550.681035][T20009] FAULT_INJECTION: forcing a failure. [ 550.681035][T20009] name failslab, interval 1, probability 0, space 0, times 0 [ 550.693705][T20009] CPU: 0 PID: 20009 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 550.702469][T20009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.712524][T20009] Call Trace: [ 550.715799][T20009] [ 550.718829][T20009] dump_stack_lvl+0xd6/0x122 [ 550.723513][T20009] dump_stack+0x11/0x1b [ 550.727684][T20009] should_fail+0x23c/0x250 [ 550.732096][T20009] ? alloc_workqueue+0x15d/0xad0 [ 550.737042][T20009] __should_failslab+0x81/0x90 [ 550.741963][T20009] should_failslab+0x5/0x20 [ 550.746479][T20009] kmem_cache_alloc_trace+0x52/0x350 [ 550.751863][T20009] ? kzalloc+0x16/0x20 [ 550.756044][T20009] alloc_workqueue+0x15d/0xad0 [ 550.760887][T20009] ? blkdev_get_by_dev+0xb8b/0xc60 [ 550.766181][T20009] ? preempt_count_add+0x4e/0x90 [ 550.771138][T20009] ? _raw_spin_unlock+0x2e/0x50 [ 550.776001][T20009] ? bd_prepare_to_claim+0x1ac/0x200 [ 550.781292][T20009] loop_configure+0x70e/0xf30 [ 550.785981][T20009] lo_ioctl+0x583/0x1270 [ 550.790224][T20009] ? folio_mark_dirty+0x84/0xe0 [ 550.795075][T20009] ? unlock_page+0x37/0x50 [ 550.799495][T20009] ? __rcu_read_unlock+0x5c/0x290 [ 550.804527][T20009] ? blkdev_common_ioctl+0x438/0x1180 [ 550.809898][T20009] ? selinux_file_ioctl+0x522/0x590 [ 550.815148][T20009] ? do_vfs_ioctl+0x819/0x14a0 [ 550.819990][T20009] ? lo_release+0x120/0x120 [ 550.824491][T20009] blkdev_ioctl+0x20e/0x440 [ 550.829077][T20009] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 550.834619][T20009] __se_sys_ioctl+0xcb/0x140 [ 550.839241][T20009] __x64_sys_ioctl+0x3f/0x50 [ 550.843915][T20009] do_syscall_64+0x44/0xd0 [ 550.848335][T20009] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 550.854280][T20009] RIP: 0033:0x7f7ca8c308b7 [ 550.858701][T20009] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 550.878329][T20009] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 550.886743][T20009] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 550.894718][T20009] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 550.902692][T20009] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 550.903407][T20013] loop2: detected capacity change from 0 to 264192 [ 550.910746][T20009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 550.910762][T20009] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 550.910778][T20009] [ 550.939743][T20013] FAULT_INJECTION: forcing a failure. [ 550.939743][T20013] name failslab, interval 1, probability 0, space 0, times 0 [ 550.952464][T20013] CPU: 1 PID: 20013 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 550.961407][T20013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.971517][T20013] Call Trace: [ 550.974790][T20013] [ 550.977710][T20013] dump_stack_lvl+0xd6/0x122 [ 550.982370][T20013] dump_stack+0x11/0x1b [ 550.986523][T20013] should_fail+0x23c/0x250 [ 550.991031][T20013] ? security_inode_alloc+0x30/0x180 [ 550.996400][T20013] __should_failslab+0x81/0x90 [ 551.001165][T20013] should_failslab+0x5/0x20 [ 551.005667][T20013] kmem_cache_alloc+0x4f/0x320 [ 551.010442][T20013] security_inode_alloc+0x30/0x180 [ 551.015557][T20013] inode_init_always+0x214/0x3e0 [ 551.020640][T20013] ? set_qf_name+0x230/0x230 [ 551.025227][T20013] new_inode_pseudo+0x6f/0x190 [ 551.029990][T20013] new_inode+0x21/0x100 [ 551.034141][T20013] __ext4_new_inode+0x13f/0x2fc0 [ 551.039075][T20013] ? avc_has_perm+0xd5/0x160 [ 551.043769][T20013] ext4_mkdir+0x28a/0x760 [ 551.048104][T20013] vfs_mkdir+0x2c8/0x3d0 [ 551.052385][T20013] do_mkdirat+0x12e/0x2c0 [ 551.056727][T20013] __x64_sys_mkdir+0x40/0x50 [ 551.061312][T20013] do_syscall_64+0x44/0xd0 [ 551.065726][T20013] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 551.071667][T20013] RIP: 0033:0x7f867f593c07 [ 551.076081][T20013] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 551.095768][T20013] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 551.104184][T20013] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f593c07 [ 551.112151][T20013] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 551.120237][T20013] RBP: 00007f867ed0b040 R08: 0000000000000000 R09: ffffffffffffffff 22:16:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 20) 22:16:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 44) [ 551.128290][T20013] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 551.136347][T20013] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 551.144320][T20013] [ 551.223767][T20017] loop3: detected capacity change from 0 to 5 [ 551.251671][T20018] loop0: detected capacity change from 0 to 6 [ 551.251889][T20017] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 551.259131][T20019] loop4: detected capacity change from 0 to 5 [ 551.276024][T20018] FAT-fs (loop0): Directory bread(block 6) failed [ 551.300572][T20019] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 551.315371][T20017] loop3: detected capacity change from 0 to 5 22:16:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 551.323858][T20017] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 551.338771][T20019] loop4: detected capacity change from 0 to 5 [ 551.345809][T20019] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 551.431525][T20022] FAULT_INJECTION: forcing a failure. [ 551.431525][T20022] name failslab, interval 1, probability 0, space 0, times 0 [ 551.444195][T20022] CPU: 1 PID: 20022 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 551.453027][T20022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.463078][T20022] Call Trace: [ 551.466392][T20022] [ 551.469384][T20022] dump_stack_lvl+0xd6/0x122 [ 551.473974][T20022] dump_stack+0x11/0x1b [ 551.478183][T20022] should_fail+0x23c/0x250 [ 551.482592][T20022] ? kzalloc+0x16/0x20 [ 551.486675][T20022] __should_failslab+0x81/0x90 [ 551.491505][T20022] should_failslab+0x5/0x20 [ 551.496062][T20022] __kmalloc+0x6f/0x370 [ 551.500223][T20022] ? number+0xa13/0xb60 [ 551.504430][T20022] kzalloc+0x16/0x20 [ 551.508323][T20022] apply_wqattrs_prepare+0x3a/0x630 [ 551.513519][T20022] ? vsnprintf+0xe8f/0xed0 [ 551.517936][T20022] apply_workqueue_attrs+0x9e/0x100 [ 551.523153][T20022] alloc_workqueue+0x777/0xad0 [ 551.527997][T20022] ? preempt_count_add+0x4e/0x90 [ 551.532937][T20022] ? _raw_spin_unlock+0x2e/0x50 [ 551.537809][T20022] ? bd_prepare_to_claim+0x1ac/0x200 [ 551.543100][T20022] loop_configure+0x70e/0xf30 [ 551.547771][T20022] lo_ioctl+0x583/0x1270 [ 551.552023][T20022] ? folio_mark_dirty+0x84/0xe0 [ 551.556983][T20022] ? unlock_page+0x37/0x50 [ 551.561466][T20022] ? __rcu_read_unlock+0x5c/0x290 [ 551.566653][T20022] ? blkdev_common_ioctl+0x438/0x1180 [ 551.572034][T20022] ? selinux_file_ioctl+0x522/0x590 [ 551.577235][T20022] ? do_vfs_ioctl+0x819/0x14a0 [ 551.581996][T20022] ? lo_release+0x120/0x120 [ 551.586496][T20022] blkdev_ioctl+0x20e/0x440 [ 551.591019][T20022] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 551.596532][T20022] __se_sys_ioctl+0xcb/0x140 [ 551.601123][T20022] __x64_sys_ioctl+0x3f/0x50 [ 551.605780][T20022] do_syscall_64+0x44/0xd0 [ 551.610281][T20022] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 551.616225][T20022] RIP: 0033:0x7f7ca8c308b7 [ 551.620631][T20022] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 551.640381][T20022] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 551.648847][T20022] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 551.656814][T20022] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 551.664978][T20022] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 551.672945][T20022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 22:16:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 21) [ 551.681070][T20022] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 551.689087][T20022] [ 551.708593][T20025] loop2: detected capacity change from 0 to 264192 [ 551.716258][T20025] FAULT_INJECTION: forcing a failure. [ 551.716258][T20025] name failslab, interval 1, probability 0, space 0, times 0 [ 551.729370][T20025] CPU: 0 PID: 20025 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 551.738132][T20025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.748202][T20025] Call Trace: [ 551.751495][T20025] [ 551.754427][T20025] dump_stack_lvl+0xd6/0x122 [ 551.759117][T20025] dump_stack+0x11/0x1b [ 551.763292][T20025] should_fail+0x23c/0x250 [ 551.767716][T20025] ? security_inode_alloc+0x30/0x180 [ 551.773011][T20025] __should_failslab+0x81/0x90 [ 551.777773][T20025] should_failslab+0x5/0x20 [ 551.782365][T20025] kmem_cache_alloc+0x4f/0x320 [ 551.787144][T20025] security_inode_alloc+0x30/0x180 [ 551.792259][T20025] inode_init_always+0x214/0x3e0 [ 551.797267][T20025] ? set_qf_name+0x230/0x230 [ 551.802045][T20025] new_inode_pseudo+0x6f/0x190 [ 551.806818][T20025] new_inode+0x21/0x100 [ 551.810999][T20025] __ext4_new_inode+0x13f/0x2fc0 [ 551.815951][T20025] ? avc_has_perm+0xd5/0x160 [ 551.820547][T20025] ext4_mkdir+0x28a/0x760 [ 551.824942][T20025] vfs_mkdir+0x2c8/0x3d0 [ 551.829183][T20025] do_mkdirat+0x12e/0x2c0 22:16:20 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x4200, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 551.833529][T20025] __x64_sys_mkdir+0x40/0x50 [ 551.838177][T20025] do_syscall_64+0x44/0xd0 [ 551.842936][T20025] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 551.848859][T20025] RIP: 0033:0x7f867f593c07 [ 551.853289][T20025] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 551.873020][T20025] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 551.881470][T20025] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f593c07 [ 551.889449][T20025] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 551.897511][T20025] RBP: 00007f867ed0b040 R08: 0000000000000000 R09: ffffffffffffffff [ 551.905659][T20025] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 551.913965][T20025] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 551.922025][T20025] 22:16:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 45) [ 551.994868][T20029] loop0: detected capacity change from 0 to 5 [ 552.013849][T20029] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 552.013901][T20030] loop3: detected capacity change from 0 to 5 [ 552.033685][T20031] loop4: detected capacity change from 0 to 5 22:16:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 552.046313][T20030] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 552.063994][T20031] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 552.090862][T20030] loop3: detected capacity change from 0 to 5 [ 552.093509][T20034] FAULT_INJECTION: forcing a failure. [ 552.093509][T20034] name failslab, interval 1, probability 0, space 0, times 0 [ 552.098986][T20030] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 552.109601][T20034] CPU: 1 PID: 20034 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 552.128467][T20034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.138520][T20034] Call Trace: [ 552.141793][T20034] [ 552.144726][T20034] dump_stack_lvl+0xd6/0x122 [ 552.149395][T20034] dump_stack+0x11/0x1b [ 552.153544][T20034] should_fail+0x23c/0x250 [ 552.157952][T20034] ? apply_wqattrs_prepare+0x5f/0x630 [ 552.163353][T20034] __should_failslab+0x81/0x90 [ 552.168130][T20034] should_failslab+0x5/0x20 [ 552.172645][T20034] kmem_cache_alloc_trace+0x52/0x350 [ 552.177941][T20034] ? kzalloc+0x16/0x20 [ 552.182077][T20034] apply_wqattrs_prepare+0x5f/0x630 [ 552.187294][T20034] ? vsnprintf+0xe8f/0xed0 [ 552.191704][T20034] apply_workqueue_attrs+0x9e/0x100 [ 552.196977][T20034] alloc_workqueue+0x777/0xad0 [ 552.201852][T20034] ? preempt_count_add+0x4e/0x90 [ 552.206791][T20034] ? _raw_spin_unlock+0x2e/0x50 [ 552.211664][T20034] ? bd_prepare_to_claim+0x1ac/0x200 [ 552.216948][T20034] loop_configure+0x70e/0xf30 [ 552.221627][T20034] lo_ioctl+0x583/0x1270 [ 552.225866][T20034] ? folio_mark_dirty+0x84/0xe0 [ 552.230758][T20034] ? unlock_page+0x37/0x50 [ 552.235169][T20034] ? __rcu_read_unlock+0x5c/0x290 [ 552.240204][T20034] ? blkdev_common_ioctl+0x438/0x1180 [ 552.245596][T20034] ? selinux_file_ioctl+0x522/0x590 [ 552.250824][T20034] ? do_vfs_ioctl+0x819/0x14a0 [ 552.255645][T20034] ? lo_release+0x120/0x120 [ 552.260168][T20034] blkdev_ioctl+0x20e/0x440 [ 552.264667][T20034] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 552.270121][T20034] __se_sys_ioctl+0xcb/0x140 [ 552.274766][T20034] __x64_sys_ioctl+0x3f/0x50 [ 552.279356][T20034] do_syscall_64+0x44/0xd0 [ 552.283791][T20034] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 552.289682][T20034] RIP: 0033:0x7f7ca8c308b7 [ 552.294145][T20034] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 552.313743][T20034] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 552.322157][T20034] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 552.330124][T20034] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 552.338091][T20034] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 22:16:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 22) 22:16:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 552.346067][T20034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 552.354050][T20034] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 552.362069][T20034] [ 552.372848][T20031] loop4: detected capacity change from 0 to 5 [ 552.380071][T20031] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 552.493443][T20037] loop2: detected capacity change from 0 to 264192 [ 552.500302][T20037] FAULT_INJECTION: forcing a failure. [ 552.500302][T20037] name failslab, interval 1, probability 0, space 0, times 0 [ 552.512966][T20037] CPU: 1 PID: 20037 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 552.521770][T20037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.531830][T20037] Call Trace: [ 552.535204][T20037] [ 552.538223][T20037] dump_stack_lvl+0xd6/0x122 [ 552.542817][T20037] dump_stack+0x11/0x1b [ 552.546989][T20037] should_fail+0x23c/0x250 [ 552.551564][T20037] ? sidtab_sid2str_get+0xb0/0x140 [ 552.556678][T20037] __should_failslab+0x81/0x90 [ 552.561554][T20037] should_failslab+0x5/0x20 [ 552.566110][T20037] __kmalloc_track_caller+0x6d/0x370 [ 552.571396][T20037] kmemdup+0x21/0x50 [ 552.575314][T20037] sidtab_sid2str_get+0xb0/0x140 [ 552.580285][T20037] security_sid_to_context_core+0x1d0/0x2d0 [ 552.586192][T20037] security_sid_to_context_force+0x2f/0x40 [ 552.592013][T20037] selinux_inode_init_security+0x4e4/0x590 [ 552.597834][T20037] security_inode_init_security+0xe4/0x260 [ 552.603698][T20037] ? ext4_init_security+0x40/0x40 [ 552.608721][T20037] ext4_init_security+0x30/0x40 [ 552.613694][T20037] __ext4_new_inode+0x29a3/0x2fc0 [ 552.618731][T20037] ext4_mkdir+0x28a/0x760 [ 552.623060][T20037] vfs_mkdir+0x2c8/0x3d0 [ 552.627423][T20037] do_mkdirat+0x12e/0x2c0 [ 552.631751][T20037] __x64_sys_mkdir+0x40/0x50 [ 552.636338][T20037] do_syscall_64+0x44/0xd0 [ 552.640753][T20037] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 552.646717][T20037] RIP: 0033:0x7f867f593c07 [ 552.651231][T20037] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 552.670934][T20037] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 552.679345][T20037] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f593c07 [ 552.687318][T20037] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 552.695397][T20037] RBP: 00007f867ed0b040 R08: 0000000000000000 R09: ffffffffffffffff [ 552.703398][T20037] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 552.711369][T20037] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 552.719343][T20037] 22:16:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 46) [ 552.822901][T20041] loop0: detected capacity change from 0 to 5 [ 552.841656][T20043] FAULT_INJECTION: forcing a failure. [ 552.841656][T20043] name failslab, interval 1, probability 0, space 0, times 0 [ 552.848023][T20041] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 552.854443][T20043] CPU: 0 PID: 20043 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 552.873276][T20043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.883346][T20043] Call Trace: [ 552.886619][T20043] [ 552.889553][T20043] dump_stack_lvl+0xd6/0x122 [ 552.894148][T20043] dump_stack+0x11/0x1b [ 552.898748][T20043] should_fail+0x23c/0x250 [ 552.903163][T20043] ? apply_wqattrs_prepare+0xbe/0x630 [ 552.908541][T20043] __should_failslab+0x81/0x90 [ 552.913310][T20043] should_failslab+0x5/0x20 [ 552.917829][T20043] kmem_cache_alloc_trace+0x52/0x350 [ 552.923178][T20043] ? apply_wqattrs_prepare+0x5f/0x630 [ 552.928556][T20043] apply_wqattrs_prepare+0xbe/0x630 [ 552.933834][T20043] ? vsnprintf+0xe8f/0xed0 [ 552.938274][T20043] apply_workqueue_attrs+0x9e/0x100 [ 552.943577][T20043] alloc_workqueue+0x777/0xad0 [ 552.949030][T20043] ? preempt_count_add+0x4e/0x90 [ 552.954015][T20043] ? _raw_spin_unlock+0x2e/0x50 [ 552.958927][T20043] ? bd_prepare_to_claim+0x1ac/0x200 [ 552.964209][T20043] loop_configure+0x70e/0xf30 [ 552.968890][T20043] lo_ioctl+0x583/0x1270 [ 552.973172][T20043] ? folio_mark_dirty+0x84/0xe0 [ 552.978017][T20043] ? unlock_page+0x37/0x50 [ 552.982435][T20043] ? __rcu_read_unlock+0x5c/0x290 [ 552.987535][T20043] ? blkdev_common_ioctl+0x438/0x1180 [ 552.992926][T20043] ? selinux_file_ioctl+0x522/0x590 [ 552.998125][T20043] ? do_vfs_ioctl+0x819/0x14a0 [ 553.002893][T20043] ? lo_release+0x120/0x120 [ 553.007456][T20043] blkdev_ioctl+0x20e/0x440 [ 553.011979][T20043] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 553.017530][T20043] __se_sys_ioctl+0xcb/0x140 [ 553.022136][T20043] __x64_sys_ioctl+0x3f/0x50 [ 553.026738][T20043] do_syscall_64+0x44/0xd0 [ 553.031208][T20043] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 553.037289][T20043] RIP: 0033:0x7f7ca8c308b7 [ 553.041697][T20043] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 553.061301][T20043] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 553.069708][T20043] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 553.077673][T20043] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 553.085761][T20043] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 553.093733][T20043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 553.101708][T20043] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 553.109690][T20043] [ 553.113783][T20047] loop2: detected capacity change from 0 to 264192 22:16:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 23) [ 553.114266][T20048] loop4: detected capacity change from 0 to 5 [ 553.122560][T20045] loop3: detected capacity change from 0 to 5 [ 553.143297][T20047] FAULT_INJECTION: forcing a failure. [ 553.143297][T20047] name failslab, interval 1, probability 0, space 0, times 0 [ 553.155981][T20047] CPU: 1 PID: 20047 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 553.164821][T20047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.174949][T20047] Call Trace: [ 553.178219][T20047] [ 553.181142][T20047] dump_stack_lvl+0xd6/0x122 [ 553.185777][T20047] dump_stack+0x11/0x1b [ 553.189932][T20047] should_fail+0x23c/0x250 [ 553.194405][T20047] ? kcalloc+0x32/0x50 [ 553.198479][T20047] __should_failslab+0x81/0x90 [ 553.203460][T20047] should_failslab+0x5/0x20 [ 553.207961][T20047] __kmalloc+0x6f/0x370 [ 553.212149][T20047] ? __this_cpu_preempt_check+0x18/0x20 [ 553.217695][T20047] ? __perf_event_task_sched_in+0x898/0x8d0 [ 553.223663][T20047] ? __this_cpu_preempt_check+0x18/0x20 [ 553.229214][T20047] kcalloc+0x32/0x50 [ 553.233129][T20047] ext4_find_extent+0x19f/0x7e0 [ 553.238103][T20047] ? finish_task_switch+0xd0/0x280 [ 553.243214][T20047] ext4_ext_map_blocks+0x115/0x2120 [ 553.248508][T20047] ? jbd2_journal_dirty_metadata+0x218/0x690 [ 553.254520][T20047] ? ext4_es_lookup_extent+0x221/0x500 [ 553.259984][T20047] ext4_map_blocks+0x1cf/0xf00 [ 553.264824][T20047] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 553.270459][T20047] ext4_getblk+0xc6/0x3e0 [ 553.274788][T20047] ext4_bread+0x28/0x100 [ 553.279028][T20047] ext4_append+0xd1/0x1c0 [ 553.283360][T20047] ext4_init_new_dir+0x177/0x500 [ 553.288511][T20047] ext4_mkdir+0x329/0x760 [ 553.292845][T20047] vfs_mkdir+0x2c8/0x3d0 [ 553.297145][T20047] do_mkdirat+0x12e/0x2c0 [ 553.301567][T20047] __x64_sys_mkdir+0x40/0x50 [ 553.306188][T20047] do_syscall_64+0x44/0xd0 [ 553.310608][T20047] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 553.316499][T20047] RIP: 0033:0x7f867f593c07 [ 553.320949][T20047] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 553.340644][T20047] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 553.349128][T20047] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f593c07 [ 553.357107][T20047] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 553.365078][T20047] RBP: 00007f867ed0b040 R08: 0000000000000000 R09: ffffffffffffffff 22:16:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 553.373039][T20047] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 553.381010][T20047] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 553.388987][T20047] [ 553.397247][T20048] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 553.411117][T20047] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) 22:16:21 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x5000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 553.411125][T20045] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 553.431149][T20047] EXT4-fs (loop2): group descriptors corrupted! [ 553.460562][T20045] loop3: detected capacity change from 0 to 5 [ 553.461173][T20048] loop4: detected capacity change from 0 to 5 22:16:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 47) 22:16:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x60, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 553.473870][T20045] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 553.474027][T20048] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 553.631069][T20055] FAULT_INJECTION: forcing a failure. [ 553.631069][T20055] name failslab, interval 1, probability 0, space 0, times 0 [ 553.643752][T20055] CPU: 1 PID: 20055 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 553.652586][T20055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.662820][T20055] Call Trace: [ 553.666090][T20055] [ 553.669013][T20055] dump_stack_lvl+0xd6/0x122 [ 553.673598][T20055] dump_stack+0x11/0x1b [ 553.677761][T20055] should_fail+0x23c/0x250 [ 553.682179][T20055] ? apply_wqattrs_prepare+0xbe/0x630 [ 553.687608][T20055] __should_failslab+0x81/0x90 [ 553.692495][T20055] should_failslab+0x5/0x20 [ 553.697002][T20055] kmem_cache_alloc_trace+0x52/0x350 [ 553.702354][T20055] ? apply_wqattrs_prepare+0x5f/0x630 [ 553.707883][T20055] apply_wqattrs_prepare+0xbe/0x630 [ 553.713089][T20055] ? vsnprintf+0xe8f/0xed0 [ 553.717504][T20055] apply_workqueue_attrs+0x9e/0x100 [ 553.722703][T20055] alloc_workqueue+0x777/0xad0 [ 553.727516][T20055] ? preempt_count_add+0x4e/0x90 [ 553.732479][T20055] ? _raw_spin_unlock+0x2e/0x50 [ 553.737356][T20055] ? bd_prepare_to_claim+0x1ac/0x200 [ 553.742643][T20055] loop_configure+0x70e/0xf30 [ 553.747432][T20055] lo_ioctl+0x583/0x1270 [ 553.751690][T20055] ? folio_mark_dirty+0x84/0xe0 [ 553.756544][T20055] ? unlock_page+0x37/0x50 [ 553.760962][T20055] ? __rcu_read_unlock+0x5c/0x290 [ 553.766070][T20055] ? blkdev_common_ioctl+0x438/0x1180 [ 553.771458][T20055] ? selinux_file_ioctl+0x522/0x590 [ 553.776744][T20055] ? do_vfs_ioctl+0x819/0x14a0 [ 553.781508][T20055] ? lo_release+0x120/0x120 [ 553.786011][T20055] blkdev_ioctl+0x20e/0x440 [ 553.790516][T20055] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 553.795981][T20055] __se_sys_ioctl+0xcb/0x140 [ 553.800658][T20055] __x64_sys_ioctl+0x3f/0x50 [ 553.805291][T20055] do_syscall_64+0x44/0xd0 [ 553.809705][T20055] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 553.815605][T20055] RIP: 0033:0x7f7ca8c308b7 [ 553.820011][T20055] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 553.839618][T20055] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 553.848032][T20055] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 553.855996][T20055] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 553.863957][T20055] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 553.871995][T20055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 22:16:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 24) [ 553.879989][T20055] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 553.887961][T20055] [ 553.898551][T20057] loop0: detected capacity change from 0 to 5 [ 553.921582][T20057] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 553.950905][T20061] loop2: detected capacity change from 0 to 264192 [ 553.962225][T20062] loop4: detected capacity change from 0 to 5 [ 553.964703][T20061] FAULT_INJECTION: forcing a failure. [ 553.964703][T20061] name failslab, interval 1, probability 0, space 0, times 0 [ 553.980954][T20061] CPU: 1 PID: 20061 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 553.989709][T20061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.000374][T20061] Call Trace: [ 554.003694][T20061] [ 554.006621][T20061] dump_stack_lvl+0xd6/0x122 [ 554.011213][T20061] dump_stack+0x11/0x1b [ 554.015366][T20061] should_fail+0x23c/0x250 [ 554.019778][T20061] ? __es_insert_extent+0x546/0xe80 [ 554.025006][T20061] __should_failslab+0x81/0x90 [ 554.029769][T20061] should_failslab+0x5/0x20 [ 554.034276][T20061] kmem_cache_alloc+0x4f/0x320 [ 554.039113][T20061] __es_insert_extent+0x546/0xe80 [ 554.044139][T20061] ext4_es_insert_extent+0x1cb/0x19c0 [ 554.049507][T20061] ext4_ext_map_blocks+0xff7/0x2120 [ 554.054784][T20061] ? jbd2_journal_dirty_metadata+0x218/0x690 [ 554.060812][T20061] ext4_map_blocks+0x1cf/0xf00 [ 554.065579][T20061] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 554.071221][T20061] ext4_getblk+0xc6/0x3e0 [ 554.075550][T20061] ext4_bread+0x28/0x100 [ 554.079839][T20061] ext4_append+0xd1/0x1c0 [ 554.084196][T20061] ext4_init_new_dir+0x177/0x500 [ 554.089208][T20061] ext4_mkdir+0x329/0x760 [ 554.093542][T20061] vfs_mkdir+0x2c8/0x3d0 [ 554.097846][T20061] do_mkdirat+0x12e/0x2c0 [ 554.102277][T20061] __x64_sys_mkdir+0x40/0x50 [ 554.106861][T20061] do_syscall_64+0x44/0xd0 [ 554.111278][T20061] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 554.117172][T20061] RIP: 0033:0x7f867f593c07 [ 554.121582][T20061] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 554.141369][T20061] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 22:16:22 executing program 0: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x302, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 554.149781][T20061] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f593c07 [ 554.157747][T20061] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 554.165822][T20061] RBP: 00007f867ed0b040 R08: 0000000000000000 R09: ffffffffffffffff [ 554.173795][T20061] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 554.181764][T20061] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 554.189740][T20061] [ 554.201409][T20062] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 554.201422][T20063] loop3: detected capacity change from 0 to 5 [ 554.219281][T20061] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 554.228551][T20061] EXT4-fs (loop2): group descriptors corrupted! [ 554.240334][T20063] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 48) [ 554.272959][T20062] loop4: detected capacity change from 0 to 5 [ 554.280294][T20062] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 554.301611][T20063] loop3: detected capacity change from 0 to 5 [ 554.309743][T20063] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 554.326224][T20067] FAULT_INJECTION: forcing a failure. [ 554.326224][T20067] name failslab, interval 1, probability 0, space 0, times 0 [ 554.338890][T20067] CPU: 0 PID: 20067 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 554.347724][T20067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.357773][T20067] Call Trace: [ 554.361044][T20067] [ 554.363969][T20067] dump_stack_lvl+0xd6/0x122 [ 554.368588][T20067] dump_stack+0x11/0x1b [ 554.372752][T20067] should_fail+0x23c/0x250 [ 554.377166][T20067] __should_failslab+0x81/0x90 [ 554.381993][T20067] should_failslab+0x5/0x20 [ 554.386552][T20067] kmem_cache_alloc_node+0x61/0x2d0 [ 554.391750][T20067] ? should_fail+0xd6/0x250 [ 554.396253][T20067] ? should_fail+0xd6/0x250 [ 554.400750][T20067] ? alloc_unbound_pwq+0x3e6/0x780 [ 554.405931][T20067] alloc_unbound_pwq+0x3e6/0x780 [ 554.410944][T20067] apply_wqattrs_prepare+0x1ed/0x630 [ 554.416301][T20067] ? vsnprintf+0xe8f/0xed0 [ 554.420750][T20067] apply_workqueue_attrs+0x9e/0x100 [ 554.425969][T20067] alloc_workqueue+0x777/0xad0 [ 554.430780][T20067] ? preempt_count_add+0x4e/0x90 [ 554.435772][T20067] ? _raw_spin_unlock+0x2e/0x50 [ 554.440731][T20067] ? bd_prepare_to_claim+0x1ac/0x200 [ 554.446063][T20067] loop_configure+0x70e/0xf30 [ 554.450749][T20067] lo_ioctl+0x583/0x1270 [ 554.455154][T20067] ? folio_mark_dirty+0x84/0xe0 [ 554.460004][T20067] ? unlock_page+0x37/0x50 [ 554.464541][T20067] ? __rcu_read_unlock+0x5c/0x290 [ 554.469576][T20067] ? blkdev_common_ioctl+0x438/0x1180 [ 554.474951][T20067] ? selinux_file_ioctl+0x522/0x590 [ 554.480167][T20067] ? do_vfs_ioctl+0x819/0x14a0 [ 554.485013][T20067] ? lo_release+0x120/0x120 [ 554.489516][T20067] blkdev_ioctl+0x20e/0x440 [ 554.494023][T20067] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 554.499542][T20067] __se_sys_ioctl+0xcb/0x140 [ 554.504289][T20067] __x64_sys_ioctl+0x3f/0x50 [ 554.508913][T20067] do_syscall_64+0x44/0xd0 [ 554.513336][T20067] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 554.519237][T20067] RIP: 0033:0x7f7ca8c308b7 [ 554.523665][T20067] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 554.543294][T20067] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 554.551720][T20067] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 554.559768][T20067] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 554.567742][T20067] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 554.575714][T20067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 554.583777][T20067] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 554.591825][T20067] [ 554.596146][T20072] loop2: detected capacity change from 0 to 264192 [ 554.607724][T20073] loop4: detected capacity change from 0 to 5 [ 554.621317][T20072] FAULT_INJECTION: forcing a failure. [ 554.621317][T20072] name failslab, interval 1, probability 0, space 0, times 0 [ 554.634510][T20072] CPU: 1 PID: 20072 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 554.643298][T20072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.653349][T20072] Call Trace: [ 554.656629][T20072] [ 554.659583][T20072] dump_stack_lvl+0xd6/0x122 [ 554.664197][T20072] dump_stack+0x11/0x1b [ 554.668349][T20072] should_fail+0x23c/0x250 [ 554.672937][T20072] ? kcalloc+0x32/0x50 [ 554.677057][T20072] __should_failslab+0x81/0x90 [ 554.681829][T20072] should_failslab+0x5/0x20 [ 554.686367][T20072] __kmalloc+0x6f/0x370 [ 554.690567][T20072] kcalloc+0x32/0x50 [ 554.694484][T20072] ext4_find_extent+0x19f/0x7e0 [ 554.699351][T20072] ? kfree+0xf8/0x1f0 [ 554.703331][T20072] ext4_ext_map_blocks+0x115/0x2120 [ 554.708537][T20072] ? jbd2_journal_dirty_metadata+0x218/0x690 [ 554.714521][T20072] ext4_map_blocks+0x71e/0xf00 [ 554.719286][T20072] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 554.725005][T20072] ext4_getblk+0xc6/0x3e0 [ 554.729387][T20072] ext4_bread+0x28/0x100 [ 554.733628][T20072] ext4_append+0xd1/0x1c0 [ 554.738022][T20072] ext4_init_new_dir+0x177/0x500 [ 554.742957][T20072] ext4_mkdir+0x329/0x760 [ 554.747343][T20072] vfs_mkdir+0x2c8/0x3d0 [ 554.751586][T20072] do_mkdirat+0x12e/0x2c0 [ 554.755924][T20072] __x64_sys_mkdir+0x40/0x50 [ 554.760570][T20072] do_syscall_64+0x44/0xd0 [ 554.765042][T20072] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 554.771008][T20072] RIP: 0033:0x7f867f593c07 [ 554.775417][T20072] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 554.795020][T20072] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 554.803425][T20072] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f593c07 [ 554.811391][T20072] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 554.819435][T20072] RBP: 00007f867ed0b040 R08: 0000000000000000 R09: ffffffffffffffff 22:16:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 25) 22:16:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:23 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x6000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 554.827404][T20072] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 554.835369][T20072] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 554.843341][T20072] [ 554.858378][T20073] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 49) [ 554.909695][T20073] loop4: detected capacity change from 0 to 5 [ 554.916708][T20073] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 554.990080][T20080] FAULT_INJECTION: forcing a failure. [ 554.990080][T20080] name failslab, interval 1, probability 0, space 0, times 0 [ 555.002790][T20080] CPU: 0 PID: 20080 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 555.011554][T20080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.021608][T20080] Call Trace: [ 555.024883][T20080] [ 555.027825][T20080] dump_stack_lvl+0xd6/0x122 [ 555.032565][T20080] dump_stack+0x11/0x1b [ 555.036717][T20080] should_fail+0x23c/0x250 [ 555.041136][T20080] ? kzalloc+0x1d/0x30 [ 555.045299][T20080] __should_failslab+0x81/0x90 [ 555.050066][T20080] should_failslab+0x5/0x20 [ 555.054570][T20080] __kmalloc+0x6f/0x370 [ 555.058815][T20080] kzalloc+0x1d/0x30 [ 555.062889][T20080] kobject_get_path+0x7c/0x110 [ 555.067662][T20080] kobject_uevent_env+0x1be/0xc40 [ 555.070462][T20081] loop3: detected capacity change from 0 to 5 [ 555.072724][T20080] ? preempt_count_add+0x4e/0x90 [ 555.083716][T20080] ? _raw_spin_unlock+0x2e/0x50 [ 555.088703][T20080] ? bd_prepare_to_claim+0x1ac/0x200 [ 555.093990][T20080] disk_force_media_change+0xe3/0x170 [ 555.099387][T20080] loop_configure+0x74d/0xf30 [ 555.104151][T20080] lo_ioctl+0x583/0x1270 [ 555.104729][T20081] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 555.108393][T20080] ? folio_mark_dirty+0x84/0xe0 [ 555.108417][T20080] ? unlock_page+0x37/0x50 [ 555.127830][T20080] ? __rcu_read_unlock+0x5c/0x290 [ 555.132933][T20080] ? blkdev_common_ioctl+0x438/0x1180 [ 555.138316][T20080] ? selinux_file_ioctl+0x522/0x590 [ 555.143575][T20080] ? do_vfs_ioctl+0x819/0x14a0 [ 555.148444][T20080] ? lo_release+0x120/0x120 [ 555.152969][T20080] blkdev_ioctl+0x20e/0x440 [ 555.157479][T20080] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 555.162938][T20080] __se_sys_ioctl+0xcb/0x140 [ 555.167624][T20080] __x64_sys_ioctl+0x3f/0x50 [ 555.172228][T20080] do_syscall_64+0x44/0xd0 [ 555.176729][T20080] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 555.182714][T20080] RIP: 0033:0x7f7ca8c308b7 [ 555.187128][T20080] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 555.207087][T20080] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 555.215505][T20080] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 555.223475][T20080] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 555.231504][T20080] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 555.239476][T20080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 555.247441][T20080] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 555.255416][T20080] [ 555.261941][T20080] loop5: detected capacity change from 0 to 4096 [ 555.275295][T20081] loop3: detected capacity change from 0 to 5 22:16:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:23 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 1) 22:16:23 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x60ff, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:16:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 26) [ 555.284387][T20081] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 555.300053][T20080] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 555.309435][T20080] EXT4-fs (loop5): group descriptors corrupted! [ 555.350891][T20089] loop2: detected capacity change from 0 to 264192 [ 555.351069][T20090] loop4: detected capacity change from 0 to 5 [ 555.365323][T20089] FAULT_INJECTION: forcing a failure. [ 555.365323][T20089] name failslab, interval 1, probability 0, space 0, times 0 [ 555.378009][T20089] CPU: 1 PID: 20089 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 555.386765][T20089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.396878][T20089] Call Trace: [ 555.400152][T20089] [ 555.403077][T20089] dump_stack_lvl+0xd6/0x122 [ 555.407667][T20089] dump_stack+0x11/0x1b [ 555.411858][T20089] should_fail+0x23c/0x250 [ 555.416295][T20089] ? kcalloc+0x32/0x50 [ 555.420377][T20089] __should_failslab+0x81/0x90 [ 555.425218][T20089] should_failslab+0x5/0x20 [ 555.429814][T20089] __kmalloc+0x6f/0x370 [ 555.433964][T20089] kcalloc+0x32/0x50 [ 555.437856][T20089] ext4_find_extent+0x19f/0x7e0 [ 555.442705][T20089] ? kfree+0xf8/0x1f0 [ 555.446685][T20089] ext4_ext_map_blocks+0x115/0x2120 [ 555.451880][T20089] ? jbd2_journal_dirty_metadata+0x218/0x690 [ 555.457912][T20089] ext4_map_blocks+0x71e/0xf00 [ 555.462737][T20089] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 555.468376][T20089] ext4_getblk+0xc6/0x3e0 [ 555.472703][T20089] ext4_bread+0x28/0x100 [ 555.476946][T20089] ext4_append+0xd1/0x1c0 [ 555.481277][T20089] ext4_init_new_dir+0x177/0x500 [ 555.486214][T20089] ext4_mkdir+0x329/0x760 [ 555.490545][T20089] vfs_mkdir+0x2c8/0x3d0 [ 555.494786][T20089] do_mkdirat+0x12e/0x2c0 [ 555.499204][T20089] __x64_sys_mkdir+0x40/0x50 [ 555.503786][T20089] do_syscall_64+0x44/0xd0 [ 555.508234][T20089] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 555.514184][T20089] RIP: 0033:0x7f867f593c07 [ 555.518598][T20089] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 555.538362][T20089] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 555.546818][T20089] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f593c07 [ 555.554792][T20089] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 555.562762][T20089] RBP: 00007f867ed0b040 R08: 0000000000000000 R09: ffffffffffffffff [ 555.570789][T20089] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 555.578764][T20089] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 555.586789][T20089] 22:16:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 50) [ 555.596877][T20090] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 555.649362][T20090] loop4: detected capacity change from 0 to 5 [ 555.655877][T20090] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 555.816296][T20096] loop3: detected capacity change from 0 to 5 [ 555.834980][T20096] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 555.851954][T20099] FAULT_INJECTION: forcing a failure. [ 555.851954][T20099] name failslab, interval 1, probability 0, space 0, times 0 [ 555.851998][T20098] FAULT_INJECTION: forcing a failure. [ 555.851998][T20098] name failslab, interval 1, probability 0, space 0, times 0 [ 555.864968][T20099] CPU: 1 PID: 20099 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 555.886284][T20099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.896325][T20099] Call Trace: [ 555.899591][T20099] [ 555.902507][T20099] dump_stack_lvl+0xd6/0x122 [ 555.907097][T20099] dump_stack+0x11/0x1b [ 555.911271][T20099] should_fail+0x23c/0x250 [ 555.915673][T20099] ? kzalloc+0x1d/0x30 [ 555.919760][T20099] __should_failslab+0x81/0x90 [ 555.924511][T20099] should_failslab+0x5/0x20 [ 555.929059][T20099] __kmalloc+0x6f/0x370 [ 555.933258][T20099] kzalloc+0x1d/0x30 [ 555.937192][T20099] kobject_get_path+0x7c/0x110 [ 555.941943][T20099] kobject_uevent_env+0x1be/0xc40 [ 555.946954][T20099] ? preempt_count_add+0x4e/0x90 [ 555.951949][T20099] ? _raw_spin_unlock+0x2e/0x50 [ 555.956784][T20099] ? bd_prepare_to_claim+0x1ac/0x200 [ 555.962083][T20099] disk_force_media_change+0xe3/0x170 [ 555.967456][T20099] loop_configure+0x74d/0xf30 [ 555.972132][T20099] lo_ioctl+0x583/0x1270 [ 555.976418][T20099] ? folio_mark_dirty+0x84/0xe0 [ 555.981332][T20099] ? unlock_page+0x37/0x50 [ 555.985747][T20099] ? __rcu_read_unlock+0x5c/0x290 [ 555.990761][T20099] ? blkdev_common_ioctl+0x438/0x1180 [ 555.996117][T20099] ? selinux_file_ioctl+0x522/0x590 [ 556.001305][T20099] ? do_vfs_ioctl+0x819/0x14a0 [ 556.006096][T20099] ? lo_release+0x120/0x120 [ 556.010584][T20099] blkdev_ioctl+0x20e/0x440 [ 556.015071][T20099] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 556.020513][T20099] __se_sys_ioctl+0xcb/0x140 [ 556.025088][T20099] __x64_sys_ioctl+0x3f/0x50 [ 556.029673][T20099] do_syscall_64+0x44/0xd0 [ 556.034136][T20099] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 556.040013][T20099] RIP: 0033:0x7f7ca8c308b7 [ 556.044460][T20099] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 556.064128][T20099] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 556.072538][T20099] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 556.080533][T20099] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 556.088498][T20099] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 556.096469][T20099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 556.104421][T20099] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 556.112452][T20099] [ 556.115453][T20098] CPU: 0 PID: 20098 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 556.124221][T20098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.134271][T20098] Call Trace: [ 556.137548][T20098] [ 556.140525][T20098] dump_stack_lvl+0xd6/0x122 [ 556.145114][T20098] dump_stack+0x11/0x1b [ 556.149304][T20098] should_fail+0x23c/0x250 [ 556.153919][T20098] ? __se_sys_memfd_create+0xe9/0x350 [ 556.159288][T20098] __should_failslab+0x81/0x90 [ 556.164048][T20098] should_failslab+0x5/0x20 [ 556.168635][T20098] __kmalloc+0x6f/0x370 [ 556.172802][T20098] ? strnlen_user+0x137/0x1c0 [ 556.177544][T20098] __se_sys_memfd_create+0xe9/0x350 [ 556.183015][T20098] __x64_sys_memfd_create+0x2d/0x40 [ 556.188250][T20098] do_syscall_64+0x44/0xd0 [ 556.192805][T20098] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 556.198700][T20098] RIP: 0033:0x7fa83371baf9 [ 556.203108][T20098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 556.222771][T20098] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 556.231296][T20098] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371baf9 [ 556.239314][T20098] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00007fa833775180 [ 556.247282][T20098] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 556.255278][T20098] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 556.263245][T20098] R13: 00000000200001c0 R14: 0000000000000c00 R15: 0000000020010d00 [ 556.271215][T20098] [ 556.275976][T20102] loop2: detected capacity change from 0 to 264192 [ 556.289594][T20102] FAULT_INJECTION: forcing a failure. [ 556.289594][T20102] name failslab, interval 1, probability 0, space 0, times 0 [ 556.291288][T20096] loop3: detected capacity change from 0 to 5 [ 556.302279][T20102] CPU: 0 PID: 20102 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 556.317069][T20102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.327172][T20102] Call Trace: [ 556.330515][T20102] [ 556.333434][T20102] dump_stack_lvl+0xd6/0x122 [ 556.338113][T20102] dump_stack+0x11/0x1b [ 556.342269][T20102] should_fail+0x23c/0x250 [ 556.346682][T20102] ? ext4_mb_new_blocks+0x73e/0x1ee0 [ 556.352049][T20102] __should_failslab+0x81/0x90 [ 556.356823][T20102] should_failslab+0x5/0x20 [ 556.361328][T20102] kmem_cache_alloc+0x4f/0x320 [ 556.366138][T20102] ext4_mb_new_blocks+0x73e/0x1ee0 [ 556.371268][T20102] ? kcalloc+0x32/0x50 [ 556.375372][T20102] ? ext4_find_extent+0x6d7/0x7e0 [ 556.380248][T20096] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 556.380459][T20102] ? ext4_ext_search_right+0x301/0x4f0 [ 556.396235][T20102] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 556.402065][T20102] ext4_ext_map_blocks+0x1658/0x2120 [ 556.407355][T20102] ext4_map_blocks+0x71e/0xf00 [ 556.412209][T20102] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 556.417832][T20102] ext4_getblk+0xc6/0x3e0 [ 556.422147][T20102] ext4_bread+0x28/0x100 [ 556.426375][T20102] ext4_append+0xd1/0x1c0 [ 556.430695][T20102] ext4_init_new_dir+0x177/0x500 [ 556.435682][T20102] ext4_mkdir+0x329/0x760 [ 556.440004][T20102] vfs_mkdir+0x2c8/0x3d0 [ 556.444348][T20102] do_mkdirat+0x12e/0x2c0 [ 556.448747][T20102] __x64_sys_mkdir+0x40/0x50 [ 556.453370][T20102] do_syscall_64+0x44/0xd0 [ 556.457780][T20102] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 556.463682][T20102] RIP: 0033:0x7f867f593c07 [ 556.468084][T20102] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 556.487762][T20102] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 556.496183][T20102] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f593c07 [ 556.504204][T20102] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 22:16:24 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 2) [ 556.512182][T20102] RBP: 00007f867ed0b040 R08: 0000000000000000 R09: ffffffffffffffff [ 556.520195][T20102] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 556.528156][T20102] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 556.536152][T20102] [ 556.542951][T20099] loop5: detected capacity change from 0 to 4096 [ 556.558832][T20099] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) 22:16:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 51) 22:16:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 27) [ 556.568212][T20099] EXT4-fs (loop5): group descriptors corrupted! [ 556.573802][T20104] loop4: detected capacity change from 0 to 5 [ 556.595181][T20104] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:24 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x6400, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 556.651291][T20104] loop4: detected capacity change from 0 to 5 [ 556.661771][T20104] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 556.720569][T20108] FAULT_INJECTION: forcing a failure. [ 556.720569][T20108] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 556.733821][T20108] CPU: 0 PID: 20108 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 556.742593][T20108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.752650][T20108] Call Trace: [ 556.755923][T20108] [ 556.758864][T20108] dump_stack_lvl+0xd6/0x122 [ 556.763510][T20108] dump_stack+0x11/0x1b [ 556.767689][T20108] should_fail+0x23c/0x250 [ 556.772218][T20108] should_fail_usercopy+0x16/0x20 [ 556.777234][T20108] _copy_from_user+0x1c/0xd0 [ 556.781923][T20108] __se_sys_memfd_create+0x125/0x350 [ 556.787273][T20108] __x64_sys_memfd_create+0x2d/0x40 [ 556.792470][T20108] do_syscall_64+0x44/0xd0 [ 556.796898][T20108] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 556.802813][T20108] RIP: 0033:0x7fa83371baf9 [ 556.807295][T20108] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 556.827014][T20108] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 556.835518][T20108] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371baf9 [ 556.843594][T20108] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00007fa833775180 [ 556.851719][T20108] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 556.859689][T20108] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 556.867660][T20108] R13: 00000000200001c0 R14: 0000000000000c00 R15: 0000000020010d00 [ 556.875701][T20108] [ 556.880341][T20111] loop2: detected capacity change from 0 to 264192 [ 556.889490][T20111] FAULT_INJECTION: forcing a failure. [ 556.889490][T20111] name failslab, interval 1, probability 0, space 0, times 0 [ 556.902145][T20111] CPU: 0 PID: 20111 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 556.910910][T20111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.920960][T20111] Call Trace: [ 556.924234][T20111] [ 556.927159][T20111] dump_stack_lvl+0xd6/0x122 [ 556.931760][T20111] dump_stack+0x11/0x1b [ 556.935936][T20111] should_fail+0x23c/0x250 [ 556.940388][T20111] ? __es_insert_extent+0x546/0xe80 [ 556.945608][T20111] __should_failslab+0x81/0x90 [ 556.950458][T20111] should_failslab+0x5/0x20 [ 556.954956][T20111] kmem_cache_alloc+0x4f/0x320 [ 556.959769][T20111] __es_insert_extent+0x546/0xe80 [ 556.964799][T20111] ? ext4_ext_map_blocks+0x1128/0x2120 22:16:25 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 3) [ 556.970261][T20111] ext4_es_insert_extent+0x1cb/0x19c0 [ 556.975667][T20111] ext4_map_blocks+0xa5d/0xf00 [ 556.980435][T20111] ext4_getblk+0xc6/0x3e0 [ 556.984784][T20111] ext4_bread+0x28/0x100 [ 556.989046][T20111] ext4_append+0xd1/0x1c0 [ 556.993377][T20111] ext4_init_new_dir+0x177/0x500 [ 556.998392][T20111] ext4_mkdir+0x329/0x760 [ 557.002778][T20111] vfs_mkdir+0x2c8/0x3d0 [ 557.007025][T20111] do_mkdirat+0x12e/0x2c0 [ 557.011405][T20111] __x64_sys_mkdir+0x40/0x50 [ 557.015992][T20111] do_syscall_64+0x44/0xd0 [ 557.020495][T20111] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 557.026483][T20111] RIP: 0033:0x7f867f593c07 [ 557.030935][T20111] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 557.050644][T20111] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 557.059053][T20111] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f593c07 [ 557.067017][T20111] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 557.075090][T20111] RBP: 00007f867ed0b040 R08: 0000000000000000 R09: ffffffffffffffff [ 557.083110][T20111] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 557.091158][T20111] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 557.099165][T20111] [ 557.109740][T20111] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 557.119036][T20111] EXT4-fs (loop2): group descriptors corrupted! [ 557.154007][T20113] loop3: detected capacity change from 0 to 5 [ 557.154212][T20114] FAULT_INJECTION: forcing a failure. [ 557.154212][T20114] name failslab, interval 1, probability 0, space 0, times 0 [ 557.172895][T20114] CPU: 1 PID: 20114 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 557.181670][T20114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.191767][T20114] Call Trace: [ 557.195074][T20114] [ 557.198002][T20114] dump_stack_lvl+0xd6/0x122 [ 557.202605][T20114] dump_stack+0x11/0x1b [ 557.206758][T20114] should_fail+0x23c/0x250 [ 557.211198][T20114] __should_failslab+0x81/0x90 [ 557.216012][T20114] should_failslab+0x5/0x20 [ 557.220571][T20114] kmem_cache_alloc_node_trace+0x61/0x310 [ 557.226463][T20114] ? __kmalloc_node_track_caller+0x30/0x40 [ 557.232315][T20114] __kmalloc_node_track_caller+0x30/0x40 [ 557.237954][T20114] ? alloc_uevent_skb+0x5b/0x120 [ 557.242940][T20114] __alloc_skb+0x19d/0x450 [ 557.247507][T20114] alloc_uevent_skb+0x5b/0x120 [ 557.252388][T20114] kobject_uevent_env+0x863/0xc40 [ 557.257421][T20114] ? preempt_count_add+0x4e/0x90 [ 557.262360][T20114] ? _raw_spin_unlock+0x2e/0x50 [ 557.267273][T20114] ? bd_prepare_to_claim+0x1ac/0x200 [ 557.272565][T20114] disk_force_media_change+0xe3/0x170 [ 557.277944][T20114] loop_configure+0x74d/0xf30 [ 557.282614][T20114] lo_ioctl+0x583/0x1270 [ 557.286852][T20114] ? folio_mark_dirty+0x84/0xe0 [ 557.291701][T20114] ? unlock_page+0x37/0x50 [ 557.296114][T20114] ? __rcu_read_unlock+0x5c/0x290 [ 557.301155][T20114] ? blkdev_common_ioctl+0x438/0x1180 [ 557.306579][T20114] ? selinux_file_ioctl+0x522/0x590 [ 557.311775][T20114] ? do_vfs_ioctl+0x819/0x14a0 [ 557.316592][T20114] ? lo_release+0x120/0x120 [ 557.321095][T20114] blkdev_ioctl+0x20e/0x440 [ 557.325669][T20114] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 557.331121][T20114] __se_sys_ioctl+0xcb/0x140 [ 557.335725][T20114] __x64_sys_ioctl+0x3f/0x50 [ 557.340334][T20114] do_syscall_64+0x44/0xd0 [ 557.344779][T20114] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 557.351039][T20114] RIP: 0033:0x7f7ca8c308b7 [ 557.355457][T20114] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 557.375211][T20114] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 557.383620][T20114] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 557.391708][T20114] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 22:16:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 52) [ 557.399668][T20114] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 557.407636][T20114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 557.415701][T20114] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 557.423736][T20114] [ 557.432337][T20114] loop5: detected capacity change from 0 to 4096 [ 557.446683][T20113] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 557.465858][T20114] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 557.475205][T20114] EXT4-fs (loop5): group descriptors corrupted! 22:16:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 28) 22:16:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 557.510745][T20113] loop3: detected capacity change from 0 to 5 [ 557.517355][T20118] loop4: detected capacity change from 0 to 5 [ 557.524688][T20113] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 557.546709][T20118] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 557.590121][T20118] loop4: detected capacity change from 0 to 5 [ 557.596663][T20118] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 557.607615][T20121] FAULT_INJECTION: forcing a failure. [ 557.607615][T20121] name failslab, interval 1, probability 0, space 0, times 0 [ 557.620249][T20121] CPU: 0 PID: 20121 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 557.629044][T20121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.639137][T20121] Call Trace: [ 557.642408][T20121] [ 557.645345][T20121] dump_stack_lvl+0xd6/0x122 [ 557.649937][T20121] dump_stack+0x11/0x1b [ 557.654085][T20121] should_fail+0x23c/0x250 [ 557.658494][T20121] ? shmem_alloc_inode+0x22/0x30 [ 557.663491][T20121] __should_failslab+0x81/0x90 [ 557.668321][T20121] ? shmem_match+0xa0/0xa0 [ 557.672799][T20121] should_failslab+0x5/0x20 [ 557.677299][T20121] kmem_cache_alloc+0x4f/0x320 [ 557.682064][T20121] ? shmem_match+0xa0/0xa0 [ 557.686483][T20121] shmem_alloc_inode+0x22/0x30 [ 557.691302][T20121] new_inode_pseudo+0x38/0x190 [ 557.696167][T20121] new_inode+0x21/0x100 [ 557.700353][T20121] shmem_get_inode+0xb7/0x490 [ 557.705128][T20121] __shmem_file_setup+0xf1/0x1d0 [ 557.710102][T20121] shmem_file_setup+0x37/0x40 [ 557.715430][T20121] __se_sys_memfd_create+0x1c1/0x350 [ 557.720727][T20121] __x64_sys_memfd_create+0x2d/0x40 [ 557.725959][T20121] do_syscall_64+0x44/0xd0 [ 557.730372][T20121] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 557.732112][T20125] loop2: detected capacity change from 0 to 264192 [ 557.736319][T20121] RIP: 0033:0x7fa83371baf9 [ 557.747215][T20121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 557.753161][T20125] FAULT_INJECTION: forcing a failure. [ 557.753161][T20125] name failslab, interval 1, probability 0, space 0, times 0 [ 557.766874][T20121] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 557.766897][T20121] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371baf9 [ 557.766924][T20121] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00007fa833775180 [ 557.766935][T20121] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 557.766946][T20121] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 557.819666][T20121] R13: 00000000200001c0 R14: 0000000000000c00 R15: 0000000020010d00 [ 557.827623][T20121] [ 557.830623][T20125] CPU: 1 PID: 20125 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 557.839381][T20125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.849486][T20125] Call Trace: [ 557.852762][T20125] [ 557.855685][T20125] dump_stack_lvl+0xd6/0x122 [ 557.860274][T20125] dump_stack+0x11/0x1b [ 557.864478][T20125] should_fail+0x23c/0x250 [ 557.868889][T20125] ? jbd2_journal_add_journal_head+0x6c/0x3a0 [ 557.875013][T20125] __should_failslab+0x81/0x90 [ 557.879914][T20125] should_failslab+0x5/0x20 [ 557.884425][T20125] kmem_cache_alloc+0x4f/0x320 [ 557.889187][T20125] jbd2_journal_add_journal_head+0x6c/0x3a0 [ 557.895100][T20125] jbd2_journal_get_create_access+0x2c/0x290 [ 557.901164][T20125] __ext4_journal_get_create_access+0x65/0x320 [ 557.907390][T20125] ext4_getblk+0x22b/0x3e0 [ 557.911804][T20125] ext4_bread+0x28/0x100 [ 557.916044][T20125] ext4_append+0xd1/0x1c0 [ 557.920409][T20125] ext4_init_new_dir+0x177/0x500 [ 557.925379][T20125] ext4_mkdir+0x329/0x760 [ 557.929699][T20125] vfs_mkdir+0x2c8/0x3d0 [ 557.933999][T20125] do_mkdirat+0x12e/0x2c0 [ 557.938320][T20125] __x64_sys_mkdir+0x40/0x50 [ 557.942910][T20125] do_syscall_64+0x44/0xd0 [ 557.947325][T20125] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 557.953218][T20125] RIP: 0033:0x7f867f593c07 [ 557.957690][T20125] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 557.977306][T20125] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 22:16:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 557.985788][T20125] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f593c07 [ 557.993754][T20125] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 558.001713][T20125] RBP: 00007f867ed0b040 R08: 0000000000000000 R09: ffffffffffffffff [ 558.009682][T20125] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 558.017652][T20125] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 558.025773][T20125] [ 558.028890][T20125] ENOMEM in journal_alloc_journal_head, retrying. 22:16:26 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 4) 22:16:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 53) [ 558.049341][T20125] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 558.058635][T20125] EXT4-fs (loop2): group descriptors corrupted! [ 558.144135][T20128] FAULT_INJECTION: forcing a failure. [ 558.144135][T20128] name failslab, interval 1, probability 0, space 0, times 0 [ 558.156788][T20128] CPU: 0 PID: 20128 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 558.165594][T20128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.175643][T20128] Call Trace: [ 558.178908][T20128] [ 558.181834][T20128] dump_stack_lvl+0xd6/0x122 [ 558.186446][T20128] dump_stack+0x11/0x1b [ 558.190586][T20128] should_fail+0x23c/0x250 [ 558.194987][T20128] __should_failslab+0x81/0x90 [ 558.199777][T20128] should_failslab+0x5/0x20 [ 558.204373][T20128] kmem_cache_alloc_node_trace+0x61/0x310 [ 558.206744][T20134] FAULT_INJECTION: forcing a failure. [ 558.206744][T20134] name failslab, interval 1, probability 0, space 0, times 0 [ 558.210103][T20128] ? __kmalloc_node_track_caller+0x30/0x40 [ 558.228514][T20128] __kmalloc_node_track_caller+0x30/0x40 [ 558.234140][T20128] ? alloc_uevent_skb+0x5b/0x120 [ 558.239061][T20128] __alloc_skb+0x19d/0x450 [ 558.243462][T20128] alloc_uevent_skb+0x5b/0x120 [ 558.248244][T20128] kobject_uevent_env+0x863/0xc40 [ 558.253279][T20128] ? preempt_count_add+0x4e/0x90 [ 558.258202][T20128] ? _raw_spin_unlock+0x2e/0x50 [ 558.263080][T20128] ? bd_prepare_to_claim+0x1ac/0x200 [ 558.268375][T20128] disk_force_media_change+0xe3/0x170 [ 558.273777][T20128] loop_configure+0x74d/0xf30 [ 558.278440][T20128] lo_ioctl+0x583/0x1270 [ 558.282664][T20128] ? folio_mark_dirty+0x84/0xe0 [ 558.287631][T20128] ? unlock_page+0x37/0x50 [ 558.292181][T20128] ? __rcu_read_unlock+0x5c/0x290 [ 558.297194][T20128] ? blkdev_common_ioctl+0x438/0x1180 [ 558.302583][T20128] ? selinux_file_ioctl+0x522/0x590 [ 558.307764][T20128] ? do_vfs_ioctl+0x819/0x14a0 [ 558.312514][T20128] ? lo_release+0x120/0x120 [ 558.316997][T20128] blkdev_ioctl+0x20e/0x440 [ 558.321512][T20128] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 558.326955][T20128] __se_sys_ioctl+0xcb/0x140 [ 558.331530][T20128] __x64_sys_ioctl+0x3f/0x50 [ 558.336146][T20128] do_syscall_64+0x44/0xd0 [ 558.340551][T20128] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 558.346550][T20128] RIP: 0033:0x7f7ca8c308b7 [ 558.350955][T20128] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 558.370575][T20128] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 558.379039][T20128] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 558.386995][T20128] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 558.394949][T20128] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 558.402900][T20128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 558.410857][T20128] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 558.418816][T20128] [ 558.421855][T20134] CPU: 1 PID: 20134 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 558.429334][T20128] loop5: detected capacity change from 0 to 4096 [ 558.430647][T20134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.430659][T20134] Call Trace: [ 558.430666][T20134] [ 558.430672][T20134] dump_stack_lvl+0xd6/0x122 [ 558.457859][T20134] dump_stack+0x11/0x1b [ 558.462017][T20134] should_fail+0x23c/0x250 [ 558.466433][T20134] ? security_inode_alloc+0x30/0x180 [ 558.471714][T20134] __should_failslab+0x81/0x90 [ 558.476479][T20134] should_failslab+0x5/0x20 [ 558.480983][T20134] kmem_cache_alloc+0x4f/0x320 [ 558.485816][T20134] security_inode_alloc+0x30/0x180 [ 558.490935][T20134] inode_init_always+0x214/0x3e0 [ 558.495888][T20134] ? shmem_match+0xa0/0xa0 [ 558.500437][T20134] new_inode_pseudo+0x6f/0x190 [ 558.505209][T20134] new_inode+0x21/0x100 [ 558.509396][T20134] shmem_get_inode+0xb7/0x490 [ 558.514073][T20134] __shmem_file_setup+0xf1/0x1d0 [ 558.519068][T20134] shmem_file_setup+0x37/0x40 [ 558.523785][T20134] __se_sys_memfd_create+0x1c1/0x350 [ 558.529086][T20134] __x64_sys_memfd_create+0x2d/0x40 [ 558.534362][T20134] do_syscall_64+0x44/0xd0 [ 558.538776][T20134] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 558.544670][T20134] RIP: 0033:0x7fa83371baf9 [ 558.549120][T20134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 558.568724][T20134] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 558.577181][T20134] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371baf9 [ 558.585154][T20134] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00007fa833775180 [ 558.593123][T20134] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 558.601102][T20134] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 558.609073][T20134] R13: 00000000200001c0 R14: 0000000000000c00 R15: 0000000020010d00 [ 558.617048][T20134] [ 558.621749][T20130] loop3: detected capacity change from 0 to 5 [ 558.628826][T20133] loop4: detected capacity change from 0 to 5 22:16:26 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 5) 22:16:26 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x6901, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:16:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 29) [ 558.639948][T20128] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 558.649246][T20128] EXT4-fs (loop5): group descriptors corrupted! [ 558.663743][T20130] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 558.674307][T20133] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 558.711307][T20141] loop2: detected capacity change from 0 to 264192 [ 558.744158][T20141] FAULT_INJECTION: forcing a failure. [ 558.744158][T20141] name failslab, interval 1, probability 0, space 0, times 0 [ 558.756812][T20141] CPU: 1 PID: 20141 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 558.765658][T20141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.776145][T20141] Call Trace: [ 558.779412][T20141] [ 558.782336][T20141] dump_stack_lvl+0xd6/0x122 [ 558.787070][T20141] dump_stack+0x11/0x1b [ 558.791220][T20141] should_fail+0x23c/0x250 [ 558.795631][T20141] ? strndup_user+0x64/0xa0 [ 558.800172][T20141] __should_failslab+0x81/0x90 [ 558.805451][T20141] should_failslab+0x5/0x20 [ 558.809952][T20141] __kmalloc_track_caller+0x6d/0x370 [ 558.815246][T20141] memdup_user+0x22/0xb0 [ 558.819552][T20141] strndup_user+0x64/0xa0 [ 558.823884][T20141] __se_sys_mount+0x4e/0x2f0 [ 558.828511][T20141] ? __this_cpu_preempt_check+0x18/0x20 [ 558.834108][T20141] ? switch_fpu_return+0xc9/0x190 [ 558.839153][T20141] __x64_sys_mount+0x63/0x70 [ 558.843741][T20141] do_syscall_64+0x44/0xd0 [ 558.848172][T20141] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 558.854285][T20141] RIP: 0033:0x7f867f59602a [ 558.858772][T20141] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 558.882416][T20141] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 558.890918][T20141] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f59602a [ 558.898890][T20141] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f867ed0b000 22:16:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x11, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 54) 22:16:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 558.906941][T20141] RBP: 00007f867ed0b040 R08: 00007f867ed0b040 R09: 0000000020000000 [ 558.914921][T20141] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 558.922898][T20141] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 558.930868][T20141] [ 558.942819][T20130] loop3: detected capacity change from 0 to 5 [ 558.949924][T20130] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 559.131107][T20145] FAULT_INJECTION: forcing a failure. [ 559.131107][T20145] name failslab, interval 1, probability 0, space 0, times 0 [ 559.143796][T20145] CPU: 0 PID: 20145 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 559.152629][T20145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.162674][T20145] Call Trace: [ 559.165944][T20145] [ 559.168868][T20145] dump_stack_lvl+0xd6/0x122 [ 559.173466][T20145] dump_stack+0x11/0x1b [ 559.177683][T20145] should_fail+0x23c/0x250 [ 559.182095][T20145] ? __d_alloc+0x36/0x370 [ 559.186418][T20145] __should_failslab+0x81/0x90 [ 559.191258][T20145] should_failslab+0x5/0x20 [ 559.195782][T20145] kmem_cache_alloc+0x4f/0x320 [ 559.200693][T20145] ? security_inode_alloc+0x138/0x180 [ 559.206060][T20145] ? __init_rwsem+0x59/0x70 [ 559.211053][T20145] __d_alloc+0x36/0x370 [ 559.215231][T20145] ? debug_smp_processor_id+0x18/0x20 [ 559.220644][T20145] d_alloc_pseudo+0x1a/0x50 [ 559.225150][T20145] alloc_file_pseudo+0x77/0x150 [ 559.230003][T20145] __shmem_file_setup+0x14c/0x1d0 [ 559.235037][T20145] shmem_file_setup+0x37/0x40 [ 559.239713][T20145] __se_sys_memfd_create+0x1c1/0x350 [ 559.244994][T20145] __x64_sys_memfd_create+0x2d/0x40 [ 559.250309][T20145] do_syscall_64+0x44/0xd0 [ 559.254828][T20145] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 559.260789][T20145] RIP: 0033:0x7fa83371baf9 [ 559.265198][T20145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 559.284962][T20145] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 559.293431][T20145] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371baf9 [ 559.301472][T20145] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00007fa833775180 [ 559.309442][T20145] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 559.317411][T20145] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 559.325374][T20145] R13: 00000000200001c0 R14: 0000000000000c00 R15: 0000000020010d00 [ 559.333494][T20145] [ 559.355973][T20147] FAULT_INJECTION: forcing a failure. [ 559.355973][T20147] name failslab, interval 1, probability 0, space 0, times 0 [ 559.368747][T20147] CPU: 1 PID: 20147 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 559.377505][T20147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.387559][T20147] Call Trace: [ 559.390837][T20147] [ 559.393774][T20147] dump_stack_lvl+0xd6/0x122 [ 559.398384][T20147] dump_stack+0x11/0x1b [ 559.402541][T20147] should_fail+0x23c/0x250 [ 559.406952][T20147] ? __kernfs_new_node+0x6a/0x340 [ 559.412012][T20147] __should_failslab+0x81/0x90 [ 559.416777][T20147] should_failslab+0x5/0x20 [ 559.421309][T20147] kmem_cache_alloc+0x4f/0x320 [ 559.426131][T20147] __kernfs_new_node+0x6a/0x340 [ 559.430982][T20147] ? __this_cpu_preempt_check+0x18/0x20 [ 559.436598][T20147] ? sysvec_apic_timer_interrupt+0x4a/0xb0 [ 559.442400][T20147] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 559.448617][T20147] kernfs_create_dir_ns+0x5e/0x140 [ 559.453785][T20147] internal_create_group+0x13e/0x840 [ 559.459074][T20147] sysfs_create_group+0x1b/0x20 [ 559.464141][T20147] loop_configure+0xc58/0xf30 [ 559.468828][T20147] lo_ioctl+0x583/0x1270 [ 559.473068][T20147] ? folio_mark_dirty+0x84/0xe0 [ 559.477931][T20147] ? unlock_page+0x37/0x50 [ 559.482412][T20147] ? __rcu_read_unlock+0x5c/0x290 [ 559.487453][T20147] ? blkdev_common_ioctl+0x438/0x1180 [ 559.492895][T20147] ? selinux_file_ioctl+0x522/0x590 [ 559.498162][T20147] ? do_vfs_ioctl+0x819/0x14a0 [ 559.502991][T20147] ? lo_release+0x120/0x120 [ 559.507511][T20147] blkdev_ioctl+0x20e/0x440 [ 559.512019][T20147] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 559.517471][T20147] __se_sys_ioctl+0xcb/0x140 [ 559.522097][T20147] __x64_sys_ioctl+0x3f/0x50 [ 559.526690][T20147] do_syscall_64+0x44/0xd0 [ 559.531137][T20147] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 559.537077][T20147] RIP: 0033:0x7f7ca8c308b7 [ 559.541686][T20147] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 559.561414][T20147] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 559.569832][T20147] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 559.577797][T20147] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 559.585762][T20147] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 559.593728][T20147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 22:16:27 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 6) [ 559.601695][T20147] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 559.609668][T20147] [ 559.612765][T20147] loop5: detected capacity change from 0 to 4096 [ 559.630446][T20150] loop4: detected capacity change from 0 to 5 [ 559.639061][T20147] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 559.648353][T20147] EXT4-fs (loop5): group descriptors corrupted! [ 559.661022][T20150] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 559.674686][T20152] loop2: detected capacity change from 0 to 264192 [ 559.692844][T20152] FAULT_INJECTION: forcing a failure. [ 559.692844][T20152] name fail_usercopy, interval 1, probability 0, space 0, times 0 22:16:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 30) [ 559.693654][T20153] loop3: detected capacity change from 0 to 5 [ 559.706026][T20152] CPU: 1 PID: 20152 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 559.720813][T20152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.730883][T20152] Call Trace: [ 559.734149][T20152] [ 559.737146][T20152] dump_stack_lvl+0xd6/0x122 [ 559.741879][T20152] dump_stack+0x11/0x1b [ 559.746066][T20152] should_fail+0x23c/0x250 [ 559.750500][T20152] should_fail_usercopy+0x16/0x20 [ 559.755523][T20152] _copy_from_user+0x1c/0xd0 [ 559.760144][T20152] memdup_user+0x5b/0xb0 [ 559.764430][T20152] strndup_user+0x64/0xa0 [ 559.768783][T20152] __se_sys_mount+0x4e/0x2f0 [ 559.773411][T20152] ? __this_cpu_preempt_check+0x18/0x20 [ 559.778987][T20152] ? switch_fpu_return+0xc9/0x190 [ 559.784010][T20152] __x64_sys_mount+0x63/0x70 [ 559.788678][T20152] do_syscall_64+0x44/0xd0 [ 559.793147][T20152] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 559.799043][T20152] RIP: 0033:0x7f867f59602a [ 559.803460][T20152] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 559.823062][T20152] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 559.831487][T20152] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f59602a [ 559.839454][T20152] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f867ed0b000 [ 559.847422][T20152] RBP: 00007f867ed0b040 R08: 00007f867ed0b040 R09: 0000000020000000 22:16:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 55) [ 559.855403][T20152] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 559.863371][T20152] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 559.871340][T20152] [ 559.882482][T20150] loop4: detected capacity change from 0 to 5 [ 559.889376][T20153] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 559.901116][T20150] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x12, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x204, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 559.939520][T20153] loop3: detected capacity change from 0 to 5 [ 559.946203][T20153] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 560.049178][T20158] FAULT_INJECTION: forcing a failure. [ 560.049178][T20158] name failslab, interval 1, probability 0, space 0, times 0 [ 560.061870][T20158] CPU: 0 PID: 20158 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 560.070661][T20158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.080762][T20158] Call Trace: [ 560.084036][T20158] [ 560.087080][T20158] dump_stack_lvl+0xd6/0x122 [ 560.091673][T20158] dump_stack+0x11/0x1b [ 560.095827][T20158] should_fail+0x23c/0x250 [ 560.100319][T20158] ? __alloc_file+0x2e/0x1a0 [ 560.104910][T20158] __should_failslab+0x81/0x90 [ 560.109677][T20158] should_failslab+0x5/0x20 [ 560.116539][T20158] kmem_cache_alloc+0x4f/0x320 [ 560.121314][T20158] __alloc_file+0x2e/0x1a0 [ 560.125777][T20158] alloc_empty_file+0xcd/0x1c0 [ 560.130570][T20158] alloc_file+0x3a/0x280 [ 560.134813][T20158] alloc_file_pseudo+0xfa/0x150 [ 560.139673][T20158] __shmem_file_setup+0x14c/0x1d0 [ 560.144703][T20158] shmem_file_setup+0x37/0x40 [ 560.149386][T20158] __se_sys_memfd_create+0x1c1/0x350 [ 560.154726][T20158] __x64_sys_memfd_create+0x2d/0x40 [ 560.160369][T20158] do_syscall_64+0x44/0xd0 [ 560.164905][T20158] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 560.170879][T20158] RIP: 0033:0x7fa83371baf9 [ 560.175286][T20158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 560.194980][T20158] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 560.203413][T20158] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371baf9 [ 560.211384][T20158] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00007fa833775180 [ 560.213611][T20163] FAULT_INJECTION: forcing a failure. [ 560.213611][T20163] name failslab, interval 1, probability 0, space 0, times 0 [ 560.219437][T20158] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 560.219452][T20158] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 560.247934][T20158] R13: 00000000200001c0 R14: 0000000000000c00 R15: 0000000020010d00 [ 560.255899][T20158] [ 560.259006][T20163] CPU: 1 PID: 20163 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 560.267821][T20163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.277984][T20163] Call Trace: [ 560.281253][T20163] [ 560.284178][T20163] dump_stack_lvl+0xd6/0x122 [ 560.288765][T20163] dump_stack+0x11/0x1b [ 560.292921][T20163] should_fail+0x23c/0x250 [ 560.297330][T20163] ? __kernfs_new_node+0x6a/0x340 [ 560.302349][T20163] __should_failslab+0x81/0x90 [ 560.307303][T20163] should_failslab+0x5/0x20 [ 560.311807][T20163] kmem_cache_alloc+0x4f/0x320 [ 560.316565][T20163] __kernfs_new_node+0x6a/0x340 [ 560.321473][T20163] ? __down_write_common+0x42/0x7b0 [ 560.326702][T20163] ? idr_alloc_cyclic+0x26b/0x2f0 [ 560.331800][T20163] ? __down_write_common+0x42/0x7b0 [ 560.337215][T20163] ? rb_insert_color+0x7e/0x310 [ 560.342229][T20163] kernfs_new_node+0x5b/0xd0 [ 560.346820][T20163] __kernfs_create_file+0x45/0x1a0 [ 560.351934][T20163] ? dev_attr_show+0x90/0x90 [ 560.356576][T20163] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 560.361983][T20163] internal_create_group+0x2dd/0x840 [ 560.367280][T20163] sysfs_create_group+0x1b/0x20 [ 560.372128][T20163] loop_configure+0xc58/0xf30 [ 560.376805][T20163] lo_ioctl+0x583/0x1270 [ 560.381043][T20163] ? __this_cpu_preempt_check+0x18/0x20 [ 560.386651][T20163] ? __perf_event_task_sched_in+0x898/0x8d0 [ 560.392545][T20163] ? __rcu_read_unlock+0x5c/0x290 [ 560.397671][T20163] ? blkdev_common_ioctl+0x438/0x1180 [ 560.403042][T20163] ? selinux_file_ioctl+0x522/0x590 [ 560.408257][T20163] ? do_vfs_ioctl+0x819/0x14a0 [ 560.413027][T20163] ? lo_release+0x120/0x120 [ 560.419430][T20163] blkdev_ioctl+0x20e/0x440 [ 560.423932][T20163] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 560.429384][T20163] __se_sys_ioctl+0xcb/0x140 [ 560.433971][T20163] __x64_sys_ioctl+0x3f/0x50 [ 560.438637][T20163] do_syscall_64+0x44/0xd0 [ 560.443051][T20163] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 560.449031][T20163] RIP: 0033:0x7f7ca8c308b7 [ 560.453540][T20163] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 560.473246][T20163] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 560.481663][T20163] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 560.489627][T20163] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 22:16:28 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 7) 22:16:28 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x7f00, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 560.497595][T20163] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 560.505564][T20163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 560.513622][T20163] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 560.521602][T20163] [ 560.527651][T20163] loop5: detected capacity change from 0 to 4096 [ 560.556364][T20163] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 560.557112][T20166] loop3: detected capacity change from 0 to 5 [ 560.565649][T20163] EXT4-fs (loop5): group descriptors corrupted! [ 560.582490][T20167] loop2: detected capacity change from 0 to 264192 [ 560.582657][T20168] loop4: detected capacity change from 0 to 5 22:16:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 31) [ 560.603972][T20166] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 560.616425][T20167] FAULT_INJECTION: forcing a failure. [ 560.616425][T20167] name failslab, interval 1, probability 0, space 0, times 0 [ 560.629303][T20167] CPU: 1 PID: 20167 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 560.638066][T20167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.648326][T20167] Call Trace: [ 560.651604][T20167] [ 560.654566][T20167] dump_stack_lvl+0xd6/0x122 [ 560.659157][T20167] dump_stack+0x11/0x1b [ 560.663322][T20167] should_fail+0x23c/0x250 [ 560.667858][T20167] ? strndup_user+0x64/0xa0 [ 560.672361][T20167] __should_failslab+0x81/0x90 [ 560.677195][T20167] should_failslab+0x5/0x20 [ 560.681778][T20167] __kmalloc_track_caller+0x6d/0x370 [ 560.687062][T20167] memdup_user+0x22/0xb0 [ 560.691312][T20167] strndup_user+0x64/0xa0 [ 560.695667][T20167] __se_sys_mount+0x91/0x2f0 [ 560.700398][T20167] ? __this_cpu_preempt_check+0x18/0x20 [ 560.706010][T20167] ? switch_fpu_return+0xc9/0x190 [ 560.711161][T20167] __x64_sys_mount+0x63/0x70 [ 560.715756][T20167] do_syscall_64+0x44/0xd0 [ 560.720229][T20167] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 560.726132][T20167] RIP: 0033:0x7f867f59602a [ 560.730695][T20167] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 560.750321][T20167] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 560.758815][T20167] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f59602a [ 560.766798][T20167] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f867ed0b000 [ 560.774781][T20167] RBP: 00007f867ed0b040 R08: 00007f867ed0b040 R09: 0000000020000000 [ 560.782742][T20167] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 560.790714][T20167] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 560.798708][T20167] 22:16:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 56) [ 560.804907][T20168] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x22, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 560.860670][T20166] loop3: detected capacity change from 0 to 5 [ 560.867315][T20168] loop4: detected capacity change from 0 to 5 [ 560.873882][T20166] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 560.886106][T20168] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 560.986968][T20170] FAULT_INJECTION: forcing a failure. [ 560.986968][T20170] name failslab, interval 1, probability 0, space 0, times 0 [ 560.999644][T20170] CPU: 0 PID: 20170 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 561.008509][T20170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.018605][T20170] Call Trace: [ 561.022522][T20170] [ 561.025445][T20170] dump_stack_lvl+0xd6/0x122 [ 561.030053][T20170] dump_stack+0x11/0x1b [ 561.034229][T20170] should_fail+0x23c/0x250 [ 561.038659][T20170] ? security_file_alloc+0x30/0x190 [ 561.043852][T20170] __should_failslab+0x81/0x90 [ 561.048720][T20170] should_failslab+0x5/0x20 [ 561.053227][T20170] kmem_cache_alloc+0x4f/0x320 [ 561.057991][T20170] security_file_alloc+0x30/0x190 [ 561.063017][T20170] __alloc_file+0x83/0x1a0 [ 561.067468][T20170] alloc_empty_file+0xcd/0x1c0 [ 561.072273][T20170] alloc_file+0x3a/0x280 [ 561.076580][T20170] alloc_file_pseudo+0xfa/0x150 [ 561.081433][T20170] __shmem_file_setup+0x14c/0x1d0 [ 561.086477][T20170] shmem_file_setup+0x37/0x40 [ 561.091152][T20170] __se_sys_memfd_create+0x1c1/0x350 [ 561.096437][T20170] __x64_sys_memfd_create+0x2d/0x40 [ 561.101640][T20170] do_syscall_64+0x44/0xd0 [ 561.106092][T20170] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 561.111995][T20170] RIP: 0033:0x7fa83371baf9 [ 561.116501][T20170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:16:29 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 8) [ 561.136104][T20170] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 561.144512][T20170] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371baf9 [ 561.152505][T20170] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: 00007fa833775180 [ 561.160476][T20170] RBP: 0000000000000002 R08: 0000000000000600 R09: ffffffffffffffff [ 561.168441][T20170] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 561.176508][T20170] R13: 00000000200001c0 R14: 0000000000000c00 R15: 0000000020010d00 [ 561.184483][T20170] [ 561.228270][T20175] FAULT_INJECTION: forcing a failure. [ 561.228270][T20175] name failslab, interval 1, probability 0, space 0, times 0 [ 561.240924][T20175] CPU: 1 PID: 20175 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 561.249686][T20175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.259738][T20175] Call Trace: [ 561.263121][T20175] [ 561.266107][T20175] dump_stack_lvl+0xd6/0x122 [ 561.270701][T20175] dump_stack+0x11/0x1b [ 561.274911][T20175] should_fail+0x23c/0x250 [ 561.279324][T20175] ? __kernfs_new_node+0x6a/0x340 [ 561.284350][T20175] __should_failslab+0x81/0x90 [ 561.289180][T20175] should_failslab+0x5/0x20 [ 561.293832][T20175] kmem_cache_alloc+0x4f/0x320 [ 561.298589][T20175] __kernfs_new_node+0x6a/0x340 [ 561.303497][T20175] ? __down_write_common+0x42/0x7b0 [ 561.308691][T20175] ? idr_alloc_cyclic+0x26b/0x2f0 [ 561.313781][T20175] ? __down_write_common+0x42/0x7b0 [ 561.318968][T20175] ? rb_insert_color+0x7e/0x310 [ 561.323813][T20175] kernfs_new_node+0x5b/0xd0 [ 561.328402][T20175] __kernfs_create_file+0x45/0x1a0 [ 561.333596][T20175] ? dev_attr_show+0x90/0x90 [ 561.338250][T20175] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 561.343670][T20175] internal_create_group+0x2dd/0x840 [ 561.348950][T20175] sysfs_create_group+0x1b/0x20 [ 561.353825][T20175] loop_configure+0xc58/0xf30 [ 561.358592][T20175] lo_ioctl+0x583/0x1270 [ 561.362830][T20175] ? folio_mark_dirty+0x84/0xe0 [ 561.367744][T20175] ? unlock_page+0x37/0x50 [ 561.372234][T20175] ? __rcu_read_unlock+0x5c/0x290 [ 561.377262][T20175] ? blkdev_common_ioctl+0x438/0x1180 [ 561.382626][T20175] ? selinux_file_ioctl+0x522/0x590 [ 561.387900][T20175] ? do_vfs_ioctl+0x819/0x14a0 [ 561.392716][T20175] ? lo_release+0x120/0x120 [ 561.397253][T20175] blkdev_ioctl+0x20e/0x440 [ 561.401762][T20175] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 561.407226][T20175] __se_sys_ioctl+0xcb/0x140 [ 561.411845][T20175] __x64_sys_ioctl+0x3f/0x50 [ 561.416436][T20175] do_syscall_64+0x44/0xd0 [ 561.420912][T20175] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 561.426879][T20175] RIP: 0033:0x7f7ca8c308b7 [ 561.431292][T20175] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 561.450934][T20175] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 561.459341][T20175] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 561.467312][T20175] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 561.475288][T20175] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 561.483261][T20175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 561.491338][T20175] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 561.499381][T20175] [ 561.509237][T20175] loop5: detected capacity change from 0 to 4096 [ 561.542105][T20175] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 561.551428][T20175] EXT4-fs (loop5): group descriptors corrupted! [ 561.562264][T20180] loop2: detected capacity change from 0 to 264192 [ 561.578526][T20180] FAULT_INJECTION: forcing a failure. [ 561.578526][T20180] name failslab, interval 1, probability 0, space 0, times 0 [ 561.591021][T20182] loop3: detected capacity change from 0 to 5 [ 561.591214][T20180] CPU: 0 PID: 20180 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 561.606123][T20180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.609785][T20182] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 561.616194][T20180] Call Trace: [ 561.616204][T20180] [ 561.616212][T20180] dump_stack_lvl+0xd6/0x122 [ 561.637264][T20180] dump_stack+0x11/0x1b [ 561.641425][T20180] should_fail+0x23c/0x250 [ 561.645848][T20180] ? strndup_user+0x64/0xa0 [ 561.650356][T20180] __should_failslab+0x81/0x90 [ 561.655159][T20180] should_failslab+0x5/0x20 [ 561.660110][T20180] __kmalloc_track_caller+0x6d/0x370 [ 561.665399][T20180] memdup_user+0x22/0xb0 [ 561.669650][T20180] strndup_user+0x64/0xa0 [ 561.673981][T20180] __se_sys_mount+0x91/0x2f0 [ 561.678570][T20180] ? __this_cpu_preempt_check+0x18/0x20 [ 561.684171][T20180] ? switch_fpu_return+0xc9/0x190 [ 561.689199][T20180] __x64_sys_mount+0x63/0x70 [ 561.693792][T20180] do_syscall_64+0x44/0xd0 [ 561.698276][T20180] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 561.704173][T20180] RIP: 0033:0x7f867f59602a [ 561.708612][T20180] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 561.728653][T20180] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 561.737077][T20180] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f59602a [ 561.745055][T20180] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f867ed0b000 [ 561.753125][T20180] RBP: 00007f867ed0b040 R08: 00007f867ed0b040 R09: 0000000020000000 [ 561.761109][T20180] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 561.769127][T20180] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 561.777104][T20180] [ 561.780563][T20181] loop4: detected capacity change from 0 to 5 [ 561.787964][T20185] FAULT_INJECTION: forcing a failure. [ 561.787964][T20185] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 561.801312][T20185] CPU: 0 PID: 20185 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 561.810071][T20185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.820131][T20185] Call Trace: [ 561.823405][T20185] [ 561.826372][T20185] dump_stack_lvl+0xd6/0x122 [ 561.830976][T20185] dump_stack+0x11/0x1b [ 561.835126][T20185] should_fail+0x23c/0x250 [ 561.839537][T20185] __alloc_pages+0x102/0x330 [ 561.844149][T20185] alloc_pages_vma+0x5ee/0x770 [ 561.848990][T20185] shmem_getpage_gfp+0x8bc/0x12c0 [ 561.854029][T20185] shmem_write_begin+0x7e/0x100 [ 561.858882][T20185] generic_perform_write+0x1c8/0x400 [ 561.864224][T20185] ? current_time+0xed/0x1a0 [ 561.868820][T20185] __generic_file_write_iter+0xf7/0x2b0 [ 561.874426][T20185] ? generic_write_checks+0x250/0x290 [ 561.879818][T20185] generic_file_write_iter+0x75/0x130 [ 561.885195][T20185] vfs_write+0x7f5/0x950 [ 561.889557][T20185] __x64_sys_pwrite64+0xf5/0x150 [ 561.894566][T20185] do_syscall_64+0x44/0xd0 [ 561.899079][T20185] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 561.904974][T20185] RIP: 0033:0x7fa8336ceac7 [ 561.909382][T20185] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 561.928993][T20185] RSP: 002b:00007fa832e70f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 561.937437][T20185] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa8336ceac7 [ 561.945454][T20185] RDX: 0000000000000017 RSI: 00000000200000c0 RDI: 0000000000000004 [ 561.953431][T20185] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 561.961460][T20185] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 561.969448][T20185] R13: 0000000000000004 R14: 0000000020000500 R15: 0000000000000000 [ 561.977409][T20185] [ 561.986396][T20185] loop0: detected capacity change from 0 to 6 22:16:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 32) 22:16:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 57) 22:16:30 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x9602, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:16:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x402, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 561.993659][T20181] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 562.004304][T20182] loop3: detected capacity change from 0 to 5 [ 562.010857][T20182] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 562.027262][T20185] FAT-fs (loop0): bogus number of reserved sectors [ 562.033806][T20185] FAT-fs (loop0): Can't find a valid FAT filesystem 22:16:30 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 9) 22:16:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 562.077569][T20181] loop4: detected capacity change from 0 to 5 [ 562.086444][T20181] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 562.187728][T20191] loop2: detected capacity change from 0 to 264192 [ 562.197887][T20192] FAULT_INJECTION: forcing a failure. [ 562.197887][T20192] name failslab, interval 1, probability 0, space 0, times 0 [ 562.210529][T20192] CPU: 0 PID: 20192 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 562.219324][T20192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 562.229377][T20192] Call Trace: [ 562.232650][T20192] [ 562.235647][T20192] dump_stack_lvl+0xd6/0x122 [ 562.240241][T20192] dump_stack+0x11/0x1b [ 562.244399][T20192] should_fail+0x23c/0x250 [ 562.248822][T20192] ? __kernfs_new_node+0x6a/0x340 [ 562.253921][T20192] __should_failslab+0x81/0x90 [ 562.258690][T20192] should_failslab+0x5/0x20 [ 562.263202][T20192] kmem_cache_alloc+0x4f/0x320 [ 562.267968][T20192] ? __down_write_common+0x42/0x7b0 [ 562.272130][T20196] FAULT_INJECTION: forcing a failure. [ 562.272130][T20196] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 562.273172][T20192] __kernfs_new_node+0x6a/0x340 [ 562.291051][T20192] ? debug_smp_processor_id+0x18/0x20 [ 562.296647][T20192] ? delay_tsc+0x96/0xe0 [ 562.300916][T20192] ? kernfs_new_node+0x40/0xd0 [ 562.305667][T20192] kernfs_new_node+0x5b/0xd0 [ 562.310262][T20192] __kernfs_create_file+0x45/0x1a0 [ 562.315366][T20192] ? dev_attr_show+0x90/0x90 [ 562.319943][T20192] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 562.325304][T20192] internal_create_group+0x2dd/0x840 [ 562.330580][T20192] sysfs_create_group+0x1b/0x20 [ 562.335424][T20192] loop_configure+0xc58/0xf30 [ 562.340176][T20192] lo_ioctl+0x583/0x1270 [ 562.344402][T20192] ? folio_mark_dirty+0x84/0xe0 [ 562.349281][T20192] ? unlock_page+0x37/0x50 [ 562.353745][T20192] ? __rcu_read_unlock+0x5c/0x290 [ 562.358765][T20192] ? blkdev_common_ioctl+0x438/0x1180 [ 562.364122][T20192] ? selinux_file_ioctl+0x522/0x590 [ 562.369305][T20192] ? do_vfs_ioctl+0x819/0x14a0 [ 562.374134][T20192] ? lo_release+0x120/0x120 [ 562.378683][T20192] blkdev_ioctl+0x20e/0x440 [ 562.383266][T20192] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 562.388734][T20192] __se_sys_ioctl+0xcb/0x140 [ 562.393321][T20192] __x64_sys_ioctl+0x3f/0x50 [ 562.397899][T20192] do_syscall_64+0x44/0xd0 [ 562.402375][T20192] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 562.408291][T20192] RIP: 0033:0x7f7ca8c308b7 [ 562.412692][T20192] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 562.432282][T20192] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 562.440686][T20192] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 562.448800][T20192] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 562.456754][T20192] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 562.464720][T20192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 562.472672][T20192] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 562.480632][T20192] [ 562.483636][T20196] CPU: 1 PID: 20196 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 562.492442][T20196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 562.502490][T20196] Call Trace: [ 562.505766][T20196] [ 562.508698][T20196] dump_stack_lvl+0xd6/0x122 [ 562.513297][T20196] dump_stack+0x11/0x1b [ 562.517532][T20196] should_fail+0x23c/0x250 [ 562.521941][T20196] should_fail_usercopy+0x16/0x20 [ 562.527014][T20196] copy_page_from_iter_atomic+0x2f1/0xc60 [ 562.532731][T20196] ? shmem_write_begin+0x7e/0x100 [ 562.537807][T20196] generic_perform_write+0x211/0x400 [ 562.543114][T20196] ? current_time+0xed/0x1a0 [ 562.547707][T20196] __generic_file_write_iter+0xf7/0x2b0 [ 562.553301][T20196] ? generic_write_checks+0x250/0x290 [ 562.558752][T20196] generic_file_write_iter+0x75/0x130 [ 562.564146][T20196] vfs_write+0x7f5/0x950 [ 562.568411][T20196] __x64_sys_pwrite64+0xf5/0x150 [ 562.573357][T20196] do_syscall_64+0x44/0xd0 [ 562.577780][T20196] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 562.583678][T20196] RIP: 0033:0x7fa8336ceac7 [ 562.588305][T20196] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 562.607919][T20196] RSP: 002b:00007fa832e91f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 562.616337][T20196] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa8336ceac7 [ 562.624304][T20196] RDX: 0000000000000017 RSI: 00000000200000c0 RDI: 0000000000000005 [ 562.632270][T20196] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 562.640239][T20196] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005 [ 562.648311][T20196] R13: 0000000000000005 R14: 0000000020000500 R15: 0000000000000000 [ 562.656282][T20196] [ 562.662930][T20196] loop0: detected capacity change from 0 to 6 [ 562.669695][T20192] loop5: detected capacity change from 0 to 4096 [ 562.676304][T20191] FAULT_INJECTION: forcing a failure. [ 562.676304][T20191] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 562.677180][T20196] FAT-fs (loop0): Directory bread(block 6) failed [ 562.689455][T20191] CPU: 0 PID: 20191 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 562.704601][T20191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 562.714710][T20191] Call Trace: [ 562.718014][T20191] [ 562.720945][T20191] dump_stack_lvl+0xd6/0x122 [ 562.725570][T20191] dump_stack+0x11/0x1b [ 562.729728][T20191] should_fail+0x23c/0x250 [ 562.734134][T20191] should_fail_usercopy+0x16/0x20 [ 562.739163][T20191] _copy_from_user+0x1c/0xd0 [ 562.743758][T20191] memdup_user+0x5b/0xb0 [ 562.747990][T20191] strndup_user+0x64/0xa0 [ 562.752453][T20191] __se_sys_mount+0x91/0x2f0 [ 562.757048][T20191] ? __this_cpu_preempt_check+0x18/0x20 [ 562.762657][T20191] ? switch_fpu_return+0xc9/0x190 [ 562.767681][T20191] __x64_sys_mount+0x63/0x70 [ 562.772269][T20191] do_syscall_64+0x44/0xd0 [ 562.776745][T20191] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 562.782630][T20191] RIP: 0033:0x7f867f59602a [ 562.787113][T20191] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 562.806704][T20191] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 562.815365][T20191] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f59602a [ 562.823352][T20191] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f867ed0b000 [ 562.831306][T20191] RBP: 00007f867ed0b040 R08: 00007f867ed0b040 R09: 0000000020000000 22:16:31 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0xe202, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 562.839262][T20191] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 562.847280][T20191] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 562.855239][T20191] [ 562.863253][T20201] loop3: detected capacity change from 0 to 5 [ 562.866592][T20192] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 562.878559][T20192] EXT4-fs (loop5): group descriptors corrupted! 22:16:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 33) 22:16:31 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 10) 22:16:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) (fail_nth: 58) [ 562.891491][T20201] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 562.930332][T20201] loop3: detected capacity change from 0 to 5 22:16:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x406, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 562.936989][T20201] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 562.970481][T20203] loop4: detected capacity change from 0 to 5 [ 562.996010][T20203] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 563.038514][T20203] loop4: detected capacity change from 0 to 5 [ 563.045426][T20203] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 563.174816][T20210] loop2: detected capacity change from 0 to 264192 [ 563.184830][T20211] FAULT_INJECTION: forcing a failure. [ 563.184830][T20211] name failslab, interval 1, probability 0, space 0, times 0 [ 563.197553][T20211] CPU: 1 PID: 20211 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 563.206318][T20211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.216369][T20211] Call Trace: [ 563.219689][T20211] [ 563.222615][T20211] dump_stack_lvl+0xd6/0x122 [ 563.227299][T20211] dump_stack+0x11/0x1b [ 563.231455][T20211] should_fail+0x23c/0x250 [ 563.235872][T20211] ? getname_flags+0x84/0x3f0 [ 563.240547][T20211] __should_failslab+0x81/0x90 [ 563.245306][T20211] should_failslab+0x5/0x20 [ 563.249811][T20211] kmem_cache_alloc+0x4f/0x320 [ 563.254577][T20211] getname_flags+0x84/0x3f0 [ 563.259164][T20211] ? vfs_write+0x667/0x950 [ 563.263600][T20211] getname+0x15/0x20 [ 563.267493][T20211] do_sys_openat2+0x6d/0x2b0 [ 563.272106][T20211] __x64_sys_openat+0xef/0x110 [ 563.277053][T20211] do_syscall_64+0x44/0xd0 [ 563.281484][T20211] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 563.287384][T20211] RIP: 0033:0x7fa8336cea14 [ 563.291849][T20211] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 563.311547][T20211] RSP: 002b:00007fa832e91ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 563.319963][T20211] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa8336cea14 [ 563.327968][T20211] RDX: 0000000000000002 RSI: 00007fa832e92000 RDI: 00000000ffffff9c [ 563.335975][T20211] RBP: 00007fa832e92000 R08: 0000000000000000 R09: ffffffffffffffff [ 563.343995][T20211] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 563.351956][T20211] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 563.360703][T20211] [ 563.365070][T20212] FAULT_INJECTION: forcing a failure. [ 563.365070][T20212] name failslab, interval 1, probability 0, space 0, times 0 [ 563.377695][T20212] CPU: 1 PID: 20212 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 563.386458][T20212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.396585][T20212] Call Trace: [ 563.399858][T20212] [ 563.402778][T20212] dump_stack_lvl+0xd6/0x122 [ 563.407492][T20212] dump_stack+0x11/0x1b [ 563.411645][T20212] should_fail+0x23c/0x250 [ 563.416059][T20212] ? __kernfs_new_node+0x6a/0x340 [ 563.421131][T20212] __should_failslab+0x81/0x90 [ 563.425948][T20212] should_failslab+0x5/0x20 [ 563.430595][T20212] kmem_cache_alloc+0x4f/0x320 [ 563.435487][T20212] ? __down_write_common+0x42/0x7b0 [ 563.440681][T20212] __kernfs_new_node+0x6a/0x340 [ 563.445604][T20212] ? up_write+0x25/0xc0 [ 563.449754][T20212] kernfs_new_node+0x5b/0xd0 [ 563.454348][T20212] __kernfs_create_file+0x45/0x1a0 [ 563.459501][T20212] ? dev_attr_show+0x90/0x90 [ 563.464150][T20212] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 563.469550][T20212] internal_create_group+0x2dd/0x840 [ 563.474960][T20212] sysfs_create_group+0x1b/0x20 [ 563.479849][T20212] loop_configure+0xc58/0xf30 [ 563.484545][T20212] lo_ioctl+0x583/0x1270 [ 563.488850][T20212] ? folio_mark_dirty+0x84/0xe0 [ 563.493702][T20212] ? unlock_page+0x37/0x50 [ 563.498112][T20212] ? __rcu_read_unlock+0x5c/0x290 [ 563.503220][T20212] ? blkdev_common_ioctl+0x438/0x1180 [ 563.508595][T20212] ? selinux_file_ioctl+0x522/0x590 [ 563.513871][T20212] ? do_vfs_ioctl+0x819/0x14a0 [ 563.518810][T20212] ? lo_release+0x120/0x120 [ 563.523413][T20212] blkdev_ioctl+0x20e/0x440 [ 563.528002][T20212] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 563.533515][T20212] __se_sys_ioctl+0xcb/0x140 [ 563.538180][T20212] __x64_sys_ioctl+0x3f/0x50 [ 563.542784][T20212] do_syscall_64+0x44/0xd0 [ 563.547200][T20212] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 563.553093][T20212] RIP: 0033:0x7f7ca8c308b7 [ 563.557573][T20212] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 563.577256][T20212] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 563.585671][T20212] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 563.593651][T20212] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 563.601630][T20212] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 563.609600][T20212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 563.617566][T20212] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 22:16:31 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 11) [ 563.625645][T20212] [ 563.631770][T20212] loop5: detected capacity change from 0 to 4096 [ 563.641990][T20210] FAULT_INJECTION: forcing a failure. [ 563.641990][T20210] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 563.655172][T20210] CPU: 0 PID: 20210 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 563.656228][T20212] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 563.663927][T20210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.663939][T20210] Call Trace: [ 563.663945][T20210] [ 563.663951][T20210] dump_stack_lvl+0xd6/0x122 [ 563.663975][T20210] dump_stack+0x11/0x1b [ 563.663995][T20210] should_fail+0x23c/0x250 [ 563.673211][T20212] EXT4-fs (loop5): group descriptors corrupted! [ 563.683353][T20210] should_fail_usercopy+0x16/0x20 [ 563.683378][T20210] _copy_from_user+0x1c/0xd0 [ 563.718452][T20210] __se_sys_mount+0x119/0x2f0 [ 563.723137][T20210] ? __this_cpu_preempt_check+0x18/0x20 [ 563.728771][T20210] ? switch_fpu_return+0xc9/0x190 [ 563.734139][T20210] __x64_sys_mount+0x63/0x70 [ 563.738732][T20210] do_syscall_64+0x44/0xd0 [ 563.743145][T20210] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 563.749122][T20210] RIP: 0033:0x7f867f59602a [ 563.753532][T20210] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 563.773131][T20210] RSP: 002b:00007f867ed0afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 563.781574][T20210] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f867f59602a [ 563.789539][T20210] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f867ed0b000 [ 563.797515][T20210] RBP: 00007f867ed0b040 R08: 00007f867ed0b040 R09: 0000000020000000 [ 563.805477][T20210] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 563.813445][T20210] R13: 0000000020000100 R14: 00007f867ed0b000 R15: 0000000020000580 [ 563.818562][T20214] loop3: detected capacity change from 0 to 5 22:16:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 34) [ 563.821415][T20210] [ 563.834993][T20210] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 563.844468][T20210] EXT4-fs (loop2): group descriptors corrupted! [ 563.856494][T20214] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 563.886548][T20219] loop4: detected capacity change from 0 to 5 [ 563.893087][T20218] FAULT_INJECTION: forcing a failure. [ 563.893087][T20218] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 563.906469][T20218] CPU: 0 PID: 20218 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 563.915297][T20218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.925350][T20218] Call Trace: [ 563.928636][T20218] [ 563.931562][T20218] dump_stack_lvl+0xd6/0x122 [ 563.936196][T20218] dump_stack+0x11/0x1b [ 563.940349][T20218] should_fail+0x23c/0x250 [ 563.944807][T20218] should_fail_usercopy+0x16/0x20 [ 563.949838][T20218] strncpy_from_user+0x21/0x250 [ 563.954715][T20218] getname_flags+0xb8/0x3f0 [ 563.959279][T20218] ? vfs_write+0x667/0x950 [ 563.963697][T20218] getname+0x15/0x20 [ 563.967617][T20218] do_sys_openat2+0x6d/0x2b0 [ 563.972228][T20218] __x64_sys_openat+0xef/0x110 [ 563.977023][T20218] do_syscall_64+0x44/0xd0 [ 563.981436][T20218] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 563.987326][T20218] RIP: 0033:0x7fa8336cea14 [ 563.991814][T20218] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 564.011435][T20218] RSP: 002b:00007fa832e91ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 564.015332][T20219] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:32 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0xfc00, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:16:32 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 12) 22:16:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 564.019853][T20218] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa8336cea14 [ 564.019869][T20218] RDX: 0000000000000002 RSI: 00007fa832e92000 RDI: 00000000ffffff9c [ 564.019940][T20218] RBP: 00007fa832e92000 R08: 0000000000000000 R09: ffffffffffffffff [ 564.019951][T20218] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 564.019962][T20218] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 564.019979][T20218] [ 564.082328][T20214] loop3: detected capacity change from 0 to 5 [ 564.090440][T20214] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 564.121857][T20223] FAULT_INJECTION: forcing a failure. [ 564.121857][T20223] name failslab, interval 1, probability 0, space 0, times 0 [ 564.134543][T20223] CPU: 1 PID: 20223 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 564.143308][T20223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.153538][T20223] Call Trace: [ 564.156829][T20223] [ 564.159753][T20223] dump_stack_lvl+0xd6/0x122 [ 564.164361][T20223] dump_stack+0x11/0x1b [ 564.168511][T20223] should_fail+0x23c/0x250 [ 564.172939][T20223] ? __kernfs_new_node+0x6a/0x340 [ 564.178046][T20223] __should_failslab+0x81/0x90 [ 564.182890][T20223] should_failslab+0x5/0x20 [ 564.187399][T20223] kmem_cache_alloc+0x4f/0x320 [ 564.192207][T20223] ? __down_write_common+0x42/0x7b0 [ 564.197648][T20223] __kernfs_new_node+0x6a/0x340 [ 564.202556][T20223] ? up_write+0x25/0xc0 [ 564.206702][T20223] kernfs_new_node+0x5b/0xd0 [ 564.211362][T20223] __kernfs_create_file+0x45/0x1a0 [ 564.216480][T20223] ? dev_attr_show+0x90/0x90 [ 564.221067][T20223] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 564.226531][T20223] internal_create_group+0x2dd/0x840 [ 564.231829][T20223] sysfs_create_group+0x1b/0x20 [ 564.236684][T20223] loop_configure+0xc58/0xf30 [ 564.241500][T20223] lo_ioctl+0x583/0x1270 [ 564.245829][T20223] ? folio_mark_dirty+0x84/0xe0 [ 564.250678][T20223] ? unlock_page+0x37/0x50 [ 564.255145][T20223] ? __rcu_read_unlock+0x5c/0x290 [ 564.260227][T20223] ? blkdev_common_ioctl+0x438/0x1180 [ 564.265592][T20223] ? selinux_file_ioctl+0x522/0x590 [ 564.270800][T20223] ? do_vfs_ioctl+0x819/0x14a0 [ 564.275590][T20223] ? lo_release+0x120/0x120 [ 564.280108][T20223] blkdev_ioctl+0x20e/0x440 [ 564.284609][T20223] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 564.290090][T20223] __se_sys_ioctl+0xcb/0x140 [ 564.294800][T20223] __x64_sys_ioctl+0x3f/0x50 [ 564.299439][T20223] do_syscall_64+0x44/0xd0 [ 564.303853][T20223] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 564.309747][T20223] RIP: 0033:0x7f7ca8c308b7 [ 564.314150][T20223] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 564.333771][T20223] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 564.342180][T20223] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 564.350147][T20223] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 564.358257][T20223] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 564.366323][T20223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 564.374385][T20223] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 564.382357][T20223] 22:16:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 564.391433][T20223] loop5: detected capacity change from 0 to 4096 [ 564.409604][T20219] loop4: detected capacity change from 0 to 5 [ 564.418205][T20219] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 564.432938][T20223] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 564.442247][T20223] EXT4-fs (loop5): group descriptors corrupted! 22:16:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x49, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 35) [ 564.557872][T20227] FAULT_INJECTION: forcing a failure. [ 564.557872][T20227] name failslab, interval 1, probability 0, space 0, times 0 [ 564.570561][T20227] CPU: 1 PID: 20227 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 564.579394][T20227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.589467][T20227] Call Trace: [ 564.592739][T20227] [ 564.595658][T20227] dump_stack_lvl+0xd6/0x122 [ 564.600267][T20227] dump_stack+0x11/0x1b [ 564.604421][T20227] should_fail+0x23c/0x250 [ 564.608832][T20227] ? __alloc_file+0x2e/0x1a0 [ 564.613428][T20227] __should_failslab+0x81/0x90 [ 564.618191][T20227] should_failslab+0x5/0x20 [ 564.622744][T20227] kmem_cache_alloc+0x4f/0x320 [ 564.627501][T20227] __alloc_file+0x2e/0x1a0 [ 564.631991][T20227] alloc_empty_file+0xcd/0x1c0 [ 564.636925][T20227] path_openat+0x6a/0x1eb0 [ 564.641405][T20227] ? avc_has_perm_noaudit+0x1c0/0x270 [ 564.646830][T20227] ? avc_has_perm+0x70/0x160 [ 564.651447][T20227] ? avc_has_perm+0xd5/0x160 [ 564.656046][T20227] do_filp_open+0x105/0x220 [ 564.660632][T20227] do_sys_openat2+0xb5/0x2b0 [ 564.666877][T20227] __x64_sys_openat+0xef/0x110 [ 564.671757][T20227] do_syscall_64+0x44/0xd0 [ 564.676169][T20227] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 564.682066][T20227] RIP: 0033:0x7fa8336cea14 [ 564.686510][T20227] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 564.706185][T20227] RSP: 002b:00007fa832e91ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 564.714725][T20227] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa8336cea14 [ 564.722734][T20227] RDX: 0000000000000002 RSI: 00007fa832e92000 RDI: 00000000ffffff9c [ 564.730887][T20227] RBP: 00007fa832e92000 R08: 0000000000000000 R09: ffffffffffffffff [ 564.738855][T20227] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 564.747694][T20227] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 22:16:33 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 13) [ 564.755668][T20227] [ 564.776967][T20230] loop2: detected capacity change from 0 to 264192 [ 564.796845][T20230] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) 22:16:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030002, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 564.806186][T20230] EXT4-fs (loop2): group descriptors corrupted! [ 564.816664][T20231] loop3: detected capacity change from 0 to 5 [ 564.841550][T20231] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 564.887905][T20234] FAULT_INJECTION: forcing a failure. [ 564.887905][T20234] name failslab, interval 1, probability 0, space 0, times 0 [ 564.900689][T20234] CPU: 1 PID: 20234 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 564.909459][T20234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.919523][T20234] Call Trace: [ 564.922898][T20234] [ 564.925825][T20234] dump_stack_lvl+0xd6/0x122 [ 564.930504][T20234] dump_stack+0x11/0x1b [ 564.934686][T20234] should_fail+0x23c/0x250 [ 564.939102][T20234] ? __kernfs_new_node+0x6a/0x340 [ 564.944130][T20234] __should_failslab+0x81/0x90 [ 564.948944][T20234] should_failslab+0x5/0x20 [ 564.953451][T20234] kmem_cache_alloc+0x4f/0x320 [ 564.958218][T20234] ? __down_write_common+0x42/0x7b0 [ 564.963421][T20234] __kernfs_new_node+0x6a/0x340 [ 564.968276][T20234] ? up_write+0x25/0xc0 [ 564.972432][T20234] kernfs_new_node+0x5b/0xd0 [ 564.977205][T20234] __kernfs_create_file+0x45/0x1a0 [ 564.982325][T20234] ? dev_attr_show+0x90/0x90 [ 564.986919][T20234] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 564.992389][T20234] internal_create_group+0x2dd/0x840 [ 564.997752][T20234] sysfs_create_group+0x1b/0x20 [ 565.002619][T20234] loop_configure+0xc58/0xf30 [ 565.007299][T20234] lo_ioctl+0x583/0x1270 [ 565.011593][T20234] ? folio_mark_dirty+0x84/0xe0 [ 565.016489][T20234] ? unlock_page+0x37/0x50 [ 565.020912][T20234] ? __rcu_read_unlock+0x5c/0x290 [ 565.025964][T20234] ? blkdev_common_ioctl+0x438/0x1180 [ 565.031402][T20234] ? selinux_file_ioctl+0x522/0x590 [ 565.036599][T20234] ? do_vfs_ioctl+0x819/0x14a0 [ 565.041371][T20234] ? lo_release+0x120/0x120 [ 565.045948][T20234] blkdev_ioctl+0x20e/0x440 [ 565.050454][T20234] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 565.055910][T20234] __se_sys_ioctl+0xcb/0x140 [ 565.060575][T20234] __x64_sys_ioctl+0x3f/0x50 [ 565.065524][T20234] do_syscall_64+0x44/0xd0 [ 565.069939][T20234] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 565.075837][T20234] RIP: 0033:0x7f7ca8c308b7 [ 565.080248][T20234] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 565.099993][T20234] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 565.108410][T20234] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 565.116469][T20234] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 565.124621][T20234] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 565.133035][T20234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 565.141003][T20234] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 565.148971][T20234] [ 565.156858][T20234] loop5: detected capacity change from 0 to 4096 [ 565.167242][T20235] loop4: detected capacity change from 0 to 5 [ 565.180393][T20231] loop3: detected capacity change from 0 to 5 [ 565.186850][T20234] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 565.188550][T20235] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 565.196104][T20234] EXT4-fs (loop5): group descriptors corrupted! [ 565.198269][T20231] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 565.252037][T20239] FAULT_INJECTION: forcing a failure. [ 565.252037][T20239] name failslab, interval 1, probability 0, space 0, times 0 [ 565.265149][T20239] CPU: 1 PID: 20239 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 565.273947][T20239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.283994][T20239] Call Trace: [ 565.287272][T20239] [ 565.290246][T20239] dump_stack_lvl+0xd6/0x122 [ 565.294839][T20239] dump_stack+0x11/0x1b [ 565.299112][T20239] should_fail+0x23c/0x250 [ 565.303518][T20239] ? security_file_alloc+0x30/0x190 [ 565.308739][T20239] __should_failslab+0x81/0x90 [ 565.313513][T20239] should_failslab+0x5/0x20 [ 565.318017][T20239] kmem_cache_alloc+0x4f/0x320 [ 565.322859][T20239] security_file_alloc+0x30/0x190 [ 565.327883][T20239] __alloc_file+0x83/0x1a0 [ 565.332363][T20239] alloc_empty_file+0xcd/0x1c0 [ 565.337126][T20239] path_openat+0x6a/0x1eb0 [ 565.341798][T20239] ? avc_has_perm_noaudit+0x1c0/0x270 [ 565.347222][T20239] ? avc_has_perm+0x70/0x160 [ 565.351823][T20239] ? avc_has_perm+0xd5/0x160 [ 565.356411][T20239] do_filp_open+0x105/0x220 [ 565.361046][T20239] do_sys_openat2+0xb5/0x2b0 [ 565.365887][T20239] __x64_sys_openat+0xef/0x110 [ 565.370658][T20239] do_syscall_64+0x44/0xd0 [ 565.375074][T20239] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 565.380971][T20239] RIP: 0033:0x7fa8336cea14 [ 565.385389][T20239] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 565.405083][T20239] RSP: 002b:00007fa832e91ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 565.413505][T20239] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa8336cea14 [ 565.421475][T20239] RDX: 0000000000000002 RSI: 00007fa832e92000 RDI: 00000000ffffff9c [ 565.429481][T20239] RBP: 00007fa832e92000 R08: 0000000000000000 R09: ffffffffffffffff [ 565.437445][T20239] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 22:16:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x59d, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:33 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 14) 22:16:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 36) 22:16:33 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0xfe00, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 565.445410][T20239] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 565.453382][T20239] [ 565.461069][T20235] loop4: detected capacity change from 0 to 5 [ 565.473824][T20235] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 565.520584][T20243] loop2: detected capacity change from 0 to 264192 [ 565.537160][T20243] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 565.546443][T20243] EXT4-fs (loop2): group descriptors corrupted! [ 565.589475][T20243] loop2: detected capacity change from 0 to 264192 [ 565.597159][T20243] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 565.606421][T20243] EXT4-fs (loop2): group descriptors corrupted! 22:16:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c0300c0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 565.655073][T20248] loop3: detected capacity change from 0 to 5 [ 565.665655][T20249] loop5: detected capacity change from 0 to 4096 [ 565.674184][T20249] FAULT_INJECTION: forcing a failure. [ 565.674184][T20249] name failslab, interval 1, probability 0, space 0, times 0 [ 565.686864][T20249] CPU: 1 PID: 20249 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 565.695671][T20249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.705879][T20249] Call Trace: [ 565.709148][T20249] [ 565.712072][T20249] dump_stack_lvl+0xd6/0x122 [ 565.716512][T20251] FAULT_INJECTION: forcing a failure. [ 565.716512][T20251] name failslab, interval 1, probability 0, space 0, times 0 [ 565.716805][T20249] dump_stack+0x11/0x1b [ 565.733509][T20249] should_fail+0x23c/0x250 [ 565.737934][T20249] ? kobject_uevent_env+0x1a7/0xc40 [ 565.743178][T20249] __should_failslab+0x81/0x90 [ 565.747929][T20249] should_failslab+0x5/0x20 [ 565.752465][T20249] kmem_cache_alloc_trace+0x52/0x350 [ 565.757736][T20249] ? _printk+0x76/0x97 [ 565.761786][T20249] ? dev_uevent_filter+0x70/0x70 [ 565.766761][T20249] kobject_uevent_env+0x1a7/0xc40 [ 565.771772][T20249] kobject_uevent+0x18/0x20 [ 565.776261][T20249] loop_configure+0xd70/0xf30 [ 565.780923][T20249] lo_ioctl+0x583/0x1270 [ 565.785147][T20249] ? folio_mark_dirty+0x84/0xe0 [ 565.790002][T20249] ? unlock_page+0x37/0x50 [ 565.794400][T20249] ? __rcu_read_unlock+0x5c/0x290 [ 565.799487][T20249] ? blkdev_common_ioctl+0x438/0x1180 [ 565.804891][T20249] ? selinux_file_ioctl+0x522/0x590 [ 565.810075][T20249] ? do_vfs_ioctl+0x819/0x14a0 [ 565.814826][T20249] ? lo_release+0x120/0x120 [ 565.819329][T20249] blkdev_ioctl+0x20e/0x440 [ 565.823941][T20249] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 565.829418][T20249] __se_sys_ioctl+0xcb/0x140 [ 565.833996][T20249] __x64_sys_ioctl+0x3f/0x50 [ 565.838662][T20249] do_syscall_64+0x44/0xd0 [ 565.843062][T20249] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 565.848970][T20249] RIP: 0033:0x7f7ca8c308b7 [ 565.853367][T20249] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 565.872953][T20249] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 565.881359][T20249] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 565.889312][T20249] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 565.897268][T20249] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 565.905287][T20249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 565.913262][T20249] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 565.921217][T20249] [ 565.924221][T20251] CPU: 0 PID: 20251 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 565.933055][T20251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.943119][T20251] Call Trace: [ 565.946387][T20251] [ 565.949314][T20251] dump_stack_lvl+0xd6/0x122 [ 565.954004][T20251] dump_stack+0x11/0x1b [ 565.958178][T20251] should_fail+0x23c/0x250 [ 565.962595][T20251] ? kzalloc+0x16/0x20 [ 565.966679][T20251] __should_failslab+0x81/0x90 [ 565.971453][T20251] should_failslab+0x5/0x20 [ 565.975960][T20251] __kmalloc+0x6f/0x370 [ 565.980116][T20251] ? iput+0x1cd/0x580 [ 565.984131][T20251] kzalloc+0x16/0x20 [ 565.988085][T20251] alloc_workqueue+0x12f/0xad0 [ 565.992903][T20251] ? blkdev_get_by_dev+0xb8b/0xc60 [ 565.998009][T20251] ? preempt_count_add+0x4e/0x90 [ 566.002971][T20251] ? _raw_spin_unlock+0x2e/0x50 [ 566.007822][T20251] ? bd_prepare_to_claim+0x1ac/0x200 [ 566.013146][T20251] loop_configure+0x70e/0xf30 [ 566.017868][T20251] lo_ioctl+0x583/0x1270 [ 566.022266][T20251] ? __rcu_read_unlock+0x5c/0x290 [ 566.027282][T20251] ? blkdev_common_ioctl+0x438/0x1180 [ 566.032651][T20251] ? selinux_file_ioctl+0x522/0x590 [ 566.037831][T20251] ? do_vfs_ioctl+0x819/0x14a0 [ 566.042622][T20251] ? lo_release+0x120/0x120 [ 566.047108][T20251] blkdev_ioctl+0x20e/0x440 [ 566.051615][T20251] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 566.057091][T20251] __se_sys_ioctl+0xcb/0x140 [ 566.061722][T20251] __x64_sys_ioctl+0x3f/0x50 [ 566.066314][T20251] do_syscall_64+0x44/0xd0 [ 566.070789][T20251] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 566.076868][T20251] RIP: 0033:0x7fa83371b8b7 [ 566.081281][T20251] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 566.100946][T20251] RSP: 002b:00007fa832e70f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 566.109341][T20251] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 566.117324][T20251] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 566.125276][T20251] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 566.133304][T20251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 566.141258][T20251] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 566.149224][T20251] 22:16:34 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 15) [ 566.153838][T20248] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 566.166117][T20249] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 566.175532][T20249] EXT4-fs (loop5): group descriptors corrupted! 22:16:34 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x30000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:16:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 37) [ 566.227459][T20248] loop3: detected capacity change from 0 to 5 [ 566.234638][T20248] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 566.245646][T20260] loop4: detected capacity change from 0 to 5 [ 566.245700][T20259] loop2: detected capacity change from 0 to 264192 22:16:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5c3, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 566.279356][T20260] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 566.289594][T20259] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 566.298823][T20259] EXT4-fs (loop2): group descriptors corrupted! 22:16:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c0307f2, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) 22:16:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x60, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 566.350110][T20260] loop4: detected capacity change from 0 to 5 [ 566.351837][T20259] loop2: detected capacity change from 0 to 264192 [ 566.360524][T20260] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 566.365478][T20259] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 566.382427][T20259] EXT4-fs (loop2): group descriptors corrupted! [ 566.461402][T20264] FAULT_INJECTION: forcing a failure. [ 566.461402][T20264] name failslab, interval 1, probability 0, space 0, times 0 [ 566.474069][T20264] CPU: 0 PID: 20264 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 566.482834][T20264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.492908][T20264] Call Trace: [ 566.496369][T20264] [ 566.499302][T20264] dump_stack_lvl+0xd6/0x122 [ 566.503963][T20264] dump_stack+0x11/0x1b [ 566.508130][T20264] should_fail+0x23c/0x250 [ 566.512549][T20264] ? alloc_workqueue+0x15d/0xad0 [ 566.517578][T20264] __should_failslab+0x81/0x90 [ 566.522357][T20264] should_failslab+0x5/0x20 [ 566.527092][T20264] kmem_cache_alloc_trace+0x52/0x350 [ 566.532674][T20264] ? kzalloc+0x16/0x20 [ 566.536756][T20264] alloc_workqueue+0x15d/0xad0 [ 566.541543][T20264] ? blkdev_get_by_dev+0xb8b/0xc60 [ 566.546740][T20264] ? preempt_count_add+0x4e/0x90 [ 566.551755][T20264] ? _raw_spin_unlock+0x2e/0x50 [ 566.556720][T20264] ? bd_prepare_to_claim+0x1ac/0x200 [ 566.562008][T20264] loop_configure+0x70e/0xf30 [ 566.566689][T20264] lo_ioctl+0x583/0x1270 [ 566.570934][T20264] ? __rcu_read_unlock+0x5c/0x290 [ 566.575970][T20264] ? blkdev_common_ioctl+0x438/0x1180 [ 566.581407][T20264] ? selinux_file_ioctl+0x522/0x590 [ 566.586610][T20264] ? do_vfs_ioctl+0x819/0x14a0 [ 566.591473][T20264] ? lo_release+0x120/0x120 [ 566.595979][T20264] blkdev_ioctl+0x20e/0x440 [ 566.600519][T20264] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 566.605978][T20264] __se_sys_ioctl+0xcb/0x140 [ 566.610619][T20264] __x64_sys_ioctl+0x3f/0x50 [ 566.615273][T20264] do_syscall_64+0x44/0xd0 [ 566.619690][T20264] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 566.625617][T20264] RIP: 0033:0x7fa83371b8b7 [ 566.630030][T20264] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 566.638008][T20269] loop4: detected capacity change from 0 to 5 [ 566.649738][T20264] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 566.649760][T20264] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 566.649772][T20264] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 566.656600][T20266] loop5: detected capacity change from 0 to 4096 [ 566.664271][T20264] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 566.664285][T20264] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 566.664297][T20264] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 566.664312][T20264] [ 566.665211][T20267] loop3: detected capacity change from 0 to 5 [ 566.700132][T20266] FAULT_INJECTION: forcing a failure. [ 566.700132][T20266] name failslab, interval 1, probability 0, space 0, times 0 [ 566.732476][T20266] CPU: 1 PID: 20266 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 566.741313][T20266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.751365][T20266] Call Trace: [ 566.754637][T20266] [ 566.757561][T20266] dump_stack_lvl+0xd6/0x122 [ 566.762159][T20266] dump_stack+0x11/0x1b [ 566.766399][T20266] should_fail+0x23c/0x250 [ 566.770821][T20266] ? kobject_uevent_env+0x1a7/0xc40 [ 566.776071][T20266] __should_failslab+0x81/0x90 [ 566.780881][T20266] should_failslab+0x5/0x20 [ 566.785383][T20266] kmem_cache_alloc_trace+0x52/0x350 [ 566.790709][T20266] ? _printk+0x76/0x97 [ 566.794840][T20266] ? dev_uevent_filter+0x70/0x70 [ 566.799776][T20266] kobject_uevent_env+0x1a7/0xc40 [ 566.804898][T20266] kobject_uevent+0x18/0x20 [ 566.809471][T20266] loop_configure+0xd70/0xf30 [ 566.814165][T20266] lo_ioctl+0x583/0x1270 [ 566.818409][T20266] ? folio_mark_dirty+0x84/0xe0 [ 566.823263][T20266] ? unlock_page+0x37/0x50 [ 566.827674][T20266] ? __rcu_read_unlock+0x5c/0x290 [ 566.832711][T20266] ? blkdev_common_ioctl+0x438/0x1180 [ 566.838143][T20266] ? selinux_file_ioctl+0x522/0x590 [ 566.843381][T20266] ? do_vfs_ioctl+0x819/0x14a0 [ 566.848145][T20266] ? lo_release+0x120/0x120 [ 566.852650][T20266] blkdev_ioctl+0x20e/0x440 [ 566.857239][T20266] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 566.862713][T20266] __se_sys_ioctl+0xcb/0x140 [ 566.867416][T20266] __x64_sys_ioctl+0x3f/0x50 [ 566.872013][T20266] do_syscall_64+0x44/0xd0 [ 566.876430][T20266] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 566.882328][T20266] RIP: 0033:0x7f7ca8c308b7 [ 566.886835][T20266] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:16:34 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 16) [ 566.906436][T20266] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 566.915471][T20266] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 566.923494][T20266] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 566.931467][T20266] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 566.939436][T20266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 566.947422][T20266] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 566.955389][T20266] 22:16:35 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x80000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 566.962631][T20269] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 566.974244][T20267] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 566.993570][T20269] loop4: detected capacity change from 0 to 5 22:16:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 38) 22:16:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 567.006663][T20266] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 567.015899][T20266] EXT4-fs (loop5): group descriptors corrupted! [ 567.025089][T20269] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 567.036088][T20267] loop3: detected capacity change from 0 to 5 [ 567.042638][T20267] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 567.056665][T20276] loop2: detected capacity change from 0 to 264192 [ 567.103342][T20276] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 567.112615][T20276] EXT4-fs (loop2): group descriptors corrupted! [ 567.140683][T20276] loop2: detected capacity change from 0 to 264192 22:16:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 567.147798][T20276] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 567.157022][T20276] EXT4-fs (loop2): group descriptors corrupted! [ 567.253140][T20279] FAULT_INJECTION: forcing a failure. [ 567.253140][T20279] name failslab, interval 1, probability 0, space 0, times 0 [ 567.265868][T20279] CPU: 0 PID: 20279 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 567.274634][T20279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.284686][T20279] Call Trace: [ 567.287973][T20279] [ 567.290897][T20279] dump_stack_lvl+0xd6/0x122 [ 567.295564][T20279] dump_stack+0x11/0x1b [ 567.299721][T20279] should_fail+0x23c/0x250 [ 567.304288][T20279] ? kzalloc+0x16/0x20 [ 567.308356][T20279] __should_failslab+0x81/0x90 [ 567.313122][T20279] should_failslab+0x5/0x20 [ 567.317706][T20279] __kmalloc+0x6f/0x370 [ 567.321951][T20279] ? number+0xa13/0xb60 [ 567.326111][T20279] kzalloc+0x16/0x20 [ 567.330103][T20279] apply_wqattrs_prepare+0x3a/0x630 [ 567.335323][T20279] ? vsnprintf+0xe8f/0xed0 [ 567.339804][T20279] apply_workqueue_attrs+0x9e/0x100 [ 567.345087][T20279] alloc_workqueue+0x777/0xad0 [ 567.349891][T20279] ? preempt_count_add+0x4e/0x90 [ 567.354932][T20279] ? _raw_spin_unlock+0x2e/0x50 [ 567.359792][T20279] ? bd_prepare_to_claim+0x1ac/0x200 [ 567.365094][T20279] loop_configure+0x70e/0xf30 [ 567.369768][T20279] lo_ioctl+0x583/0x1270 [ 567.374077][T20279] ? __rcu_read_unlock+0x5c/0x290 [ 567.379368][T20279] ? blkdev_common_ioctl+0x438/0x1180 [ 567.384739][T20279] ? selinux_file_ioctl+0x522/0x590 [ 567.389934][T20279] ? do_vfs_ioctl+0x819/0x14a0 [ 567.394706][T20279] ? lo_release+0x120/0x120 [ 567.399206][T20279] blkdev_ioctl+0x20e/0x440 [ 567.403707][T20279] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 567.409252][T20279] __se_sys_ioctl+0xcb/0x140 [ 567.413846][T20279] __x64_sys_ioctl+0x3f/0x50 [ 567.418462][T20279] do_syscall_64+0x44/0xd0 [ 567.422881][T20279] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 567.428811][T20279] RIP: 0033:0x7fa83371b8b7 [ 567.433219][T20279] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 567.452830][T20279] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 567.461240][T20279] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 567.469215][T20279] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 567.477248][T20279] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 567.485255][T20279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 567.493266][T20279] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 567.501246][T20279] 22:16:35 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 17) [ 567.515321][T20284] loop3: detected capacity change from 0 to 5 [ 567.521747][T20285] loop5: detected capacity change from 0 to 4096 [ 567.531768][T20285] FAULT_INJECTION: forcing a failure. [ 567.531768][T20285] name failslab, interval 1, probability 0, space 0, times 0 [ 567.544437][T20285] CPU: 1 PID: 20285 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 567.553310][T20285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.563395][T20285] Call Trace: [ 567.566679][T20285] [ 567.569640][T20285] dump_stack_lvl+0xd6/0x122 [ 567.574261][T20285] dump_stack+0x11/0x1b [ 567.578415][T20285] should_fail+0x23c/0x250 [ 567.582830][T20285] __should_failslab+0x81/0x90 [ 567.587597][T20285] should_failslab+0x5/0x20 [ 567.592101][T20285] kmem_cache_alloc_node+0x61/0x2d0 [ 567.597296][T20285] ? __alloc_skb+0xf0/0x450 [ 567.601841][T20285] __alloc_skb+0xf0/0x450 [ 567.606171][T20285] alloc_uevent_skb+0x5b/0x120 [ 567.610956][T20285] kobject_uevent_env+0x863/0xc40 [ 567.615986][T20285] kobject_uevent+0x18/0x20 [ 567.620620][T20285] loop_configure+0xd70/0xf30 [ 567.625377][T20285] lo_ioctl+0x583/0x1270 [ 567.629674][T20285] ? folio_mark_dirty+0x84/0xe0 [ 567.634572][T20285] ? unlock_page+0x37/0x50 [ 567.639165][T20285] ? __rcu_read_unlock+0x5c/0x290 [ 567.644280][T20285] ? blkdev_common_ioctl+0x438/0x1180 [ 567.649652][T20285] ? selinux_file_ioctl+0x522/0x590 [ 567.654845][T20285] ? do_vfs_ioctl+0x819/0x14a0 [ 567.659619][T20285] ? lo_release+0x120/0x120 [ 567.664115][T20285] blkdev_ioctl+0x20e/0x440 [ 567.668624][T20285] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 567.674111][T20285] __se_sys_ioctl+0xcb/0x140 [ 567.678700][T20285] __x64_sys_ioctl+0x3f/0x50 [ 567.683418][T20285] do_syscall_64+0x44/0xd0 [ 567.687845][T20285] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 567.693793][T20285] RIP: 0033:0x7f7ca8c308b7 [ 567.698280][T20285] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 567.717887][T20285] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 567.726299][T20285] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 567.734265][T20285] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 567.742278][T20285] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 567.750295][T20285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 567.758367][T20285] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 567.766339][T20285] [ 567.776045][T20284] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 567.790393][T20285] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 567.799829][T20285] EXT4-fs (loop5): group descriptors corrupted! 22:16:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 39) [ 567.810756][T20289] loop4: detected capacity change from 0 to 5 [ 567.821310][T20290] loop2: detected capacity change from 0 to 264192 [ 567.831344][T20289] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 567.842525][T20290] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 567.861285][T20284] loop3: detected capacity change from 0 to 5 [ 567.868170][T20284] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 567.898757][T20290] loop2: detected capacity change from 0 to 264192 [ 567.906266][T20289] loop4: detected capacity change from 0 to 5 22:16:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x604, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) 22:16:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 567.910360][T20290] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 567.915418][T20289] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 567.996996][T20292] FAULT_INJECTION: forcing a failure. [ 567.996996][T20292] name failslab, interval 1, probability 0, space 0, times 0 [ 568.009707][T20292] CPU: 0 PID: 20292 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 568.018476][T20292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.028532][T20292] Call Trace: [ 568.031869][T20292] [ 568.034791][T20292] dump_stack_lvl+0xd6/0x122 [ 568.039382][T20292] dump_stack+0x11/0x1b [ 568.043538][T20292] should_fail+0x23c/0x250 [ 568.048007][T20292] ? apply_wqattrs_prepare+0x5f/0x630 [ 568.053384][T20292] __should_failslab+0x81/0x90 [ 568.058216][T20292] should_failslab+0x5/0x20 [ 568.062804][T20292] kmem_cache_alloc_trace+0x52/0x350 [ 568.068192][T20292] ? kzalloc+0x16/0x20 [ 568.072302][T20292] apply_wqattrs_prepare+0x5f/0x630 [ 568.077505][T20292] ? vsnprintf+0xe8f/0xed0 [ 568.081930][T20292] apply_workqueue_attrs+0x9e/0x100 [ 568.087132][T20292] alloc_workqueue+0x777/0xad0 [ 568.091914][T20292] ? preempt_count_add+0x4e/0x90 [ 568.096920][T20292] ? _raw_spin_unlock+0x2e/0x50 [ 568.101772][T20292] ? bd_prepare_to_claim+0x1ac/0x200 [ 568.107059][T20292] loop_configure+0x70e/0xf30 [ 568.111748][T20292] lo_ioctl+0x583/0x1270 [ 568.115988][T20292] ? __rcu_read_unlock+0x5c/0x290 [ 568.121069][T20292] ? blkdev_common_ioctl+0x438/0x1180 [ 568.126446][T20292] ? selinux_file_ioctl+0x522/0x590 [ 568.131791][T20292] ? do_vfs_ioctl+0x819/0x14a0 [ 568.136563][T20292] ? lo_release+0x120/0x120 [ 568.141082][T20292] blkdev_ioctl+0x20e/0x440 [ 568.145585][T20292] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 568.151038][T20292] __se_sys_ioctl+0xcb/0x140 [ 568.155629][T20292] __x64_sys_ioctl+0x3f/0x50 [ 568.160272][T20292] do_syscall_64+0x44/0xd0 [ 568.164710][T20292] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 568.170617][T20292] RIP: 0033:0x7fa83371b8b7 [ 568.175022][T20292] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:16:36 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 18) [ 568.194812][T20292] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 568.203222][T20292] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 568.211193][T20292] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 568.219161][T20292] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 568.227131][T20292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 568.235090][T20292] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 568.243060][T20292] 22:16:36 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x91000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 568.300005][T20296] loop5: detected capacity change from 0 to 4096 [ 568.309686][T20296] FAULT_INJECTION: forcing a failure. [ 568.309686][T20296] name failslab, interval 1, probability 0, space 0, times 0 [ 568.322337][T20296] CPU: 1 PID: 20296 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 568.331098][T20296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.341148][T20296] Call Trace: [ 568.344420][T20296] [ 568.347344][T20296] dump_stack_lvl+0xd6/0x122 [ 568.351936][T20296] dump_stack+0x11/0x1b [ 568.356197][T20296] should_fail+0x23c/0x250 [ 568.360605][T20296] __should_failslab+0x81/0x90 [ 568.365477][T20296] should_failslab+0x5/0x20 [ 568.370006][T20296] kmem_cache_alloc_node_trace+0x61/0x310 [ 568.375724][T20296] ? __kmalloc_node_track_caller+0x30/0x40 [ 568.381591][T20296] __kmalloc_node_track_caller+0x30/0x40 [ 568.387217][T20296] ? alloc_uevent_skb+0x5b/0x120 [ 568.392231][T20296] __alloc_skb+0x19d/0x450 [ 568.396673][T20296] alloc_uevent_skb+0x5b/0x120 [ 568.401441][T20296] kobject_uevent_env+0x863/0xc40 [ 568.406474][T20296] kobject_uevent+0x18/0x20 [ 568.410978][T20296] loop_configure+0xd70/0xf30 [ 568.415654][T20296] lo_ioctl+0x583/0x1270 [ 568.419895][T20296] ? folio_mark_dirty+0x84/0xe0 [ 568.424743][T20296] ? unlock_page+0x37/0x50 [ 568.429154][T20296] ? __rcu_read_unlock+0x5c/0x290 [ 568.434180][T20296] ? blkdev_common_ioctl+0x438/0x1180 [ 568.439629][T20296] ? selinux_file_ioctl+0x522/0x590 [ 568.444832][T20296] ? do_vfs_ioctl+0x819/0x14a0 [ 568.449597][T20296] ? lo_release+0x120/0x120 [ 568.454091][T20296] blkdev_ioctl+0x20e/0x440 [ 568.458592][T20296] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 568.464046][T20296] __se_sys_ioctl+0xcb/0x140 [ 568.468650][T20296] __x64_sys_ioctl+0x3f/0x50 [ 568.473241][T20296] do_syscall_64+0x44/0xd0 [ 568.477896][T20296] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 568.483796][T20296] RIP: 0033:0x7f7ca8c308b7 [ 568.488207][T20296] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 568.507810][T20296] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 568.516221][T20296] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 568.524190][T20296] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 568.532157][T20296] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 568.540143][T20296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 568.548116][T20296] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 568.556125][T20296] [ 568.586230][T20296] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 568.595585][T20296] EXT4-fs (loop5): group descriptors corrupted! 22:16:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 40) [ 568.649280][T20300] loop3: detected capacity change from 0 to 5 [ 568.676020][T20300] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 568.695385][T20301] loop2: detected capacity change from 0 to 264192 [ 568.702770][T20302] loop4: detected capacity change from 0 to 5 [ 568.721488][T20301] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 568.730825][T20301] EXT4-fs (loop2): group descriptors corrupted! [ 568.740632][T20300] loop3: detected capacity change from 0 to 5 [ 568.747290][T20300] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 568.759397][T20302] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 568.771297][T20301] loop2: detected capacity change from 0 to 264192 [ 568.779344][T20301] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 568.788655][T20301] EXT4-fs (loop2): group descriptors corrupted! 22:16:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) 22:16:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 568.812973][T20302] loop4: detected capacity change from 0 to 5 [ 568.820575][T20302] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 568.914295][T20305] FAULT_INJECTION: forcing a failure. [ 568.914295][T20305] name failslab, interval 1, probability 0, space 0, times 0 [ 568.926995][T20305] CPU: 0 PID: 20305 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 568.935825][T20305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.945884][T20305] Call Trace: [ 568.949236][T20305] [ 568.952160][T20305] dump_stack_lvl+0xd6/0x122 [ 568.956757][T20305] dump_stack+0x11/0x1b [ 568.961014][T20305] should_fail+0x23c/0x250 [ 568.965430][T20305] ? apply_wqattrs_prepare+0xbe/0x630 [ 568.970814][T20305] __should_failslab+0x81/0x90 [ 568.975601][T20305] should_failslab+0x5/0x20 [ 568.980117][T20305] kmem_cache_alloc_trace+0x52/0x350 [ 568.985403][T20305] ? apply_wqattrs_prepare+0x5f/0x630 [ 568.990813][T20305] apply_wqattrs_prepare+0xbe/0x630 [ 568.996049][T20305] ? vsnprintf+0xe8f/0xed0 [ 569.000478][T20305] apply_workqueue_attrs+0x9e/0x100 [ 569.005755][T20305] alloc_workqueue+0x777/0xad0 [ 569.010537][T20305] ? preempt_count_add+0x4e/0x90 [ 569.015517][T20305] ? _raw_spin_unlock+0x2e/0x50 [ 569.020462][T20305] ? bd_prepare_to_claim+0x1ac/0x200 [ 569.025822][T20305] loop_configure+0x70e/0xf30 [ 569.030585][T20305] lo_ioctl+0x583/0x1270 [ 569.034898][T20305] ? __rcu_read_unlock+0x5c/0x290 [ 569.039976][T20305] ? blkdev_common_ioctl+0x438/0x1180 [ 569.045403][T20305] ? selinux_file_ioctl+0x522/0x590 [ 569.050632][T20305] ? do_vfs_ioctl+0x819/0x14a0 [ 569.055389][T20305] ? lo_release+0x120/0x120 [ 569.060015][T20305] blkdev_ioctl+0x20e/0x440 [ 569.064523][T20305] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 569.070022][T20305] __se_sys_ioctl+0xcb/0x140 [ 569.074708][T20305] __x64_sys_ioctl+0x3f/0x50 [ 569.079302][T20305] do_syscall_64+0x44/0xd0 [ 569.083729][T20305] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 569.089627][T20305] RIP: 0033:0x7fa83371b8b7 [ 569.094046][T20305] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 569.113655][T20305] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 569.122139][T20305] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 569.130109][T20305] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 569.138082][T20305] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 569.146063][T20305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 569.154040][T20305] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 569.162059][T20305] [ 569.166924][T20311] loop4: detected capacity change from 0 to 5 [ 569.168230][T20314] loop5: detected capacity change from 0 to 4096 [ 569.173516][T20310] loop3: detected capacity change from 0 to 5 [ 569.179676][T20314] FAULT_INJECTION: forcing a failure. [ 569.179676][T20314] name failslab, interval 1, probability 0, space 0, times 0 [ 569.198030][T20314] CPU: 0 PID: 20314 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 569.206799][T20314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.216862][T20314] Call Trace: [ 569.220141][T20314] [ 569.223066][T20314] dump_stack_lvl+0xd6/0x122 [ 569.227661][T20314] dump_stack+0x11/0x1b [ 569.231925][T20314] should_fail+0x23c/0x250 [ 569.236341][T20314] ? skb_clone+0x12c/0x1f0 [ 569.240837][T20314] __should_failslab+0x81/0x90 [ 569.245673][T20314] should_failslab+0x5/0x20 [ 569.250238][T20314] kmem_cache_alloc+0x4f/0x320 [ 569.255114][T20314] skb_clone+0x12c/0x1f0 [ 569.259362][T20314] netlink_broadcast+0x4e9/0xad0 [ 569.264372][T20314] kobject_uevent_env+0x8c9/0xc40 [ 569.269465][T20314] kobject_uevent+0x18/0x20 [ 569.273973][T20314] loop_configure+0xd70/0xf30 [ 569.278658][T20314] lo_ioctl+0x583/0x1270 [ 569.282894][T20314] ? folio_mark_dirty+0x84/0xe0 [ 569.287818][T20314] ? unlock_page+0x37/0x50 [ 569.292324][T20314] ? __rcu_read_unlock+0x5c/0x290 [ 569.297383][T20314] ? blkdev_common_ioctl+0x438/0x1180 [ 569.302756][T20314] ? selinux_file_ioctl+0x522/0x590 [ 569.307970][T20314] ? do_vfs_ioctl+0x819/0x14a0 [ 569.313340][T20314] ? lo_release+0x120/0x120 [ 569.318005][T20314] blkdev_ioctl+0x20e/0x440 [ 569.322508][T20314] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 569.328183][T20314] __se_sys_ioctl+0xcb/0x140 [ 569.332785][T20314] __x64_sys_ioctl+0x3f/0x50 [ 569.337381][T20314] do_syscall_64+0x44/0xd0 [ 569.341797][T20314] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 569.347696][T20314] RIP: 0033:0x7f7ca8c308b7 [ 569.352100][T20314] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 569.371745][T20314] RSP: 002b:00007f7ca83a6f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 569.380171][T20314] RAX: ffffffffffffffda RBX: 00007f7ca8c7a9c8 RCX: 00007f7ca8c308b7 [ 569.388144][T20314] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 569.396152][T20314] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 569.404178][T20314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 569.412245][T20314] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 569.420219][T20314] [ 569.425737][T20317] loop2: detected capacity change from 0 to 264192 [ 569.443900][T20310] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:37 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 19) [ 569.459519][T20311] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 569.470706][T20314] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 569.479956][T20314] EXT4-fs (loop5): group descriptors corrupted! [ 569.487945][T20317] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 569.497223][T20317] EXT4-fs (loop2): group descriptors corrupted! [ 569.505324][T20310] loop3: detected capacity change from 0 to 5 22:16:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 41) [ 569.515274][T20311] loop4: detected capacity change from 0 to 5 [ 569.515471][T20310] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 569.534052][T20311] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 569.560782][T20317] loop2: detected capacity change from 0 to 264192 22:16:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 569.569086][T20317] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 569.578371][T20317] EXT4-fs (loop2): group descriptors corrupted! 22:16:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 569.666886][T20320] FAULT_INJECTION: forcing a failure. [ 569.666886][T20320] name failslab, interval 1, probability 0, space 0, times 0 [ 569.679731][T20320] CPU: 0 PID: 20320 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 569.688507][T20320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.698561][T20320] Call Trace: [ 569.701843][T20320] [ 569.704773][T20320] dump_stack_lvl+0xd6/0x122 [ 569.709436][T20320] dump_stack+0x11/0x1b [ 569.713653][T20320] should_fail+0x23c/0x250 [ 569.718083][T20320] __should_failslab+0x81/0x90 [ 569.722852][T20320] should_failslab+0x5/0x20 [ 569.727464][T20320] kmem_cache_alloc_node+0x61/0x2d0 [ 569.732668][T20320] ? should_fail+0xd6/0x250 [ 569.737177][T20320] ? should_fail+0xd6/0x250 [ 569.741732][T20320] ? alloc_unbound_pwq+0x3e6/0x780 [ 569.746896][T20320] alloc_unbound_pwq+0x3e6/0x780 [ 569.751911][T20320] apply_wqattrs_prepare+0x1ed/0x630 [ 569.757204][T20320] ? vsnprintf+0xe8f/0xed0 [ 569.761637][T20320] apply_workqueue_attrs+0x9e/0x100 [ 569.766932][T20320] alloc_workqueue+0x777/0xad0 [ 569.771697][T20320] ? preempt_count_add+0x4e/0x90 [ 569.776643][T20320] ? _raw_spin_unlock+0x2e/0x50 [ 569.781520][T20320] ? bd_prepare_to_claim+0x1ac/0x200 [ 569.786808][T20320] loop_configure+0x70e/0xf30 [ 569.791649][T20320] lo_ioctl+0x583/0x1270 [ 569.795893][T20320] ? __rcu_read_unlock+0x5c/0x290 [ 569.801172][T20320] ? blkdev_common_ioctl+0x438/0x1180 [ 569.806592][T20320] ? selinux_file_ioctl+0x522/0x590 [ 569.811800][T20320] ? do_vfs_ioctl+0x819/0x14a0 [ 569.816609][T20320] ? lo_release+0x120/0x120 [ 569.821111][T20320] blkdev_ioctl+0x20e/0x440 [ 569.825754][T20320] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 569.831304][T20320] __se_sys_ioctl+0xcb/0x140 [ 569.835938][T20320] __x64_sys_ioctl+0x3f/0x50 [ 569.840526][T20320] do_syscall_64+0x44/0xd0 [ 569.844939][T20320] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 569.850889][T20320] RIP: 0033:0x7fa83371b8b7 [ 569.855350][T20320] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 569.875262][T20320] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 569.883681][T20320] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 569.891741][T20320] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 569.899777][T20320] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 569.907744][T20320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 22:16:38 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 20) [ 569.915796][T20320] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 569.923772][T20320] [ 569.927057][T20329] loop3: detected capacity change from 0 to 5 [ 569.928663][T20331] loop4: detected capacity change from 0 to 5 [ 569.933373][T20330] loop5: detected capacity change from 0 to 4096 [ 569.951657][T20331] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 569.956153][T20330] FAULT_INJECTION: forcing a failure. [ 569.956153][T20330] name failslab, interval 1, probability 0, space 0, times 0 [ 569.974501][T20330] CPU: 1 PID: 20330 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 569.983466][T20330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.993618][T20330] Call Trace: [ 569.996892][T20330] [ 569.999816][T20330] dump_stack_lvl+0xd6/0x122 [ 570.004419][T20330] dump_stack+0x11/0x1b [ 570.008619][T20330] should_fail+0x23c/0x250 [ 570.013038][T20330] ? getname_flags+0x84/0x3f0 [ 570.017759][T20330] __should_failslab+0x81/0x90 [ 570.022548][T20330] should_failslab+0x5/0x20 [ 570.027091][T20330] kmem_cache_alloc+0x4f/0x320 [ 570.031853][T20330] getname_flags+0x84/0x3f0 [ 570.036371][T20330] __x64_sys_mkdir+0x31/0x50 [ 570.040958][T20330] do_syscall_64+0x44/0xd0 [ 570.045515][T20330] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 570.051428][T20330] RIP: 0033:0x7f7ca8c2fc07 [ 570.055878][T20330] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 570.075996][T20330] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 570.084443][T20330] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c2fc07 [ 570.092435][T20330] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 570.100446][T20330] RBP: 00007f7ca83a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 570.108613][T20330] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 22:16:38 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x100900, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 570.116578][T20330] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 570.124543][T20330] [ 570.137613][T20329] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 42) [ 570.164530][T20334] loop2: detected capacity change from 0 to 264192 [ 570.178819][T20331] loop4: detected capacity change from 0 to 5 [ 570.186182][T20331] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 570.201357][T20334] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 570.203723][T20329] loop3: detected capacity change from 0 to 5 22:16:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 570.210647][T20334] EXT4-fs (loop2): group descriptors corrupted! [ 570.223959][T20329] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 570.251557][T20334] loop2: detected capacity change from 0 to 264192 [ 570.258728][T20334] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) 22:16:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 570.268047][T20334] EXT4-fs (loop2): group descriptors corrupted! 22:16:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 570.360957][T20340] loop5: detected capacity change from 0 to 4096 [ 570.368657][T20339] FAULT_INJECTION: forcing a failure. [ 570.368657][T20339] name failslab, interval 1, probability 0, space 0, times 0 [ 570.381275][T20339] CPU: 0 PID: 20339 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 570.390040][T20339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.400354][T20339] Call Trace: [ 570.403683][T20339] [ 570.406609][T20339] dump_stack_lvl+0xd6/0x122 [ 570.407612][T20340] FAULT_INJECTION: forcing a failure. [ 570.407612][T20340] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 570.411288][T20339] dump_stack+0x11/0x1b [ 570.411313][T20339] should_fail+0x23c/0x250 [ 570.432895][T20339] ? kobject_uevent_env+0x1a7/0xc40 [ 570.438103][T20339] __should_failslab+0x81/0x90 [ 570.442990][T20339] should_failslab+0x5/0x20 [ 570.447566][T20339] kmem_cache_alloc_trace+0x52/0x350 [ 570.452853][T20339] ? pwq_adjust_max_active+0x4c5/0x4e0 [ 570.458306][T20339] ? dev_uevent_filter+0x70/0x70 [ 570.463231][T20339] kobject_uevent_env+0x1a7/0xc40 [ 570.468243][T20339] ? preempt_count_add+0x4e/0x90 [ 570.473227][T20339] ? _raw_spin_unlock+0x2e/0x50 [ 570.478070][T20339] ? bd_prepare_to_claim+0x1ac/0x200 [ 570.483421][T20339] disk_force_media_change+0xe3/0x170 [ 570.488794][T20339] loop_configure+0x74d/0xf30 [ 570.493516][T20339] lo_ioctl+0x583/0x1270 [ 570.497741][T20339] ? __rcu_read_unlock+0x5c/0x290 [ 570.502911][T20339] ? blkdev_common_ioctl+0x438/0x1180 [ 570.508273][T20339] ? selinux_file_ioctl+0x522/0x590 [ 570.513474][T20339] ? do_vfs_ioctl+0x819/0x14a0 [ 570.518232][T20339] ? lo_release+0x120/0x120 [ 570.522721][T20339] blkdev_ioctl+0x20e/0x440 [ 570.527284][T20339] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 570.532743][T20339] __se_sys_ioctl+0xcb/0x140 [ 570.537531][T20339] __x64_sys_ioctl+0x3f/0x50 [ 570.542120][T20339] do_syscall_64+0x44/0xd0 [ 570.546521][T20339] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 570.552447][T20339] RIP: 0033:0x7fa83371b8b7 [ 570.556877][T20339] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 570.576564][T20339] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 570.584964][T20339] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 570.593008][T20339] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 570.600966][T20339] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 570.608959][T20339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 570.616918][T20339] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 570.624879][T20339] [ 570.627894][T20340] CPU: 1 PID: 20340 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 570.636710][T20340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.637192][T20339] loop0: detected capacity change from 0 to 6 [ 570.646760][T20340] Call Trace: [ 570.646768][T20340] [ 570.653810][T20339] FAT-fs (loop0): Directory bread(block 6) failed [ 570.656125][T20340] dump_stack_lvl+0xd6/0x122 [ 570.670115][T20340] dump_stack+0x11/0x1b [ 570.674272][T20340] should_fail+0x23c/0x250 [ 570.678694][T20340] should_fail_usercopy+0x16/0x20 [ 570.683781][T20340] strncpy_from_user+0x21/0x250 [ 570.688679][T20340] getname_flags+0xb8/0x3f0 [ 570.693183][T20340] __x64_sys_mkdir+0x31/0x50 [ 570.697832][T20340] do_syscall_64+0x44/0xd0 [ 570.702245][T20340] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 570.708346][T20340] RIP: 0033:0x7f7ca8c2fc07 [ 570.712749][T20340] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 570.732402][T20340] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 570.740938][T20340] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c2fc07 [ 570.748915][T20340] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 22:16:39 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 21) 22:16:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 43) [ 570.756976][T20340] RBP: 00007f7ca83a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 570.765065][T20340] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 570.773118][T20340] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 570.781092][T20340] [ 570.789024][T20341] loop4: detected capacity change from 0 to 5 [ 570.821246][T20341] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 570.850664][T20341] loop4: detected capacity change from 0 to 5 [ 570.857061][T20341] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x204, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 570.926307][T20345] loop3: detected capacity change from 0 to 5 [ 570.954493][T20345] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 570.989739][T20345] loop3: detected capacity change from 0 to 5 [ 570.997019][T20345] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 571.010296][T20347] loop2: detected capacity change from 0 to 264192 22:16:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 571.032859][T20347] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 571.042143][T20347] EXT4-fs (loop2): group descriptors corrupted! [ 571.094104][T20350] loop5: detected capacity change from 0 to 4096 [ 571.101452][T20350] FAULT_INJECTION: forcing a failure. [ 571.101452][T20350] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 571.114549][T20350] CPU: 0 PID: 20350 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 571.123307][T20350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.133454][T20350] Call Trace: [ 571.136748][T20350] [ 571.139683][T20350] dump_stack_lvl+0xd6/0x122 [ 571.144289][T20350] dump_stack+0x11/0x1b [ 571.148448][T20350] should_fail+0x23c/0x250 [ 571.152903][T20350] should_fail_usercopy+0x16/0x20 [ 571.157943][T20350] strncpy_from_user+0x21/0x250 [ 571.162805][T20350] getname_flags+0xb8/0x3f0 [ 571.167347][T20350] __x64_sys_mkdir+0x31/0x50 [ 571.170494][T20355] FAULT_INJECTION: forcing a failure. [ 571.170494][T20355] name failslab, interval 1, probability 0, space 0, times 0 [ 571.171933][T20350] do_syscall_64+0x44/0xd0 [ 571.188920][T20350] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 571.194889][T20350] RIP: 0033:0x7f7ca8c2fc07 [ 571.199375][T20350] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 571.218964][T20350] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 571.227431][T20350] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c2fc07 [ 571.235435][T20350] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 571.243388][T20350] RBP: 00007f7ca83a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 571.251494][T20350] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 571.259635][T20350] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 571.267671][T20350] [ 571.270672][T20355] CPU: 1 PID: 20355 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 571.272102][T20354] loop3: detected capacity change from 0 to 5 [ 571.279504][T20355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.279517][T20355] Call Trace: [ 571.279523][T20355] [ 571.279529][T20355] dump_stack_lvl+0xd6/0x122 [ 571.306371][T20355] dump_stack+0x11/0x1b [ 571.310543][T20355] should_fail+0x23c/0x250 [ 571.314954][T20355] ? kzalloc+0x1d/0x30 [ 571.319043][T20355] __should_failslab+0x81/0x90 [ 571.323806][T20355] should_failslab+0x5/0x20 [ 571.328308][T20355] __kmalloc+0x6f/0x370 [ 571.332468][T20355] kzalloc+0x1d/0x30 [ 571.336364][T20355] kobject_get_path+0x7c/0x110 [ 571.341222][T20355] kobject_uevent_env+0x1be/0xc40 [ 571.346266][T20355] ? preempt_count_add+0x4e/0x90 [ 571.351264][T20355] ? _raw_spin_unlock+0x2e/0x50 [ 571.356118][T20355] ? bd_prepare_to_claim+0x1ac/0x200 [ 571.361400][T20355] disk_force_media_change+0xe3/0x170 [ 571.366847][T20355] loop_configure+0x74d/0xf30 [ 571.371568][T20355] lo_ioctl+0x583/0x1270 [ 571.375808][T20355] ? __rcu_read_unlock+0x5c/0x290 [ 571.380871][T20355] ? blkdev_common_ioctl+0x438/0x1180 [ 571.386295][T20355] ? selinux_file_ioctl+0x522/0x590 [ 571.391583][T20355] ? do_vfs_ioctl+0x819/0x14a0 [ 571.396349][T20355] ? lo_release+0x120/0x120 [ 571.400849][T20355] blkdev_ioctl+0x20e/0x440 [ 571.405448][T20355] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 571.410904][T20355] __se_sys_ioctl+0xcb/0x140 [ 571.415494][T20355] __x64_sys_ioctl+0x3f/0x50 [ 571.420127][T20355] do_syscall_64+0x44/0xd0 [ 571.424638][T20355] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 571.430531][T20355] RIP: 0033:0x7fa83371b8b7 [ 571.434936][T20355] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 571.454537][T20355] RSP: 002b:00007fa832e70f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 571.463027][T20355] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 571.470991][T20355] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 571.478956][T20355] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 571.486916][T20355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 571.494884][T20355] R13: 0000000000000004 R14: 0000000020000530 R15: 0000000000000002 [ 571.502903][T20355] [ 571.508351][T20347] loop2: detected capacity change from 0 to 264192 [ 571.509958][T20355] loop0: detected capacity change from 0 to 6 [ 571.525367][T20354] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 571.531215][T20347] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) 22:16:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 44) 22:16:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) 22:16:39 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 22) [ 571.544817][T20347] EXT4-fs (loop2): group descriptors corrupted! [ 571.556666][T20355] FAT-fs (loop0): Directory bread(block 6) failed [ 571.570930][T20354] loop3: detected capacity change from 0 to 5 [ 571.578409][T20354] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 571.589413][T20357] loop4: detected capacity change from 0 to 5 22:16:39 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x200000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:16:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 571.608721][T20357] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 571.670333][T20357] loop4: detected capacity change from 0 to 5 [ 571.676786][T20357] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 571.718421][T20361] loop5: detected capacity change from 0 to 4096 [ 571.725138][T20361] FAULT_INJECTION: forcing a failure. [ 571.725138][T20361] name failslab, interval 1, probability 0, space 0, times 0 [ 571.737841][T20361] CPU: 0 PID: 20361 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 571.746753][T20361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.756873][T20361] Call Trace: [ 571.760144][T20361] [ 571.763095][T20361] dump_stack_lvl+0xd6/0x122 22:16:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 571.767694][T20361] dump_stack+0x11/0x1b [ 571.771846][T20361] should_fail+0x23c/0x250 [ 571.776276][T20361] ? ext4_alloc_inode+0x27/0x300 [ 571.781293][T20361] __should_failslab+0x81/0x90 [ 571.786059][T20361] ? set_qf_name+0x230/0x230 [ 571.790743][T20361] should_failslab+0x5/0x20 [ 571.795487][T20361] kmem_cache_alloc+0x4f/0x320 [ 571.800308][T20361] ? set_qf_name+0x230/0x230 [ 571.804975][T20361] ext4_alloc_inode+0x27/0x300 [ 571.809878][T20361] ? set_qf_name+0x230/0x230 [ 571.814476][T20361] new_inode_pseudo+0x38/0x190 [ 571.819243][T20361] new_inode+0x21/0x100 [ 571.823398][T20361] __ext4_new_inode+0x13f/0x2fc0 [ 571.828339][T20361] ? avc_has_perm+0xd5/0x160 [ 571.832968][T20361] ext4_mkdir+0x28a/0x760 [ 571.837314][T20361] vfs_mkdir+0x2c8/0x3d0 [ 571.841608][T20361] do_mkdirat+0x12e/0x2c0 [ 571.845962][T20361] __x64_sys_mkdir+0x40/0x50 [ 571.850673][T20361] do_syscall_64+0x44/0xd0 [ 571.855147][T20361] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 571.861096][T20361] RIP: 0033:0x7f7ca8c2fc07 [ 571.865511][T20361] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 571.885241][T20361] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 571.891681][T20370] loop4: detected capacity change from 0 to 5 [ 571.893653][T20361] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c2fc07 [ 571.893669][T20361] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 571.912148][T20370] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 571.915771][T20361] RBP: 00007f7ca83a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 571.915834][T20361] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 571.915847][T20361] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 571.915864][T20361] [ 571.916568][T20366] loop3: detected capacity change from 0 to 6 [ 571.959609][T20365] loop2: detected capacity change from 0 to 264192 [ 571.967711][T20373] FAULT_INJECTION: forcing a failure. [ 571.967711][T20373] name failslab, interval 1, probability 0, space 0, times 0 [ 571.980321][T20373] CPU: 1 PID: 20373 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 571.989079][T20373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.999130][T20373] Call Trace: [ 572.002405][T20373] [ 572.005326][T20373] dump_stack_lvl+0xd6/0x122 [ 572.009934][T20373] dump_stack+0x11/0x1b [ 572.014100][T20373] should_fail+0x23c/0x250 [ 572.018511][T20373] __should_failslab+0x81/0x90 [ 572.023411][T20373] should_failslab+0x5/0x20 [ 572.027986][T20373] kmem_cache_alloc_node+0x61/0x2d0 [ 572.033188][T20373] ? __alloc_skb+0xf0/0x450 [ 572.037690][T20373] __alloc_skb+0xf0/0x450 [ 572.042095][T20373] alloc_uevent_skb+0x5b/0x120 [ 572.046958][T20373] kobject_uevent_env+0x863/0xc40 [ 572.052087][T20373] ? preempt_count_add+0x4e/0x90 [ 572.057053][T20373] ? _raw_spin_unlock+0x2e/0x50 [ 572.061976][T20373] ? bd_prepare_to_claim+0x1ac/0x200 [ 572.067255][T20373] disk_force_media_change+0xe3/0x170 [ 572.072683][T20373] loop_configure+0x74d/0xf30 [ 572.077371][T20373] lo_ioctl+0x583/0x1270 [ 572.081773][T20373] ? __rcu_read_unlock+0x5c/0x290 [ 572.086800][T20373] ? blkdev_common_ioctl+0x438/0x1180 [ 572.092226][T20373] ? selinux_file_ioctl+0x522/0x590 [ 572.097443][T20373] ? do_vfs_ioctl+0x819/0x14a0 [ 572.102263][T20373] ? lo_release+0x120/0x120 [ 572.106757][T20373] blkdev_ioctl+0x20e/0x440 [ 572.111365][T20373] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 572.116825][T20373] __se_sys_ioctl+0xcb/0x140 [ 572.121488][T20373] __x64_sys_ioctl+0x3f/0x50 [ 572.126143][T20373] do_syscall_64+0x44/0xd0 [ 572.130576][T20373] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 572.136467][T20373] RIP: 0033:0x7fa83371b8b7 [ 572.140916][T20373] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 572.160525][T20373] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 572.168936][T20373] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 572.176934][T20373] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 572.184897][T20373] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 572.193034][T20373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 572.201002][T20373] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 572.208983][T20373] 22:16:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 45) [ 572.219079][T20373] loop0: detected capacity change from 0 to 6 [ 572.226826][T20365] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 572.236315][T20365] EXT4-fs (loop2): group descriptors corrupted! [ 572.256312][T20366] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 572.266572][T20370] loop4: detected capacity change from 0 to 5 [ 572.274878][T20373] FAT-fs (loop0): Directory bread(block 6) failed [ 572.275302][T20370] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 572.299514][T20365] loop2: detected capacity change from 0 to 264192 [ 572.306761][T20365] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) 22:16:40 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 23) 22:16:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3b6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) 22:16:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 572.316056][T20365] EXT4-fs (loop2): group descriptors corrupted! [ 572.335645][T20366] loop3: detected capacity change from 0 to 6 [ 572.343032][T20366] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 572.423322][T20375] loop5: detected capacity change from 0 to 4096 [ 572.430873][T20375] FAULT_INJECTION: forcing a failure. [ 572.430873][T20375] name failslab, interval 1, probability 0, space 0, times 0 [ 572.443667][T20375] CPU: 1 PID: 20375 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 572.452438][T20375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.462484][T20375] Call Trace: [ 572.465757][T20375] [ 572.468685][T20375] dump_stack_lvl+0xd6/0x122 [ 572.473273][T20375] dump_stack+0x11/0x1b [ 572.477445][T20375] should_fail+0x23c/0x250 [ 572.481929][T20375] ? ext4_alloc_inode+0x27/0x300 [ 572.486864][T20375] __should_failslab+0x81/0x90 [ 572.491640][T20375] ? set_qf_name+0x230/0x230 [ 572.496227][T20375] should_failslab+0x5/0x20 [ 572.500727][T20375] kmem_cache_alloc+0x4f/0x320 [ 572.505496][T20375] ? set_qf_name+0x230/0x230 [ 572.510083][T20375] ext4_alloc_inode+0x27/0x300 [ 572.514919][T20375] ? set_qf_name+0x230/0x230 [ 572.519518][T20375] new_inode_pseudo+0x38/0x190 [ 572.524280][T20375] new_inode+0x21/0x100 [ 572.528504][T20375] __ext4_new_inode+0x13f/0x2fc0 [ 572.533483][T20375] ? avc_has_perm+0xd5/0x160 [ 572.538076][T20375] ext4_mkdir+0x28a/0x760 [ 572.542405][T20375] vfs_mkdir+0x2c8/0x3d0 [ 572.546677][T20375] do_mkdirat+0x12e/0x2c0 [ 572.551008][T20375] __x64_sys_mkdir+0x40/0x50 [ 572.555697][T20375] do_syscall_64+0x44/0xd0 [ 572.560111][T20375] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 572.565999][T20375] RIP: 0033:0x7f7ca8c2fc07 [ 572.570558][T20375] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 572.590160][T20375] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 572.598574][T20375] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c2fc07 [ 572.606543][T20375] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 572.614585][T20375] RBP: 00007f7ca83a7040 R08: 0000000000000000 R09: ffffffffffffffff 22:16:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 46) [ 572.622555][T20375] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 572.630519][T20375] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 572.638564][T20375] 22:16:40 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x200020, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 572.793321][T20380] loop4: detected capacity change from 0 to 5 [ 572.812826][T20382] FAULT_INJECTION: forcing a failure. [ 572.812826][T20382] name failslab, interval 1, probability 0, space 0, times 0 [ 572.825529][T20382] CPU: 1 PID: 20382 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 572.834295][T20382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.844340][T20382] Call Trace: [ 572.847614][T20382] [ 572.850550][T20382] dump_stack_lvl+0xd6/0x122 [ 572.855238][T20382] dump_stack+0x11/0x1b [ 572.859499][T20382] should_fail+0x23c/0x250 [ 572.863906][T20382] __should_failslab+0x81/0x90 [ 572.868668][T20382] should_failslab+0x5/0x20 [ 572.873198][T20382] kmem_cache_alloc_node_trace+0x61/0x310 [ 572.878957][T20382] ? __kmalloc_node_track_caller+0x30/0x40 [ 572.884867][T20382] __kmalloc_node_track_caller+0x30/0x40 [ 572.890498][T20382] ? alloc_uevent_skb+0x5b/0x120 [ 572.895521][T20382] __alloc_skb+0x19d/0x450 [ 572.899939][T20382] alloc_uevent_skb+0x5b/0x120 [ 572.904706][T20382] kobject_uevent_env+0x863/0xc40 [ 572.909805][T20382] ? preempt_count_add+0x4e/0x90 [ 572.914753][T20382] ? _raw_spin_unlock+0x2e/0x50 [ 572.919595][T20382] ? bd_prepare_to_claim+0x1ac/0x200 [ 572.924970][T20382] disk_force_media_change+0xe3/0x170 [ 572.930341][T20382] loop_configure+0x74d/0xf30 [ 572.935012][T20382] lo_ioctl+0x583/0x1270 [ 572.939280][T20382] ? __rcu_read_unlock+0x5c/0x290 [ 572.944310][T20382] ? blkdev_common_ioctl+0x438/0x1180 [ 572.949685][T20382] ? selinux_file_ioctl+0x522/0x590 [ 572.954952][T20382] ? do_vfs_ioctl+0x819/0x14a0 [ 572.959756][T20382] ? lo_release+0x120/0x120 [ 572.964285][T20382] blkdev_ioctl+0x20e/0x440 [ 572.968840][T20382] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 572.974324][T20382] __se_sys_ioctl+0xcb/0x140 [ 572.978984][T20382] __x64_sys_ioctl+0x3f/0x50 [ 572.983608][T20382] do_syscall_64+0x44/0xd0 [ 572.988029][T20382] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 572.994379][T20382] RIP: 0033:0x7fa83371b8b7 [ 572.998787][T20382] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 573.018490][T20382] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 573.026902][T20382] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 573.034872][T20382] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 573.042878][T20382] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 573.050841][T20382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 573.058806][T20382] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 573.066774][T20382] [ 573.073182][T20382] loop0: detected capacity change from 0 to 6 [ 573.079401][T20380] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 573.091190][T20382] FAT-fs (loop0): Directory bread(block 6) failed [ 573.110080][T20384] loop2: detected capacity change from 0 to 264192 [ 573.127097][T20384] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 573.136485][T20384] EXT4-fs (loop2): group descriptors corrupted! 22:16:41 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 24) [ 573.143116][T20385] loop3: detected capacity change from 0 to 6 [ 573.155421][T20380] loop4: detected capacity change from 0 to 5 [ 573.164935][T20380] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 573.176069][T20385] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x402, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 573.190556][T20384] loop2: detected capacity change from 0 to 264192 [ 573.197762][T20384] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 573.206982][T20384] EXT4-fs (loop2): group descriptors corrupted! [ 573.226621][T20388] loop5: detected capacity change from 0 to 4096 [ 573.234883][T20388] FAULT_INJECTION: forcing a failure. [ 573.234883][T20388] name failslab, interval 1, probability 0, space 0, times 0 [ 573.247585][T20388] CPU: 0 PID: 20388 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 573.256380][T20388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.266437][T20388] Call Trace: [ 573.269763][T20388] [ 573.272683][T20388] dump_stack_lvl+0xd6/0x122 [ 573.277837][T20388] dump_stack+0x11/0x1b [ 573.282000][T20388] should_fail+0x23c/0x250 [ 573.286439][T20388] ? jbd2__journal_start+0xf7/0x3f0 [ 573.291635][T20388] __should_failslab+0x81/0x90 [ 573.296398][T20388] should_failslab+0x5/0x20 [ 573.300905][T20388] kmem_cache_alloc+0x4f/0x320 [ 573.305686][T20388] ? find_group_orlov+0x52d/0x840 [ 573.310710][T20388] jbd2__journal_start+0xf7/0x3f0 [ 573.315734][T20388] __ext4_journal_start_sb+0x159/0x310 [ 573.321199][T20388] __ext4_new_inode+0xd95/0x2fc0 [ 573.326139][T20388] ext4_mkdir+0x28a/0x760 [ 573.330482][T20388] vfs_mkdir+0x2c8/0x3d0 [ 573.334724][T20388] do_mkdirat+0x12e/0x2c0 [ 573.339068][T20388] __x64_sys_mkdir+0x40/0x50 [ 573.343687][T20388] do_syscall_64+0x44/0xd0 [ 573.348107][T20388] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 573.353999][T20388] RIP: 0033:0x7f7ca8c2fc07 [ 573.358406][T20388] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 573.378014][T20388] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 573.386437][T20388] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c2fc07 22:16:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 573.394414][T20388] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 573.402390][T20388] RBP: 00007f7ca83a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 573.410367][T20388] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 573.418327][T20388] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 573.426313][T20388] [ 573.429487][T20388] EXT4-fs error (device sda1) in __ext4_new_inode:1085: Out of memory 22:16:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 47) [ 573.441248][T20385] loop3: detected capacity change from 0 to 6 [ 573.448397][T20385] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 573.495520][T20392] FAULT_INJECTION: forcing a failure. [ 573.495520][T20392] name failslab, interval 1, probability 0, space 0, times 0 [ 573.508179][T20392] CPU: 0 PID: 20392 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 573.516944][T20392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.526999][T20392] Call Trace: [ 573.530278][T20392] [ 573.533390][T20392] dump_stack_lvl+0xd6/0x122 [ 573.538295][T20392] dump_stack+0x11/0x1b [ 573.542669][T20392] should_fail+0x23c/0x250 [ 573.547142][T20392] ? skb_clone+0x12c/0x1f0 [ 573.551715][T20392] __should_failslab+0x81/0x90 [ 573.556660][T20392] should_failslab+0x5/0x20 [ 573.561330][T20392] kmem_cache_alloc+0x4f/0x320 [ 573.566312][T20392] skb_clone+0x12c/0x1f0 [ 573.570562][T20392] netlink_broadcast+0x4e9/0xad0 [ 573.575533][T20392] kobject_uevent_env+0x8c9/0xc40 [ 573.580565][T20392] ? preempt_count_add+0x4e/0x90 [ 573.585639][T20392] ? _raw_spin_unlock+0x2e/0x50 [ 573.590538][T20392] ? bd_prepare_to_claim+0x1ac/0x200 [ 573.596149][T20392] disk_force_media_change+0xe3/0x170 [ 573.601536][T20392] loop_configure+0x74d/0xf30 [ 573.606206][T20392] lo_ioctl+0x583/0x1270 [ 573.610430][T20392] ? __rcu_read_unlock+0x5c/0x290 [ 573.615638][T20392] ? blkdev_common_ioctl+0x438/0x1180 [ 573.621001][T20392] ? selinux_file_ioctl+0x522/0x590 [ 573.626229][T20392] ? do_vfs_ioctl+0x819/0x14a0 [ 573.631000][T20392] ? lo_release+0x120/0x120 [ 573.635488][T20392] blkdev_ioctl+0x20e/0x440 [ 573.639979][T20392] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 573.645429][T20392] __se_sys_ioctl+0xcb/0x140 [ 573.650088][T20392] __x64_sys_ioctl+0x3f/0x50 [ 573.654705][T20392] do_syscall_64+0x44/0xd0 [ 573.659101][T20392] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 573.665020][T20392] RIP: 0033:0x7fa83371b8b7 [ 573.669519][T20392] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 573.689228][T20392] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 573.697816][T20392] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 573.705785][T20392] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 573.713767][T20392] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 573.721814][T20392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 573.729767][T20392] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 573.738270][T20392] [ 573.742682][T20393] loop4: detected capacity change from 0 to 5 [ 573.743231][T20392] loop0: detected capacity change from 0 to 6 [ 573.749005][T20396] loop2: detected capacity change from 0 to 264192 [ 573.755978][T20392] FAT-fs (loop0): Directory bread(block 6) failed [ 573.767760][T20397] loop5: detected capacity change from 0 to 4096 [ 573.768034][T20397] FAULT_INJECTION: forcing a failure. [ 573.768034][T20397] name failslab, interval 1, probability 0, space 0, times 0 [ 573.786895][T20397] CPU: 1 PID: 20397 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 573.795659][T20397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.805791][T20397] Call Trace: [ 573.809067][T20397] [ 573.812035][T20397] dump_stack_lvl+0xd6/0x122 [ 573.816698][T20397] dump_stack+0x11/0x1b [ 573.820853][T20397] should_fail+0x23c/0x250 [ 573.825263][T20397] ? sidtab_sid2str_get+0xb0/0x140 [ 573.830447][T20397] __should_failslab+0x81/0x90 [ 573.835234][T20397] should_failslab+0x5/0x20 [ 573.839734][T20397] __kmalloc_track_caller+0x6d/0x370 [ 573.845021][T20397] kmemdup+0x21/0x50 [ 573.848915][T20397] sidtab_sid2str_get+0xb0/0x140 [ 573.853934][T20397] security_sid_to_context_core+0x1d0/0x2d0 [ 573.859829][T20397] security_sid_to_context_force+0x2f/0x40 [ 573.865648][T20397] selinux_inode_init_security+0x4e4/0x590 [ 573.871461][T20397] security_inode_init_security+0xe4/0x260 [ 573.877327][T20397] ? ext4_init_security+0x40/0x40 [ 573.882410][T20397] ext4_init_security+0x30/0x40 [ 573.887347][T20397] __ext4_new_inode+0x29a3/0x2fc0 [ 573.892374][T20397] ext4_mkdir+0x28a/0x760 [ 573.896708][T20397] vfs_mkdir+0x2c8/0x3d0 [ 573.900947][T20397] do_mkdirat+0x12e/0x2c0 [ 573.905276][T20397] __x64_sys_mkdir+0x40/0x50 [ 573.909875][T20397] do_syscall_64+0x44/0xd0 [ 573.914389][T20397] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 573.920287][T20397] RIP: 0033:0x7f7ca8c2fc07 [ 573.924690][T20397] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:16:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 573.944356][T20397] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 573.952771][T20397] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c2fc07 [ 573.960805][T20397] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 573.968878][T20397] RBP: 00007f7ca83a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 573.976939][T20397] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 573.984903][T20397] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 573.992876][T20397] 22:16:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 48) 22:16:42 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 25) [ 574.003924][T20393] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 574.014593][T20396] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 574.023962][T20396] EXT4-fs (loop2): group descriptors corrupted! 22:16:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x406, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 574.079728][T20393] loop4: detected capacity change from 0 to 5 [ 574.082655][T20396] loop2: detected capacity change from 0 to 264192 [ 574.094314][T20393] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 574.094847][T20396] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 574.113804][T20396] EXT4-fs (loop2): group descriptors corrupted! 22:16:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 574.187789][T20403] loop3: detected capacity change from 0 to 7 [ 574.204676][T20404] FAULT_INJECTION: forcing a failure. [ 574.204676][T20404] name failslab, interval 1, probability 0, space 0, times 0 [ 574.217311][T20404] CPU: 0 PID: 20404 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 574.226117][T20404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 574.236258][T20404] Call Trace: [ 574.239529][T20404] [ 574.242449][T20404] dump_stack_lvl+0xd6/0x122 [ 574.247102][T20404] dump_stack+0x11/0x1b [ 574.251411][T20404] should_fail+0x23c/0x250 [ 574.255825][T20404] ? __kernfs_new_node+0x6a/0x340 [ 574.260910][T20404] __should_failslab+0x81/0x90 [ 574.265727][T20404] should_failslab+0x5/0x20 [ 574.270270][T20404] kmem_cache_alloc+0x4f/0x320 [ 574.275055][T20404] __kernfs_new_node+0x6a/0x340 [ 574.279910][T20404] ? ___cache_free+0x46/0x300 [ 574.284591][T20404] ? kmem_cache_free+0x65/0x110 [ 574.287760][T20403] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 574.289469][T20404] ? kfree+0xf8/0x1f0 [ 574.289491][T20404] kernfs_create_dir_ns+0x5e/0x140 [ 574.309124][T20404] internal_create_group+0x13e/0x840 [ 574.314415][T20404] sysfs_create_group+0x1b/0x20 [ 574.319271][T20404] loop_configure+0xc58/0xf30 [ 574.323954][T20404] lo_ioctl+0x583/0x1270 [ 574.328189][T20404] ? __rcu_read_unlock+0x5c/0x290 [ 574.333215][T20404] ? blkdev_common_ioctl+0x438/0x1180 [ 574.338590][T20404] ? selinux_file_ioctl+0x522/0x590 [ 574.343879][T20404] ? do_vfs_ioctl+0x819/0x14a0 [ 574.348647][T20404] ? lo_release+0x120/0x120 [ 574.353141][T20404] blkdev_ioctl+0x20e/0x440 [ 574.357642][T20404] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 574.363145][T20404] __se_sys_ioctl+0xcb/0x140 [ 574.367740][T20404] __x64_sys_ioctl+0x3f/0x50 [ 574.372463][T20404] do_syscall_64+0x44/0xd0 [ 574.376915][T20404] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 574.382839][T20404] RIP: 0033:0x7fa83371b8b7 [ 574.387251][T20404] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 574.406964][T20404] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 574.415374][T20404] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 574.423337][T20404] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 574.431305][T20404] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 574.439269][T20404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 574.447281][T20404] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 574.455409][T20404] [ 574.458659][T20404] loop0: detected capacity change from 0 to 6 [ 574.475587][T20404] FAT-fs (loop0): Directory bread(block 6) failed [ 574.483403][T20403] loop3: detected capacity change from 0 to 7 [ 574.491949][T20408] loop5: detected capacity change from 0 to 4096 [ 574.493053][T20403] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 574.507793][T20408] FAULT_INJECTION: forcing a failure. [ 574.507793][T20408] name failslab, interval 1, probability 0, space 0, times 0 [ 574.521177][T20408] CPU: 0 PID: 20408 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 574.529962][T20408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 574.540049][T20408] Call Trace: [ 574.543329][T20408] [ 574.546255][T20408] dump_stack_lvl+0xd6/0x122 [ 574.550856][T20408] dump_stack+0x11/0x1b [ 574.555014][T20408] should_fail+0x23c/0x250 [ 574.559475][T20408] ? sidtab_sid2str_get+0xb0/0x140 [ 574.564586][T20408] __should_failslab+0x81/0x90 [ 574.569361][T20408] should_failslab+0x5/0x20 [ 574.573946][T20408] __kmalloc_track_caller+0x6d/0x370 [ 574.579231][T20408] kmemdup+0x21/0x50 [ 574.583129][T20408] sidtab_sid2str_get+0xb0/0x140 [ 574.588068][T20408] security_sid_to_context_core+0x1d0/0x2d0 [ 574.593974][T20408] security_sid_to_context_force+0x2f/0x40 [ 574.599854][T20408] selinux_inode_init_security+0x4e4/0x590 [ 574.605717][T20408] security_inode_init_security+0xe4/0x260 [ 574.611584][T20408] ? ext4_init_security+0x40/0x40 [ 574.616723][T20408] ext4_init_security+0x30/0x40 [ 574.621579][T20408] __ext4_new_inode+0x29a3/0x2fc0 [ 574.626609][T20408] ext4_mkdir+0x28a/0x760 [ 574.630940][T20408] vfs_mkdir+0x2c8/0x3d0 [ 574.635197][T20408] do_mkdirat+0x12e/0x2c0 [ 574.639532][T20408] __x64_sys_mkdir+0x40/0x50 [ 574.644120][T20408] do_syscall_64+0x44/0xd0 [ 574.648680][T20408] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 574.654572][T20408] RIP: 0033:0x7f7ca8c2fc07 [ 574.658985][T20408] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 574.678593][T20408] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 22:16:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:43 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x300000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:16:43 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 26) [ 574.687012][T20408] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c2fc07 [ 574.694987][T20408] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 574.702955][T20408] RBP: 00007f7ca83a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 574.710995][T20408] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 574.718969][T20408] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 574.726951][T20408] 22:16:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 49) [ 574.853037][T20411] loop4: detected capacity change from 0 to 5 [ 574.862875][T20412] loop2: detected capacity change from 0 to 264192 [ 574.870967][T20411] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 574.885335][T20412] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 574.894673][T20412] EXT4-fs (loop2): group descriptors corrupted! [ 574.919988][T20411] loop4: detected capacity change from 0 to 5 [ 574.927087][T20411] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 574.938861][T20412] loop2: detected capacity change from 0 to 264192 [ 574.945940][T20412] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 574.955200][T20412] EXT4-fs (loop2): group descriptors corrupted! [ 574.962145][T20418] loop3: detected capacity change from 0 to 7 [ 574.968764][T20419] loop5: detected capacity change from 0 to 4096 [ 574.978709][T20419] FAULT_INJECTION: forcing a failure. [ 574.978709][T20419] name failslab, interval 1, probability 0, space 0, times 0 [ 574.991354][T20419] CPU: 0 PID: 20419 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 575.000196][T20419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.010366][T20419] Call Trace: [ 575.013636][T20419] [ 575.016766][T20419] dump_stack_lvl+0xd6/0x122 [ 575.021351][T20419] dump_stack+0x11/0x1b [ 575.025526][T20419] should_fail+0x23c/0x250 [ 575.029962][T20419] ? __es_insert_extent+0x546/0xe80 [ 575.035170][T20419] __should_failslab+0x81/0x90 [ 575.039922][T20419] should_failslab+0x5/0x20 [ 575.044493][T20419] kmem_cache_alloc+0x4f/0x320 [ 575.049254][T20419] ? delay_tsc+0x96/0xe0 [ 575.053491][T20419] __es_insert_extent+0x546/0xe80 [ 575.058509][T20419] ext4_es_insert_extent+0x1cb/0x19c0 [ 575.063871][T20419] ext4_ext_map_blocks+0xff7/0x2120 [ 575.069067][T20419] ? jbd2_journal_dirty_metadata+0x218/0x690 [ 575.075048][T20419] ext4_map_blocks+0x1cf/0xf00 [ 575.079798][T20419] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 575.085466][T20419] ext4_getblk+0xc6/0x3e0 [ 575.089795][T20419] ext4_bread+0x28/0x100 [ 575.094058][T20419] ext4_append+0xd1/0x1c0 [ 575.098463][T20419] ext4_init_new_dir+0x177/0x500 [ 575.103385][T20419] ext4_mkdir+0x329/0x760 [ 575.107804][T20419] vfs_mkdir+0x2c8/0x3d0 [ 575.112098][T20419] do_mkdirat+0x12e/0x2c0 [ 575.116422][T20419] __x64_sys_mkdir+0x40/0x50 [ 575.121051][T20419] do_syscall_64+0x44/0xd0 [ 575.125454][T20419] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 575.131351][T20419] RIP: 0033:0x7f7ca8c2fc07 [ 575.135753][T20419] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 575.155346][T20419] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 575.163746][T20419] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c2fc07 [ 575.171705][T20419] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 575.179708][T20419] RBP: 00007f7ca83a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 575.187740][T20419] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 575.195702][T20419] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 575.203715][T20419] [ 575.210270][T20417] FAULT_INJECTION: forcing a failure. [ 575.210270][T20417] name failslab, interval 1, probability 0, space 0, times 0 [ 575.223011][T20417] CPU: 1 PID: 20417 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 575.231817][T20417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.241934][T20417] Call Trace: [ 575.245206][T20417] [ 575.248202][T20417] dump_stack_lvl+0xd6/0x122 [ 575.252802][T20417] dump_stack+0x11/0x1b [ 575.257043][T20417] should_fail+0x23c/0x250 [ 575.261469][T20417] ? __kernfs_new_node+0x6a/0x340 [ 575.266551][T20417] __should_failslab+0x81/0x90 [ 575.271388][T20417] should_failslab+0x5/0x20 [ 575.275900][T20417] kmem_cache_alloc+0x4f/0x320 [ 575.280797][T20417] __kernfs_new_node+0x6a/0x340 [ 575.285701][T20417] ? __down_write_common+0x42/0x7b0 [ 575.291073][T20417] ? idr_alloc_cyclic+0x26b/0x2f0 [ 575.296097][T20417] ? __down_write_common+0x42/0x7b0 [ 575.301338][T20417] ? rb_insert_color+0x7e/0x310 [ 575.306209][T20417] kernfs_new_node+0x5b/0xd0 [ 575.310807][T20417] __kernfs_create_file+0x45/0x1a0 [ 575.316028][T20417] ? dev_attr_show+0x90/0x90 [ 575.320662][T20417] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 575.326093][T20417] internal_create_group+0x2dd/0x840 [ 575.331387][T20417] sysfs_create_group+0x1b/0x20 [ 575.336318][T20417] loop_configure+0xc58/0xf30 [ 575.341127][T20417] lo_ioctl+0x583/0x1270 [ 575.345362][T20417] ? __rcu_read_unlock+0x5c/0x290 [ 575.350389][T20417] ? blkdev_common_ioctl+0x438/0x1180 [ 575.355785][T20417] ? selinux_file_ioctl+0x522/0x590 [ 575.360999][T20417] ? do_vfs_ioctl+0x819/0x14a0 [ 575.365801][T20417] ? lo_release+0x120/0x120 [ 575.370304][T20417] blkdev_ioctl+0x20e/0x440 [ 575.374861][T20417] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 575.380322][T20417] __se_sys_ioctl+0xcb/0x140 [ 575.384911][T20417] __x64_sys_ioctl+0x3f/0x50 [ 575.389499][T20417] do_syscall_64+0x44/0xd0 [ 575.393932][T20417] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 575.400008][T20417] RIP: 0033:0x7fa83371b8b7 [ 575.404420][T20417] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 575.424120][T20417] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 575.432532][T20417] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 575.440540][T20417] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 575.448502][T20417] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 575.456469][T20417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 575.464435][T20417] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 22:16:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 575.472410][T20417] [ 575.480475][T20417] loop0: detected capacity change from 0 to 6 [ 575.494177][T20419] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 575.494312][T20417] FAT-fs (loop0): Directory bread(block 6) failed [ 575.503470][T20419] EXT4-fs (loop5): group descriptors corrupted! [ 575.517966][T20418] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 50) 22:16:43 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 27) 22:16:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 575.578955][T20418] loop3: detected capacity change from 0 to 7 [ 575.585588][T20418] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:43 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x400000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 575.658701][T20426] loop4: detected capacity change from 0 to 5 [ 575.659561][T20425] loop2: detected capacity change from 0 to 264192 [ 575.681345][T20425] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 575.681537][T20426] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 575.690712][T20425] EXT4-fs (loop2): group descriptors corrupted! [ 575.729059][T20425] loop2: detected capacity change from 0 to 264192 [ 575.741060][T20425] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 575.750340][T20425] EXT4-fs (loop2): group descriptors corrupted! [ 575.761592][T20426] loop4: detected capacity change from 0 to 5 [ 575.768456][T20426] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 575.816578][T20434] loop5: detected capacity change from 0 to 4096 [ 575.823313][T20434] FAULT_INJECTION: forcing a failure. [ 575.823313][T20434] name failslab, interval 1, probability 0, space 0, times 0 [ 575.835970][T20434] CPU: 0 PID: 20434 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 575.844793][T20434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.854841][T20434] Call Trace: [ 575.858111][T20434] [ 575.861043][T20434] dump_stack_lvl+0xd6/0x122 [ 575.865639][T20434] dump_stack+0x11/0x1b [ 575.869828][T20434] should_fail+0x23c/0x250 [ 575.874241][T20434] ? kcalloc+0x32/0x50 [ 575.878331][T20434] __should_failslab+0x81/0x90 [ 575.883142][T20434] should_failslab+0x5/0x20 [ 575.887649][T20434] __kmalloc+0x6f/0x370 [ 575.891874][T20434] kcalloc+0x32/0x50 [ 575.895777][T20434] ext4_find_extent+0x19f/0x7e0 [ 575.900741][T20434] ? kfree+0xf8/0x1f0 [ 575.904780][T20434] ext4_ext_map_blocks+0x115/0x2120 [ 575.909981][T20434] ? jbd2_journal_dirty_metadata+0x1a5/0x690 [ 575.915985][T20434] ext4_map_blocks+0x71e/0xf00 [ 575.920786][T20434] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 575.926428][T20434] ext4_getblk+0xc6/0x3e0 [ 575.930764][T20434] ext4_bread+0x28/0x100 [ 575.935045][T20434] ext4_append+0xd1/0x1c0 [ 575.939549][T20434] ext4_init_new_dir+0x177/0x500 [ 575.944481][T20434] ext4_mkdir+0x329/0x760 [ 575.948865][T20434] vfs_mkdir+0x2c8/0x3d0 [ 575.953106][T20434] do_mkdirat+0x12e/0x2c0 [ 575.957536][T20434] __x64_sys_mkdir+0x40/0x50 [ 575.962159][T20434] do_syscall_64+0x44/0xd0 [ 575.966747][T20434] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 575.972664][T20434] RIP: 0033:0x7f7ca8c2fc07 [ 575.977080][T20434] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 575.996772][T20434] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 575.999292][T20433] FAULT_INJECTION: forcing a failure. [ 575.999292][T20433] name failslab, interval 1, probability 0, space 0, times 0 [ 576.005185][T20434] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c2fc07 [ 576.025763][T20434] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 576.033726][T20434] RBP: 00007f7ca83a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 576.041794][T20434] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 576.049751][T20434] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 576.057711][T20434] [ 576.060748][T20433] CPU: 1 PID: 20433 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 576.069530][T20433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 576.079625][T20433] Call Trace: [ 576.082901][T20433] [ 576.085826][T20433] dump_stack_lvl+0xd6/0x122 [ 576.090620][T20433] dump_stack+0x11/0x1b [ 576.094774][T20433] should_fail+0x23c/0x250 [ 576.099187][T20433] ? __kernfs_new_node+0x6a/0x340 [ 576.104315][T20433] __should_failslab+0x81/0x90 [ 576.109084][T20433] should_failslab+0x5/0x20 [ 576.113594][T20433] kmem_cache_alloc+0x4f/0x320 [ 576.118357][T20433] ? __down_write_common+0x42/0x7b0 [ 576.123637][T20433] __kernfs_new_node+0x6a/0x340 [ 576.128493][T20433] ? up_write+0x25/0xc0 [ 576.132719][T20433] kernfs_new_node+0x5b/0xd0 [ 576.137313][T20433] __kernfs_create_file+0x45/0x1a0 [ 576.142475][T20433] ? dev_attr_show+0x90/0x90 [ 576.147109][T20433] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 576.152485][T20433] internal_create_group+0x2dd/0x840 [ 576.157825][T20433] sysfs_create_group+0x1b/0x20 [ 576.162712][T20433] loop_configure+0xc58/0xf30 [ 576.167401][T20433] lo_ioctl+0x583/0x1270 [ 576.171645][T20433] ? __rcu_read_unlock+0x5c/0x290 [ 576.176677][T20433] ? blkdev_common_ioctl+0x438/0x1180 [ 576.182130][T20433] ? selinux_file_ioctl+0x522/0x590 [ 576.187330][T20433] ? do_vfs_ioctl+0x819/0x14a0 [ 576.192117][T20433] ? lo_release+0x120/0x120 [ 576.196633][T20433] blkdev_ioctl+0x20e/0x440 [ 576.201377][T20433] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 576.206982][T20433] __se_sys_ioctl+0xcb/0x140 [ 576.211570][T20433] __x64_sys_ioctl+0x3f/0x50 [ 576.216161][T20433] do_syscall_64+0x44/0xd0 [ 576.220577][T20433] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 576.226527][T20433] RIP: 0033:0x7fa83371b8b7 [ 576.230936][T20433] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 576.250545][T20433] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 576.259082][T20433] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 576.267050][T20433] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 576.275040][T20433] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 576.283008][T20433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 576.290969][T20433] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 576.298964][T20433] [ 576.310429][T20433] loop0: detected capacity change from 0 to 6 22:16:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x59d, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 51) [ 576.316858][T20435] loop3: detected capacity change from 0 to 8 [ 576.325089][T20433] FAT-fs (loop0): Directory bread(block 6) failed [ 576.342592][T20435] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:44 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 28) [ 576.368844][T20435] loop3: detected capacity change from 0 to 8 [ 576.376090][T20435] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1100, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 576.471854][T20441] loop2: detected capacity change from 0 to 264192 [ 576.491136][T20441] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 576.500624][T20441] EXT4-fs (loop2): group descriptors corrupted! [ 576.519760][T20443] loop5: detected capacity change from 0 to 4096 [ 576.519926][T20444] loop4: detected capacity change from 0 to 5 [ 576.534454][T20443] FAULT_INJECTION: forcing a failure. [ 576.534454][T20443] name failslab, interval 1, probability 0, space 0, times 0 [ 576.547138][T20443] CPU: 1 PID: 20443 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 576.555922][T20443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 576.566228][T20443] Call Trace: [ 576.569495][T20443] [ 576.572420][T20443] dump_stack_lvl+0xd6/0x122 [ 576.577021][T20443] dump_stack+0x11/0x1b [ 576.581177][T20443] should_fail+0x23c/0x250 [ 576.585652][T20443] ? kcalloc+0x32/0x50 [ 576.589729][T20443] __should_failslab+0x81/0x90 [ 576.594494][T20443] should_failslab+0x5/0x20 [ 576.598991][T20443] __kmalloc+0x6f/0x370 [ 576.603197][T20443] kcalloc+0x32/0x50 [ 576.607093][T20443] ext4_find_extent+0x19f/0x7e0 [ 576.611967][T20443] ? kfree+0xf8/0x1f0 [ 576.615958][T20443] ext4_ext_map_blocks+0x115/0x2120 [ 576.621192][T20443] ? jbd2_journal_dirty_metadata+0x1a5/0x690 [ 576.627203][T20443] ext4_map_blocks+0x71e/0xf00 [ 576.631978][T20443] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 576.637713][T20443] ext4_getblk+0xc6/0x3e0 [ 576.642154][T20443] ext4_bread+0x28/0x100 [ 576.646393][T20443] ext4_append+0xd1/0x1c0 [ 576.650716][T20443] ext4_init_new_dir+0x177/0x500 [ 576.655650][T20443] ext4_mkdir+0x329/0x760 [ 576.659992][T20443] vfs_mkdir+0x2c8/0x3d0 [ 576.664245][T20443] do_mkdirat+0x12e/0x2c0 [ 576.668643][T20443] __x64_sys_mkdir+0x40/0x50 [ 576.673236][T20443] do_syscall_64+0x44/0xd0 [ 576.677682][T20443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 576.683648][T20443] RIP: 0033:0x7f7ca8c2fc07 [ 576.688066][T20443] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 576.707816][T20443] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 576.716240][T20443] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c2fc07 [ 576.724216][T20443] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 576.732181][T20443] RBP: 00007f7ca83a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 576.740180][T20443] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 576.748164][T20443] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 576.756132][T20443] 22:16:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 576.767655][T20441] loop2: detected capacity change from 0 to 264192 [ 576.775215][T20441] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 576.784535][T20441] EXT4-fs (loop2): group descriptors corrupted! [ 576.795723][T20444] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 576.828341][T20447] FAULT_INJECTION: forcing a failure. [ 576.828341][T20447] name failslab, interval 1, probability 0, space 0, times 0 [ 576.840996][T20447] CPU: 1 PID: 20447 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 576.849756][T20447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 576.859850][T20447] Call Trace: [ 576.863171][T20447] [ 576.866096][T20447] dump_stack_lvl+0xd6/0x122 [ 576.870709][T20447] dump_stack+0x11/0x1b [ 576.874891][T20447] should_fail+0x23c/0x250 [ 576.879307][T20447] ? __kernfs_new_node+0x6a/0x340 [ 576.884350][T20447] __should_failslab+0x81/0x90 [ 576.889110][T20447] should_failslab+0x5/0x20 [ 576.893696][T20447] kmem_cache_alloc+0x4f/0x320 [ 576.898528][T20447] ? __down_write_common+0x42/0x7b0 [ 576.903728][T20447] __kernfs_new_node+0x6a/0x340 [ 576.908651][T20447] ? up_write+0x25/0xc0 [ 576.912877][T20447] kernfs_new_node+0x5b/0xd0 [ 576.917485][T20447] __kernfs_create_file+0x45/0x1a0 [ 576.922614][T20447] ? dev_attr_show+0x90/0x90 [ 576.927382][T20447] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 576.932763][T20447] internal_create_group+0x2dd/0x840 [ 576.938159][T20447] sysfs_create_group+0x1b/0x20 [ 576.943012][T20447] loop_configure+0xc58/0xf30 [ 576.947695][T20447] lo_ioctl+0x583/0x1270 [ 576.951939][T20447] ? __rcu_read_unlock+0x5c/0x290 [ 576.957020][T20447] ? blkdev_common_ioctl+0x438/0x1180 [ 576.962389][T20447] ? selinux_file_ioctl+0x522/0x590 [ 576.967740][T20447] ? do_vfs_ioctl+0x819/0x14a0 [ 576.972509][T20447] ? lo_release+0x120/0x120 [ 576.977007][T20447] blkdev_ioctl+0x20e/0x440 [ 576.981511][T20447] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 576.987008][T20447] __se_sys_ioctl+0xcb/0x140 [ 576.991656][T20447] __x64_sys_ioctl+0x3f/0x50 [ 576.996305][T20447] do_syscall_64+0x44/0xd0 [ 577.000723][T20447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 577.006658][T20447] RIP: 0033:0x7fa83371b8b7 [ 577.011127][T20447] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 577.030735][T20447] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 577.039244][T20447] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 577.047209][T20447] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 577.055176][T20447] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 577.063178][T20447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 577.071187][T20447] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 22:16:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 52) 22:16:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5c3, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:45 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 29) [ 577.079162][T20447] [ 577.086496][T20447] loop0: detected capacity change from 0 to 6 [ 577.087331][T20444] loop4: detected capacity change from 0 to 5 [ 577.094829][T20447] FAT-fs (loop0): Directory bread(block 6) failed [ 577.106742][T20444] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:45 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x500000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 577.207919][T20449] loop3: detected capacity change from 0 to 8 [ 577.225715][T20449] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 577.280513][T20449] loop3: detected capacity change from 0 to 8 [ 577.287624][T20449] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 577.318236][T20456] loop5: detected capacity change from 0 to 4096 [ 577.326489][T20456] FAULT_INJECTION: forcing a failure. [ 577.326489][T20456] name failslab, interval 1, probability 0, space 0, times 0 [ 577.339167][T20456] CPU: 1 PID: 20456 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 577.347930][T20456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 577.357989][T20456] Call Trace: [ 577.361263][T20456] [ 577.364231][T20456] dump_stack_lvl+0xd6/0x122 [ 577.368857][T20456] dump_stack+0x11/0x1b [ 577.373013][T20456] should_fail+0x23c/0x250 [ 577.377505][T20456] ? ext4_mb_new_blocks+0x73e/0x1ee0 [ 577.382801][T20456] __should_failslab+0x81/0x90 [ 577.387609][T20456] should_failslab+0x5/0x20 [ 577.392112][T20456] kmem_cache_alloc+0x4f/0x320 [ 577.396873][T20456] ext4_mb_new_blocks+0x73e/0x1ee0 [ 577.401992][T20456] ? kcalloc+0x32/0x50 [ 577.406180][T20456] ? ext4_find_extent+0x6d7/0x7e0 [ 577.411288][T20456] ? ext4_ext_search_right+0x301/0x4f0 [ 577.416785][T20456] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 577.422522][T20456] ext4_ext_map_blocks+0x1658/0x2120 [ 577.427946][T20456] ext4_map_blocks+0x71e/0xf00 [ 577.432712][T20456] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 577.438339][T20456] ext4_getblk+0xc6/0x3e0 [ 577.442731][T20456] ext4_bread+0x28/0x100 [ 577.446969][T20456] ext4_append+0xd1/0x1c0 [ 577.451329][T20456] ext4_init_new_dir+0x177/0x500 [ 577.456261][T20456] ext4_mkdir+0x329/0x760 [ 577.460588][T20456] vfs_mkdir+0x2c8/0x3d0 [ 577.464866][T20456] do_mkdirat+0x12e/0x2c0 [ 577.469266][T20456] __x64_sys_mkdir+0x40/0x50 [ 577.473910][T20456] do_syscall_64+0x44/0xd0 [ 577.478395][T20456] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 577.484326][T20456] RIP: 0033:0x7f7ca8c2fc07 [ 577.488737][T20456] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 577.508404][T20456] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 577.516857][T20456] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c2fc07 22:16:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1200, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 577.524821][T20456] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 577.532840][T20456] RBP: 00007f7ca83a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 577.540838][T20456] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 577.548894][T20456] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 577.556954][T20456] [ 577.564196][T20457] loop2: detected capacity change from 0 to 264192 22:16:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 53) [ 577.591843][T20457] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 577.601230][T20457] EXT4-fs (loop2): group descriptors corrupted! [ 577.612480][T20458] loop4: detected capacity change from 0 to 5 [ 577.638720][T20457] loop2: detected capacity change from 0 to 264192 [ 577.646007][T20457] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 577.655294][T20457] EXT4-fs (loop2): group descriptors corrupted! [ 577.664412][T20460] FAULT_INJECTION: forcing a failure. [ 577.664412][T20460] name failslab, interval 1, probability 0, space 0, times 0 [ 577.677093][T20460] CPU: 0 PID: 20460 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 577.685853][T20460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 577.695905][T20460] Call Trace: [ 577.699184][T20460] [ 577.702109][T20460] dump_stack_lvl+0xd6/0x122 [ 577.706707][T20460] dump_stack+0x11/0x1b [ 577.710864][T20460] should_fail+0x23c/0x250 [ 577.715371][T20460] ? __kernfs_new_node+0x6a/0x340 [ 577.720405][T20460] __should_failslab+0x81/0x90 [ 577.725341][T20460] should_failslab+0x5/0x20 [ 577.729865][T20460] kmem_cache_alloc+0x4f/0x320 [ 577.734714][T20460] ? __down_write_common+0x42/0x7b0 [ 577.739920][T20460] __kernfs_new_node+0x6a/0x340 [ 577.744808][T20460] ? up_write+0x25/0xc0 [ 577.748972][T20460] kernfs_new_node+0x5b/0xd0 [ 577.753701][T20460] __kernfs_create_file+0x45/0x1a0 [ 577.758951][T20460] ? dev_attr_show+0x90/0x90 [ 577.763556][T20460] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 577.768934][T20460] internal_create_group+0x2dd/0x840 [ 577.774211][T20460] sysfs_create_group+0x1b/0x20 [ 577.779083][T20460] loop_configure+0xc58/0xf30 [ 577.783750][T20460] lo_ioctl+0x583/0x1270 [ 577.787976][T20460] ? __rcu_read_unlock+0x5c/0x290 [ 577.793100][T20460] ? blkdev_common_ioctl+0x438/0x1180 [ 577.798539][T20460] ? selinux_file_ioctl+0x522/0x590 [ 577.803825][T20460] ? do_vfs_ioctl+0x819/0x14a0 [ 577.808632][T20460] ? lo_release+0x120/0x120 [ 577.813125][T20460] blkdev_ioctl+0x20e/0x440 [ 577.817631][T20460] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 577.823102][T20460] __se_sys_ioctl+0xcb/0x140 [ 577.827700][T20460] __x64_sys_ioctl+0x3f/0x50 [ 577.832339][T20460] do_syscall_64+0x44/0xd0 [ 577.836856][T20460] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 577.842803][T20460] RIP: 0033:0x7fa83371b8b7 [ 577.847202][T20460] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 577.866830][T20460] RSP: 002b:00007fa832e70f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 577.875274][T20460] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 577.883237][T20460] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 577.891239][T20460] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 577.899233][T20460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 577.907258][T20460] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 577.915233][T20460] [ 577.927601][T20458] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 577.942914][T20460] loop0: detected capacity change from 0 to 6 [ 577.959805][T20460] FAT-fs (loop0): Directory bread(block 6) failed [ 577.974453][T20466] loop3: detected capacity change from 0 to 9 [ 577.983322][T20458] loop4: detected capacity change from 0 to 5 [ 577.990702][T20458] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 578.001757][T20466] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 578.013039][T20469] loop5: detected capacity change from 0 to 4096 [ 578.025212][T20469] FAULT_INJECTION: forcing a failure. [ 578.025212][T20469] name failslab, interval 1, probability 0, space 0, times 0 22:16:46 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 30) [ 578.037959][T20469] CPU: 0 PID: 20469 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 578.046745][T20469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.056921][T20469] Call Trace: [ 578.060200][T20469] [ 578.063123][T20469] dump_stack_lvl+0xd6/0x122 [ 578.067774][T20469] dump_stack+0x11/0x1b [ 578.071929][T20469] should_fail+0x23c/0x250 [ 578.076417][T20469] ? __es_insert_extent+0x546/0xe80 [ 578.081647][T20469] __should_failslab+0x81/0x90 [ 578.086480][T20469] should_failslab+0x5/0x20 [ 578.091117][T20469] kmem_cache_alloc+0x4f/0x320 [ 578.095883][T20469] __es_insert_extent+0x546/0xe80 [ 578.100909][T20469] ? ext4_ext_map_blocks+0x1128/0x2120 [ 578.106380][T20469] ext4_es_insert_extent+0x1cb/0x19c0 [ 578.111780][T20469] ext4_map_blocks+0xa5d/0xf00 [ 578.116546][T20469] ext4_getblk+0xc6/0x3e0 [ 578.120878][T20469] ext4_bread+0x28/0x100 [ 578.125153][T20469] ext4_append+0xd1/0x1c0 [ 578.129549][T20469] ext4_init_new_dir+0x177/0x500 [ 578.134491][T20469] ext4_mkdir+0x329/0x760 [ 578.138849][T20469] vfs_mkdir+0x2c8/0x3d0 [ 578.143147][T20469] do_mkdirat+0x12e/0x2c0 [ 578.147474][T20469] __x64_sys_mkdir+0x40/0x50 [ 578.152089][T20469] do_syscall_64+0x44/0xd0 [ 578.156507][T20469] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 578.162483][T20469] RIP: 0033:0x7f7ca8c2fc07 [ 578.166892][T20469] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 578.186632][T20469] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 578.195052][T20469] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c2fc07 [ 578.203022][T20469] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 578.211018][T20469] RBP: 00007f7ca83a7040 R08: 0000000000000000 R09: ffffffffffffffff [ 578.219045][T20469] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 578.227017][T20469] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 578.234994][T20469] 22:16:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 54) 22:16:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 578.249460][T20469] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 578.258878][T20469] EXT4-fs (loop5): group descriptors corrupted! [ 578.269714][T20466] loop3: detected capacity change from 0 to 9 [ 578.277993][T20466] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 578.290858][T20474] loop2: detected capacity change from 0 to 264192 22:16:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 578.310695][T20474] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 578.319991][T20474] EXT4-fs (loop2): group descriptors corrupted! [ 578.359681][T20474] loop2: detected capacity change from 0 to 264192 [ 578.366709][T20474] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 578.376025][T20474] EXT4-fs (loop2): group descriptors corrupted! [ 578.419962][T20478] FAULT_INJECTION: forcing a failure. [ 578.419962][T20478] name failslab, interval 1, probability 0, space 0, times 0 [ 578.432714][T20478] CPU: 0 PID: 20478 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 578.441561][T20478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.443562][T20480] loop4: detected capacity change from 0 to 5 [ 578.451612][T20478] Call Trace: [ 578.451622][T20478] [ 578.451629][T20478] dump_stack_lvl+0xd6/0x122 [ 578.451655][T20478] dump_stack+0x11/0x1b [ 578.472772][T20478] should_fail+0x23c/0x250 [ 578.477191][T20478] ? __kernfs_new_node+0x6a/0x340 [ 578.482217][T20478] __should_failslab+0x81/0x90 [ 578.486986][T20478] should_failslab+0x5/0x20 [ 578.489667][T20482] loop3: detected capacity change from 0 to 16 [ 578.491565][T20478] kmem_cache_alloc+0x4f/0x320 [ 578.491589][T20478] ? __down_write_common+0x42/0x7b0 [ 578.507866][T20478] __kernfs_new_node+0x6a/0x340 [ 578.512767][T20478] ? up_write+0x25/0xc0 [ 578.517010][T20478] kernfs_new_node+0x5b/0xd0 [ 578.521671][T20478] __kernfs_create_file+0x45/0x1a0 [ 578.526792][T20478] ? dev_attr_show+0x90/0x90 [ 578.531480][T20478] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 578.536899][T20478] internal_create_group+0x2dd/0x840 [ 578.542252][T20478] sysfs_create_group+0x1b/0x20 [ 578.547099][T20478] loop_configure+0xc58/0xf30 [ 578.551885][T20478] lo_ioctl+0x583/0x1270 [ 578.556123][T20478] ? __rcu_read_unlock+0x5c/0x290 [ 578.561175][T20478] ? blkdev_common_ioctl+0x438/0x1180 [ 578.566549][T20478] ? selinux_file_ioctl+0x522/0x590 [ 578.571750][T20478] ? do_vfs_ioctl+0x819/0x14a0 [ 578.576524][T20478] ? lo_release+0x120/0x120 [ 578.581021][T20478] blkdev_ioctl+0x20e/0x440 [ 578.585825][T20478] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 578.591270][T20478] __se_sys_ioctl+0xcb/0x140 [ 578.595946][T20478] __x64_sys_ioctl+0x3f/0x50 [ 578.600609][T20478] do_syscall_64+0x44/0xd0 [ 578.605018][T20478] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 578.610986][T20478] RIP: 0033:0x7fa83371b8b7 [ 578.615389][T20478] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 578.634980][T20478] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 578.643474][T20478] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 578.651430][T20478] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 578.659438][T20478] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 578.667394][T20478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 578.675351][T20478] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 578.683319][T20478] [ 578.686931][T20479] loop5: detected capacity change from 0 to 4096 [ 578.688137][T20480] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 578.693924][T20482] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 578.705738][T20478] loop0: detected capacity change from 0 to 6 [ 578.719081][T20479] FAULT_INJECTION: forcing a failure. [ 578.719081][T20479] name failslab, interval 1, probability 0, space 0, times 0 [ 578.732452][T20479] CPU: 0 PID: 20479 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 578.741215][T20479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.751353][T20479] Call Trace: [ 578.754682][T20479] [ 578.757611][T20479] dump_stack_lvl+0xd6/0x122 [ 578.762310][T20479] dump_stack+0x11/0x1b [ 578.766469][T20479] should_fail+0x23c/0x250 [ 578.770895][T20479] ? jbd2_journal_add_journal_head+0x6c/0x3a0 [ 578.777060][T20479] __should_failslab+0x81/0x90 [ 578.781878][T20479] should_failslab+0x5/0x20 [ 578.786460][T20479] kmem_cache_alloc+0x4f/0x320 [ 578.791248][T20479] jbd2_journal_add_journal_head+0x6c/0x3a0 [ 578.797201][T20479] jbd2_journal_get_create_access+0x2c/0x290 [ 578.803220][T20479] __ext4_journal_get_create_access+0x65/0x320 [ 578.809396][T20479] ext4_getblk+0x22b/0x3e0 [ 578.813815][T20479] ext4_bread+0x28/0x100 [ 578.818057][T20479] ext4_append+0xd1/0x1c0 [ 578.822381][T20479] ext4_init_new_dir+0x177/0x500 [ 578.827372][T20479] ext4_mkdir+0x329/0x760 [ 578.831708][T20479] vfs_mkdir+0x2c8/0x3d0 [ 578.836016][T20479] do_mkdirat+0x12e/0x2c0 [ 578.840377][T20479] __x64_sys_mkdir+0x40/0x50 [ 578.844962][T20479] do_syscall_64+0x44/0xd0 [ 578.849452][T20479] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 578.855348][T20479] RIP: 0033:0x7f7ca8c2fc07 [ 578.859753][T20479] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 578.869242][T20478] FAT-fs (loop0): Directory bread(block 6) failed [ 578.879393][T20479] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 578.879417][T20479] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c2fc07 [ 578.879429][T20479] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 578.879441][T20479] RBP: 00007f7ca83a7040 R08: 0000000000000000 R09: ffffffffffffffff 22:16:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 578.879453][T20479] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 578.879464][T20479] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 578.879479][T20479] [ 578.879516][T20479] ENOMEM in journal_alloc_journal_head, retrying. [ 578.955265][T20479] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 578.964578][T20479] EXT4-fs (loop5): group descriptors corrupted! 22:16:47 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x600000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:16:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 55) 22:16:47 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 31) [ 578.975961][T20480] loop4: detected capacity change from 0 to 5 [ 578.993852][T20480] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 579.008971][T20482] loop3: detected capacity change from 0 to 16 22:16:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x604, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 579.026363][T20482] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 579.087647][T20486] loop2: detected capacity change from 0 to 264192 [ 579.106375][T20486] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 579.115710][T20486] EXT4-fs (loop2): group descriptors corrupted! [ 579.168886][T20486] loop2: detected capacity change from 0 to 264192 [ 579.176014][T20491] loop5: detected capacity change from 0 to 4096 [ 579.186190][T20486] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 579.195436][T20486] EXT4-fs (loop2): group descriptors corrupted! [ 579.210667][T20491] FAULT_INJECTION: forcing a failure. [ 579.210667][T20491] name failslab, interval 1, probability 0, space 0, times 0 [ 579.223359][T20491] CPU: 0 PID: 20491 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 579.232118][T20491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.242306][T20491] Call Trace: [ 579.245575][T20491] [ 579.248508][T20491] dump_stack_lvl+0xd6/0x122 [ 579.253223][T20491] dump_stack+0x11/0x1b [ 579.257410][T20491] should_fail+0x23c/0x250 [ 579.261836][T20491] ? strndup_user+0x64/0xa0 [ 579.266348][T20491] __should_failslab+0x81/0x90 [ 579.271204][T20491] should_failslab+0x5/0x20 [ 579.275806][T20491] __kmalloc_track_caller+0x6d/0x370 [ 579.281188][T20491] memdup_user+0x22/0xb0 [ 579.285434][T20491] strndup_user+0x64/0xa0 [ 579.289767][T20491] __se_sys_mount+0x4e/0x2f0 [ 579.294431][T20491] ? __this_cpu_preempt_check+0x18/0x20 [ 579.299983][T20491] ? switch_fpu_return+0xc9/0x190 [ 579.305064][T20491] __x64_sys_mount+0x63/0x70 [ 579.309652][T20491] do_syscall_64+0x44/0xd0 [ 579.314068][T20491] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 579.319956][T20491] RIP: 0033:0x7f7ca8c3202a [ 579.321824][T20495] FAULT_INJECTION: forcing a failure. [ 579.321824][T20495] name failslab, interval 1, probability 0, space 0, times 0 [ 579.324398][T20491] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 579.356592][T20491] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 579.364998][T20491] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 579.372964][T20491] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 579.380916][T20491] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 579.388890][T20491] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 579.396858][T20491] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 579.404917][T20491] [ 579.407940][T20495] CPU: 1 PID: 20495 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 579.416704][T20495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.426843][T20495] Call Trace: [ 579.430112][T20495] [ 579.433024][T20495] dump_stack_lvl+0xd6/0x122 [ 579.437661][T20495] dump_stack+0x11/0x1b [ 579.441850][T20495] should_fail+0x23c/0x250 [ 579.446262][T20495] ? __kernfs_new_node+0x6a/0x340 [ 579.451334][T20495] __should_failslab+0x81/0x90 [ 579.456087][T20495] should_failslab+0x5/0x20 [ 579.460623][T20495] kmem_cache_alloc+0x4f/0x320 [ 579.465377][T20495] ? __down_write_common+0x42/0x7b0 [ 579.470658][T20495] __kernfs_new_node+0x6a/0x340 [ 579.475497][T20495] ? up_write+0x25/0xc0 [ 579.479668][T20495] kernfs_new_node+0x5b/0xd0 [ 579.484274][T20495] __kernfs_create_file+0x45/0x1a0 [ 579.489443][T20495] ? dev_attr_show+0x90/0x90 [ 579.494020][T20495] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 579.499382][T20495] internal_create_group+0x2dd/0x840 [ 579.504653][T20495] sysfs_create_group+0x1b/0x20 [ 579.509492][T20495] loop_configure+0xc58/0xf30 [ 579.514155][T20495] lo_ioctl+0x583/0x1270 [ 579.518394][T20495] ? __rcu_read_unlock+0x5c/0x290 [ 579.523575][T20495] ? blkdev_common_ioctl+0x438/0x1180 [ 579.528960][T20495] ? selinux_file_ioctl+0x522/0x590 [ 579.534214][T20495] ? do_vfs_ioctl+0x819/0x14a0 [ 579.538985][T20495] ? lo_release+0x120/0x120 [ 579.543514][T20495] blkdev_ioctl+0x20e/0x440 [ 579.548022][T20495] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 579.553469][T20495] __se_sys_ioctl+0xcb/0x140 [ 579.558047][T20495] __x64_sys_ioctl+0x3f/0x50 [ 579.562692][T20495] do_syscall_64+0x44/0xd0 [ 579.567100][T20495] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 579.573007][T20495] RIP: 0033:0x7fa83371b8b7 [ 579.577407][T20495] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 579.597117][T20495] RSP: 002b:00007fa832e70f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 579.605527][T20495] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 22:16:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x12, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 579.613564][T20495] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 579.621592][T20495] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 579.629564][T20495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 579.637573][T20495] R13: 0000000000000004 R14: 0000000020000530 R15: 0000000000000002 [ 579.645615][T20495] [ 579.653913][T20495] loop0: detected capacity change from 0 to 6 22:16:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 56) 22:16:47 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 32) [ 579.672813][T20495] FAT-fs (loop0): Directory bread(block 6) failed [ 579.705100][T20499] loop3: detected capacity change from 0 to 16 [ 579.705503][T20500] loop4: detected capacity change from 0 to 5 [ 579.727907][T20500] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 579.728823][T20499] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 579.789640][T20500] loop4: detected capacity change from 0 to 5 [ 579.796721][T20500] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 579.811682][T20499] loop3: detected capacity change from 0 to 16 [ 579.819030][T20499] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2200, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 579.837210][T20503] loop2: detected capacity change from 0 to 264192 [ 579.848468][T20504] loop5: detected capacity change from 0 to 4096 [ 579.861158][T20503] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 579.870427][T20503] EXT4-fs (loop2): group descriptors corrupted! [ 579.881032][T20504] FAULT_INJECTION: forcing a failure. [ 579.881032][T20504] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 579.894134][T20504] CPU: 1 PID: 20504 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 579.902978][T20504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.913167][T20504] Call Trace: [ 579.916449][T20504] [ 579.919378][T20504] dump_stack_lvl+0xd6/0x122 [ 579.924023][T20504] dump_stack+0x11/0x1b [ 579.928244][T20504] should_fail+0x23c/0x250 [ 579.932664][T20504] should_fail_usercopy+0x16/0x20 [ 579.937692][T20504] _copy_from_user+0x1c/0xd0 [ 579.942295][T20504] memdup_user+0x5b/0xb0 [ 579.946536][T20504] strndup_user+0x64/0xa0 [ 579.950866][T20504] __se_sys_mount+0x4e/0x2f0 [ 579.955529][T20504] ? __this_cpu_preempt_check+0x18/0x20 [ 579.961221][T20504] ? switch_fpu_return+0xc9/0x190 [ 579.966245][T20504] __x64_sys_mount+0x63/0x70 [ 579.970912][T20504] do_syscall_64+0x44/0xd0 [ 579.975347][T20504] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 579.981271][T20504] RIP: 0033:0x7f7ca8c3202a [ 579.985719][T20504] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 580.005416][T20504] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 580.013924][T20504] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 580.021932][T20504] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 580.029898][T20504] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 580.037872][T20504] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 580.045926][T20504] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 580.053905][T20504] [ 580.079607][T20503] loop2: detected capacity change from 0 to 264192 22:16:48 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x80ffff, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:16:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x21, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) 22:16:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 57) [ 580.086674][T20503] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 580.096045][T20503] EXT4-fs (loop2): group descriptors corrupted! [ 580.170049][T20508] FAULT_INJECTION: forcing a failure. [ 580.170049][T20508] name failslab, interval 1, probability 0, space 0, times 0 [ 580.182771][T20508] CPU: 0 PID: 20508 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 580.191535][T20508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.201668][T20508] Call Trace: [ 580.204952][T20508] [ 580.207884][T20508] dump_stack_lvl+0xd6/0x122 [ 580.212479][T20508] dump_stack+0x11/0x1b [ 580.216664][T20508] should_fail+0x23c/0x250 [ 580.221172][T20508] ? __kernfs_new_node+0x6a/0x340 [ 580.226201][T20508] __should_failslab+0x81/0x90 [ 580.230966][T20508] should_failslab+0x5/0x20 [ 580.235471][T20508] kmem_cache_alloc+0x4f/0x320 [ 580.240265][T20508] ? __down_write_common+0x42/0x7b0 [ 580.245463][T20508] __kernfs_new_node+0x6a/0x340 [ 580.250387][T20508] ? up_write+0x25/0xc0 [ 580.254599][T20508] kernfs_new_node+0x5b/0xd0 [ 580.259340][T20508] __kernfs_create_file+0x45/0x1a0 [ 580.264552][T20508] ? dev_attr_show+0x90/0x90 [ 580.269176][T20508] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 580.274552][T20508] internal_create_group+0x2dd/0x840 [ 580.279888][T20508] sysfs_create_group+0x1b/0x20 [ 580.284734][T20508] loop_configure+0xc58/0xf30 [ 580.289412][T20508] lo_ioctl+0x583/0x1270 [ 580.293648][T20508] ? __rcu_read_unlock+0x5c/0x290 [ 580.298795][T20508] ? blkdev_common_ioctl+0x438/0x1180 [ 580.304201][T20508] ? selinux_file_ioctl+0x522/0x590 [ 580.309555][T20508] ? do_vfs_ioctl+0x819/0x14a0 [ 580.314355][T20508] ? lo_release+0x120/0x120 [ 580.318894][T20508] blkdev_ioctl+0x20e/0x440 [ 580.323399][T20508] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 580.328861][T20508] __se_sys_ioctl+0xcb/0x140 [ 580.333454][T20508] __x64_sys_ioctl+0x3f/0x50 [ 580.338075][T20508] do_syscall_64+0x44/0xd0 [ 580.342498][T20508] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 580.348425][T20508] RIP: 0033:0x7fa83371b8b7 [ 580.352835][T20508] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 580.372508][T20508] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 580.380918][T20508] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 580.388892][T20508] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 580.396857][T20508] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 580.404833][T20508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 580.412866][T20508] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 580.420953][T20508] [ 580.432002][T20508] loop0: detected capacity change from 0 to 6 [ 580.439548][T20508] FAT-fs (loop0): Directory bread(block 6) failed 22:16:48 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 33) [ 580.541718][T20512] loop4: detected capacity change from 0 to 5 [ 580.556570][T20512] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 580.582411][T20516] loop3: detected capacity change from 0 to 17 [ 580.591973][T20512] loop4: detected capacity change from 0 to 5 [ 580.600303][T20512] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 580.612004][T20516] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 580.624611][T20518] loop2: detected capacity change from 0 to 264192 22:16:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 580.634894][T20519] loop5: detected capacity change from 0 to 4096 [ 580.645241][T20516] loop3: detected capacity change from 0 to 17 [ 580.652546][T20516] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 580.664333][T20518] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 580.666067][T20519] FAULT_INJECTION: forcing a failure. [ 580.666067][T20519] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 580.673594][T20518] EXT4-fs (loop2): group descriptors corrupted! [ 580.686643][T20519] CPU: 1 PID: 20519 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 580.686689][T20519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.686700][T20519] Call Trace: [ 580.714992][T20519] [ 580.717920][T20519] dump_stack_lvl+0xd6/0x122 [ 580.722569][T20519] dump_stack+0x11/0x1b [ 580.726764][T20519] should_fail+0x23c/0x250 [ 580.731231][T20519] should_fail_usercopy+0x16/0x20 [ 580.736455][T20519] _copy_from_user+0x1c/0xd0 [ 580.741060][T20519] memdup_user+0x5b/0xb0 [ 580.745311][T20519] strndup_user+0x64/0xa0 [ 580.749642][T20519] __se_sys_mount+0x4e/0x2f0 [ 580.754231][T20519] ? __this_cpu_preempt_check+0x18/0x20 [ 580.759786][T20519] ? switch_fpu_return+0xc9/0x190 [ 580.764888][T20519] __x64_sys_mount+0x63/0x70 [ 580.769646][T20519] do_syscall_64+0x44/0xd0 [ 580.774062][T20519] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 580.779965][T20519] RIP: 0033:0x7f7ca8c3202a [ 580.784378][T20519] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 580.804042][T20519] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 580.812510][T20519] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 580.820487][T20519] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 580.828475][T20519] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 580.836467][T20519] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 580.844473][T20519] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 580.852443][T20519] [ 580.876970][T20523] loop0: detected capacity change from 0 to 6 [ 580.884441][T20523] FAULT_INJECTION: forcing a failure. [ 580.884441][T20523] name failslab, interval 1, probability 0, space 0, times 0 [ 580.897217][T20523] CPU: 0 PID: 20523 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 580.905988][T20523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.916216][T20523] Call Trace: [ 580.919501][T20523] [ 580.922429][T20523] dump_stack_lvl+0xd6/0x122 [ 580.927019][T20523] dump_stack+0x11/0x1b [ 580.931211][T20523] should_fail+0x23c/0x250 [ 580.935631][T20523] ? kzalloc+0x1d/0x30 [ 580.939700][T20523] __should_failslab+0x81/0x90 [ 580.944468][T20523] should_failslab+0x5/0x20 [ 580.949047][T20523] __kmalloc+0x6f/0x370 [ 580.953211][T20523] kzalloc+0x1d/0x30 [ 580.957247][T20523] kobject_get_path+0x7c/0x110 [ 580.962065][T20523] kobject_uevent_env+0x1be/0xc40 [ 580.967145][T20523] kobject_uevent+0x18/0x20 [ 580.971884][T20523] loop_configure+0xd70/0xf30 [ 580.976563][T20523] lo_ioctl+0x583/0x1270 [ 580.980871][T20523] ? __rcu_read_unlock+0x5c/0x290 [ 580.985908][T20523] ? blkdev_common_ioctl+0x438/0x1180 [ 580.991278][T20523] ? selinux_file_ioctl+0x522/0x590 [ 580.996472][T20523] ? do_vfs_ioctl+0x819/0x14a0 [ 581.001241][T20523] ? lo_release+0x120/0x120 [ 581.005813][T20523] blkdev_ioctl+0x20e/0x440 [ 581.010322][T20523] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 581.015857][T20523] __se_sys_ioctl+0xcb/0x140 [ 581.020448][T20523] __x64_sys_ioctl+0x3f/0x50 [ 581.025103][T20523] do_syscall_64+0x44/0xd0 [ 581.029514][T20523] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 581.035497][T20523] RIP: 0033:0x7fa83371b8b7 [ 581.039909][T20523] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 581.059520][T20523] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 581.068107][T20523] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 22:16:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 58) 22:16:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 581.076083][T20523] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 581.084051][T20523] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 581.092024][T20523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 581.100051][T20523] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 581.108080][T20523] [ 581.120650][T20523] FAT-fs (loop0): Directory bread(block 6) failed [ 581.129245][T20518] loop2: detected capacity change from 0 to 264192 [ 581.136183][T20518] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 581.145449][T20518] EXT4-fs (loop2): group descriptors corrupted! [ 581.152196][T20526] loop4: detected capacity change from 0 to 5 [ 581.158864][T20527] loop5: detected capacity change from 0 to 4096 [ 581.173811][T20527] FAULT_INJECTION: forcing a failure. [ 581.173811][T20527] name failslab, interval 1, probability 0, space 0, times 0 [ 581.186570][T20527] CPU: 0 PID: 20527 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 581.195388][T20527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.205522][T20527] Call Trace: [ 581.208800][T20527] [ 581.211716][T20527] dump_stack_lvl+0xd6/0x122 [ 581.216296][T20527] dump_stack+0x11/0x1b [ 581.220450][T20527] should_fail+0x23c/0x250 [ 581.224895][T20527] ? strndup_user+0x64/0xa0 [ 581.229388][T20527] __should_failslab+0x81/0x90 [ 581.234143][T20527] should_failslab+0x5/0x20 [ 581.238635][T20527] __kmalloc_track_caller+0x6d/0x370 [ 581.243937][T20527] memdup_user+0x22/0xb0 [ 581.248192][T20527] strndup_user+0x64/0xa0 [ 581.252545][T20527] __se_sys_mount+0x91/0x2f0 [ 581.257122][T20527] ? __this_cpu_preempt_check+0x18/0x20 [ 581.262728][T20527] ? switch_fpu_return+0xc9/0x190 [ 581.267816][T20527] __x64_sys_mount+0x63/0x70 [ 581.272457][T20527] do_syscall_64+0x44/0xd0 [ 581.276878][T20527] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 581.282785][T20527] RIP: 0033:0x7f7ca8c3202a [ 581.287186][T20527] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 581.306925][T20527] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 581.315325][T20527] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a 22:16:49 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 34) 22:16:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x2e, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 581.323282][T20527] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 581.331256][T20527] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 581.339324][T20527] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 581.347322][T20527] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 581.355287][T20527] [ 581.361548][T20526] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 59) 22:16:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:49 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0xc0ffff, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 581.388757][T20526] loop4: detected capacity change from 0 to 5 [ 581.395714][T20526] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 581.407172][T20529] loop3: detected capacity change from 0 to 18 [ 581.421090][T20529] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 581.480902][T20529] loop3: detected capacity change from 0 to 18 [ 581.487775][T20529] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 581.525857][T20535] loop0: detected capacity change from 0 to 6 [ 581.533087][T20536] loop2: detected capacity change from 0 to 264192 [ 581.533398][T20535] FAULT_INJECTION: forcing a failure. [ 581.533398][T20535] name failslab, interval 1, probability 0, space 0, times 0 [ 581.552233][T20535] CPU: 1 PID: 20535 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 581.560992][T20535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.571047][T20535] Call Trace: [ 581.574400][T20535] [ 581.577320][T20535] dump_stack_lvl+0xd6/0x122 [ 581.581916][T20535] dump_stack+0x11/0x1b [ 581.586069][T20535] should_fail+0x23c/0x250 [ 581.590488][T20535] ? kzalloc+0x1d/0x30 [ 581.594556][T20535] __should_failslab+0x81/0x90 [ 581.599325][T20535] should_failslab+0x5/0x20 [ 581.603826][T20535] __kmalloc+0x6f/0x370 [ 581.608025][T20535] kzalloc+0x1d/0x30 [ 581.611973][T20535] kobject_get_path+0x7c/0x110 [ 581.616733][T20535] kobject_uevent_env+0x1be/0xc40 [ 581.621820][T20535] kobject_uevent+0x18/0x20 [ 581.626398][T20535] loop_configure+0xd70/0xf30 [ 581.631077][T20535] lo_ioctl+0x583/0x1270 [ 581.635312][T20535] ? __rcu_read_unlock+0x5c/0x290 [ 581.640339][T20535] ? blkdev_common_ioctl+0x438/0x1180 [ 581.645712][T20535] ? selinux_file_ioctl+0x522/0x590 [ 581.650909][T20535] ? do_vfs_ioctl+0x819/0x14a0 [ 581.655679][T20535] ? lo_release+0x120/0x120 [ 581.660177][T20535] blkdev_ioctl+0x20e/0x440 [ 581.664677][T20535] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 581.670135][T20535] __se_sys_ioctl+0xcb/0x140 [ 581.674726][T20535] __x64_sys_ioctl+0x3f/0x50 [ 581.679310][T20535] do_syscall_64+0x44/0xd0 [ 581.683769][T20535] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 581.689846][T20535] RIP: 0033:0x7fa83371b8b7 [ 581.694260][T20535] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 581.713924][T20535] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 581.722431][T20535] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 581.730394][T20535] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 581.738443][T20535] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 581.746426][T20535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 581.754397][T20535] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 581.762374][T20535] 22:16:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 581.775799][T20535] FAT-fs (loop0): Directory bread(block 6) failed [ 581.785401][T20536] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 581.794688][T20536] EXT4-fs (loop2): group descriptors corrupted! [ 581.833185][T20538] loop5: detected capacity change from 0 to 4096 [ 581.865572][T20538] FAULT_INJECTION: forcing a failure. [ 581.865572][T20538] name failslab, interval 1, probability 0, space 0, times 0 [ 581.878250][T20538] CPU: 0 PID: 20538 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 581.887138][T20538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.897251][T20538] Call Trace: [ 581.900521][T20538] [ 581.903525][T20538] dump_stack_lvl+0xd6/0x122 [ 581.908113][T20538] dump_stack+0x11/0x1b [ 581.912264][T20538] should_fail+0x23c/0x250 [ 581.916741][T20538] ? __se_sys_mount+0xf7/0x2f0 [ 581.921534][T20538] __should_failslab+0x81/0x90 [ 581.926304][T20538] should_failslab+0x5/0x20 [ 581.930836][T20538] kmem_cache_alloc_trace+0x52/0x350 [ 581.936117][T20538] ? memdup_user+0x96/0xb0 [ 581.938073][T20536] loop2: detected capacity change from 0 to 264192 [ 581.940551][T20538] __se_sys_mount+0xf7/0x2f0 [ 581.940574][T20538] ? __this_cpu_preempt_check+0x18/0x20 [ 581.949017][T20536] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 581.951675][T20538] ? switch_fpu_return+0xc9/0x190 [ 581.957213][T20536] EXT4-fs (loop2): group descriptors corrupted! [ 581.977617][T20538] __x64_sys_mount+0x63/0x70 22:16:50 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 35) [ 581.982207][T20538] do_syscall_64+0x44/0xd0 [ 581.986639][T20538] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 581.992537][T20538] RIP: 0033:0x7f7ca8c3202a [ 581.996957][T20538] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 582.016636][T20538] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 582.025047][T20538] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 582.033016][T20538] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 582.040983][T20538] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 582.048942][T20538] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 582.056905][T20538] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 582.064875][T20538] [ 582.074444][T20540] loop4: detected capacity change from 0 to 5 22:16:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x43, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) 22:16:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 60) 22:16:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 582.108655][T20540] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 582.139111][T20540] loop4: detected capacity change from 0 to 5 [ 582.145712][T20540] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 582.296877][T20547] loop3: detected capacity change from 0 to 31 [ 582.314761][T20547] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 582.330526][T20548] loop2: detected capacity change from 0 to 264192 [ 582.338490][T20550] loop5: detected capacity change from 0 to 4096 [ 582.357217][T20551] loop0: detected capacity change from 0 to 6 [ 582.363448][T20548] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 582.372679][T20548] EXT4-fs (loop2): group descriptors corrupted! [ 582.380743][T20550] FAULT_INJECTION: forcing a failure. [ 582.380743][T20550] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 582.381948][T20547] loop3: detected capacity change from 0 to 31 [ 582.393825][T20550] CPU: 1 PID: 20550 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 582.408805][T20550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 582.418854][T20550] Call Trace: [ 582.422176][T20550] [ 582.425143][T20550] dump_stack_lvl+0xd6/0x122 [ 582.429772][T20550] dump_stack+0x11/0x1b [ 582.433926][T20550] should_fail+0x23c/0x250 [ 582.438344][T20550] should_fail_usercopy+0x16/0x20 [ 582.443451][T20550] _copy_from_user+0x1c/0xd0 [ 582.448039][T20550] __se_sys_mount+0x119/0x2f0 [ 582.452715][T20550] __x64_sys_mount+0x63/0x70 [ 582.457353][T20550] do_syscall_64+0x44/0xd0 [ 582.461766][T20550] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 582.467661][T20550] RIP: 0033:0x7f7ca8c3202a [ 582.472069][T20550] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 582.491675][T20550] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 582.500139][T20550] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 582.508107][T20550] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 582.516072][T20550] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 582.524039][T20550] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 582.532006][T20550] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 582.540054][T20550] [ 582.546801][T20551] FAULT_INJECTION: forcing a failure. [ 582.546801][T20551] name failslab, interval 1, probability 0, space 0, times 0 [ 582.547358][T20547] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 582.559454][T20551] CPU: 1 PID: 20551 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 582.559480][T20551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 582.559490][T20551] Call Trace: [ 582.559497][T20551] [ 582.559503][T20551] dump_stack_lvl+0xd6/0x122 [ 582.559573][T20551] dump_stack+0x11/0x1b [ 582.604213][T20551] should_fail+0x23c/0x250 [ 582.608628][T20551] __should_failslab+0x81/0x90 [ 582.613378][T20551] should_failslab+0x5/0x20 [ 582.617866][T20551] kmem_cache_alloc_node_trace+0x61/0x310 [ 582.623573][T20551] ? __kmalloc_node_track_caller+0x30/0x40 [ 582.629362][T20551] __kmalloc_node_track_caller+0x30/0x40 [ 582.634980][T20551] ? alloc_uevent_skb+0x5b/0x120 [ 582.639903][T20551] __alloc_skb+0x19d/0x450 [ 582.644307][T20551] alloc_uevent_skb+0x5b/0x120 [ 582.649063][T20551] kobject_uevent_env+0x863/0xc40 [ 582.654079][T20551] kobject_uevent+0x18/0x20 [ 582.658579][T20551] loop_configure+0xd70/0xf30 [ 582.663244][T20551] lo_ioctl+0x583/0x1270 [ 582.667473][T20551] ? __rcu_read_unlock+0x5c/0x290 [ 582.672569][T20551] ? blkdev_common_ioctl+0x438/0x1180 [ 582.677940][T20551] ? selinux_file_ioctl+0x522/0x590 [ 582.683125][T20551] ? do_vfs_ioctl+0x819/0x14a0 [ 582.687894][T20551] ? lo_release+0x120/0x120 [ 582.692392][T20551] blkdev_ioctl+0x20e/0x440 [ 582.696910][T20551] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 582.702355][T20551] __se_sys_ioctl+0xcb/0x140 [ 582.706933][T20551] __x64_sys_ioctl+0x3f/0x50 [ 582.711589][T20551] do_syscall_64+0x44/0xd0 [ 582.716001][T20551] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 582.721893][T20551] RIP: 0033:0x7fa83371b8b7 [ 582.726454][T20551] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 582.746051][T20551] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 582.754492][T20551] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 582.762490][T20551] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 582.770445][T20551] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 582.778400][T20551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 582.786435][T20551] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 582.794409][T20551] [ 582.800337][T20550] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) 22:16:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 582.809686][T20550] EXT4-fs (loop5): group descriptors corrupted! [ 582.821447][T20551] FAT-fs (loop0): Directory bread(block 6) failed [ 582.821537][T20554] loop4: detected capacity change from 0 to 5 [ 582.843922][T20548] loop2: detected capacity change from 0 to 264192 22:16:51 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 36) 22:16:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 61) 22:16:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x64, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 582.851852][T20548] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 582.861129][T20548] EXT4-fs (loop2): group descriptors corrupted! [ 582.870137][T20554] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 582.919460][T20554] loop4: detected capacity change from 0 to 5 [ 582.926145][T20554] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:51 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0xf0ff1f, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 583.134762][T20560] loop5: detected capacity change from 0 to 4096 [ 583.151886][T20563] loop2: detected capacity change from 0 to 264192 [ 583.166730][T20562] loop0: detected capacity change from 0 to 6 [ 583.172893][T20560] FAULT_INJECTION: forcing a failure. [ 583.172893][T20560] name failslab, interval 1, probability 0, space 0, times 0 [ 583.185653][T20560] CPU: 0 PID: 20560 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 583.194414][T20560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 583.204459][T20560] Call Trace: [ 583.207730][T20560] [ 583.210686][T20560] dump_stack_lvl+0xd6/0x122 [ 583.215327][T20560] dump_stack+0x11/0x1b [ 583.219482][T20560] should_fail+0x23c/0x250 [ 583.223899][T20560] ? getname_flags+0x84/0x3f0 [ 583.228594][T20560] __should_failslab+0x81/0x90 [ 583.233361][T20560] should_failslab+0x5/0x20 [ 583.237928][T20560] kmem_cache_alloc+0x4f/0x320 [ 583.242692][T20560] getname_flags+0x84/0x3f0 [ 583.247199][T20560] ? should_fail+0xd6/0x250 [ 583.251736][T20560] user_path_at_empty+0x28/0x110 [ 583.256672][T20560] __se_sys_mount+0x217/0x2f0 [ 583.261394][T20560] ? __this_cpu_preempt_check+0x18/0x20 [ 583.266945][T20560] __x64_sys_mount+0x63/0x70 [ 583.271528][T20560] do_syscall_64+0x44/0xd0 [ 583.275980][T20560] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 583.278874][T20562] FAULT_INJECTION: forcing a failure. [ 583.278874][T20562] name failslab, interval 1, probability 0, space 0, times 0 [ 583.281879][T20560] RIP: 0033:0x7f7ca8c3202a [ 583.298864][T20560] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 583.318521][T20560] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 583.327020][T20560] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 583.335100][T20560] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 583.343060][T20560] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 583.351016][T20560] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 583.359143][T20560] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 583.367951][T20560] [ 583.370956][T20562] CPU: 1 PID: 20562 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 583.379806][T20562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 583.389954][T20562] Call Trace: [ 583.393249][T20562] [ 583.396175][T20562] dump_stack_lvl+0xd6/0x122 [ 583.400917][T20562] dump_stack+0x11/0x1b [ 583.405110][T20562] should_fail+0x23c/0x250 [ 583.409587][T20562] ? skb_clone+0x12c/0x1f0 [ 583.414078][T20562] __should_failslab+0x81/0x90 [ 583.418839][T20562] should_failslab+0x5/0x20 [ 583.423453][T20562] kmem_cache_alloc+0x4f/0x320 [ 583.428220][T20562] skb_clone+0x12c/0x1f0 [ 583.432470][T20562] netlink_broadcast+0x4e9/0xad0 [ 583.437465][T20562] kobject_uevent_env+0x8c9/0xc40 [ 583.442566][T20562] kobject_uevent+0x18/0x20 [ 583.447077][T20562] loop_configure+0xd70/0xf30 [ 583.451769][T20562] lo_ioctl+0x583/0x1270 [ 583.456087][T20562] ? __rcu_read_unlock+0x5c/0x290 [ 583.461133][T20562] ? blkdev_common_ioctl+0x438/0x1180 [ 583.466513][T20562] ? selinux_file_ioctl+0x522/0x590 [ 583.471757][T20562] ? do_vfs_ioctl+0x819/0x14a0 [ 583.476585][T20562] ? lo_release+0x120/0x120 [ 583.481089][T20562] blkdev_ioctl+0x20e/0x440 [ 583.485598][T20562] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 583.491138][T20562] __se_sys_ioctl+0xcb/0x140 [ 583.495754][T20562] __x64_sys_ioctl+0x3f/0x50 [ 583.500362][T20562] do_syscall_64+0x44/0xd0 [ 583.504779][T20562] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 583.510676][T20562] RIP: 0033:0x7fa83371b8b7 [ 583.515084][T20562] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 583.534685][T20562] RSP: 002b:00007fa832e91f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 583.543093][T20562] RAX: ffffffffffffffda RBX: 00007fa8337659c8 RCX: 00007fa83371b8b7 [ 583.551146][T20562] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 583.559125][T20562] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 583.567175][T20562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 583.575143][T20562] R13: 0000000000000005 R14: 0000000020000530 R15: 0000000000000002 [ 583.583116][T20562] [ 583.596788][T20563] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 583.606043][T20563] EXT4-fs (loop2): group descriptors corrupted! [ 583.613536][T20562] FAT-fs (loop0): Directory bread(block 6) failed [ 583.627000][T20566] loop4: detected capacity change from 0 to 6 [ 583.640331][T20563] loop2: detected capacity change from 0 to 264192 22:16:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 62) 22:16:51 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 37) 22:16:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x600, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 583.647331][T20563] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 583.656672][T20563] EXT4-fs (loop2): group descriptors corrupted! [ 583.668344][T20566] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 583.669259][T20568] loop3: detected capacity change from 0 to 32 [ 583.712339][T20566] loop4: detected capacity change from 0 to 6 [ 583.719077][T20566] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 583.730095][T20568] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 583.802872][T20568] loop3: detected capacity change from 0 to 32 [ 583.812396][T20568] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 583.896591][T20572] loop5: detected capacity change from 0 to 4096 [ 583.913728][T20572] FAULT_INJECTION: forcing a failure. [ 583.913728][T20572] name failslab, interval 1, probability 0, space 0, times 0 [ 583.915022][T20573] loop2: detected capacity change from 0 to 264192 [ 583.926472][T20572] CPU: 1 PID: 20572 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 583.941839][T20572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 583.951896][T20572] Call Trace: [ 583.955175][T20572] [ 583.958249][T20572] dump_stack_lvl+0xd6/0x122 [ 583.962844][T20572] dump_stack+0x11/0x1b [ 583.967009][T20572] should_fail+0x23c/0x250 [ 583.971424][T20572] ? getname_flags+0x84/0x3f0 [ 583.976103][T20572] __should_failslab+0x81/0x90 [ 583.980919][T20572] should_failslab+0x5/0x20 [ 583.985420][T20572] kmem_cache_alloc+0x4f/0x320 [ 583.990245][T20572] getname_flags+0x84/0x3f0 [ 583.994746][T20572] ? should_fail+0xd6/0x250 [ 583.999306][T20572] user_path_at_empty+0x28/0x110 [ 584.004362][T20572] __se_sys_mount+0x217/0x2f0 [ 584.009037][T20572] ? __this_cpu_preempt_check+0x18/0x20 [ 584.014677][T20572] __x64_sys_mount+0x63/0x70 [ 584.019351][T20572] do_syscall_64+0x44/0xd0 [ 584.023799][T20572] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 584.029731][T20572] RIP: 0033:0x7f7ca8c3202a [ 584.034148][T20572] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 584.053856][T20572] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 584.062266][T20572] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 584.070235][T20572] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 584.078204][T20572] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 584.086177][T20572] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 584.094145][T20572] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 584.102124][T20572] [ 584.121390][T20573] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 584.130798][T20573] EXT4-fs (loop2): group descriptors corrupted! [ 584.140233][T20577] loop0: detected capacity change from 0 to 6 [ 584.148154][T20577] FAULT_INJECTION: forcing a failure. [ 584.148154][T20577] name failslab, interval 1, probability 0, space 0, times 0 [ 584.160834][T20577] CPU: 1 PID: 20577 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 584.162652][T20573] loop2: detected capacity change from 0 to 264192 [ 584.169649][T20577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.169664][T20577] Call Trace: [ 584.169670][T20577] [ 584.169688][T20577] dump_stack_lvl+0xd6/0x122 [ 584.196992][T20577] dump_stack+0x11/0x1b [ 584.201161][T20577] should_fail+0x23c/0x250 [ 584.205580][T20577] ? getname_flags+0x84/0x3f0 [ 584.210250][T20577] __should_failslab+0x81/0x90 [ 584.215021][T20577] should_failslab+0x5/0x20 [ 584.219532][T20577] kmem_cache_alloc+0x4f/0x320 [ 584.224488][T20577] ? getname_flags+0x34/0x3f0 [ 584.229201][T20577] getname_flags+0x84/0x3f0 [ 584.233704][T20577] __x64_sys_mkdir+0x31/0x50 [ 584.238322][T20577] do_syscall_64+0x44/0xd0 [ 584.242741][T20577] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 584.248683][T20577] RIP: 0033:0x7fa83371ac07 [ 584.253099][T20577] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 584.272711][T20577] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 584.281189][T20577] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371ac07 [ 584.289188][T20577] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200001c0 22:16:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 63) [ 584.297161][T20577] RBP: 00007fa832e92040 R08: 0000000000000000 R09: ffffffffffffffff [ 584.305131][T20577] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 584.313101][T20577] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 584.321076][T20577] [ 584.329857][T20573] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (38247!=0) [ 584.339114][T20573] EXT4-fs (loop2): group descriptors corrupted! [ 584.347137][T20577] FAT-fs (loop0): Directory bread(block 6) failed 22:16:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x2e00, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) 22:16:52 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 38) [ 584.396409][T20578] loop4: detected capacity change from 0 to 6 [ 584.423576][T20578] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 584.470037][T20578] loop4: detected capacity change from 0 to 6 [ 584.476454][T20578] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:52 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x1000000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 584.517694][T20582] loop3: detected capacity change from 0 to 36 [ 584.539021][T20582] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 584.591528][T20585] loop5: detected capacity change from 0 to 4096 [ 584.599954][T20582] loop3: detected capacity change from 0 to 36 [ 584.606696][T20582] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 584.621370][T20585] FAULT_INJECTION: forcing a failure. [ 584.621370][T20585] name failslab, interval 1, probability 0, space 0, times 0 [ 584.634027][T20585] CPU: 1 PID: 20585 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 584.642783][T20585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.652956][T20585] Call Trace: [ 584.656229][T20585] [ 584.659156][T20585] dump_stack_lvl+0xd6/0x122 [ 584.663755][T20585] dump_stack+0x11/0x1b [ 584.667946][T20585] should_fail+0x23c/0x250 [ 584.672357][T20585] ? alloc_fs_context+0x46/0x500 [ 584.677291][T20585] __should_failslab+0x81/0x90 [ 584.682127][T20585] should_failslab+0x5/0x20 [ 584.686630][T20585] kmem_cache_alloc_trace+0x52/0x350 [ 584.691972][T20585] alloc_fs_context+0x46/0x500 [ 584.696845][T20585] ? strncmp+0x34/0x70 [ 584.700917][T20585] fs_context_for_mount+0x1d/0x20 [ 584.705954][T20585] path_mount+0xdf0/0x1c40 [ 584.710368][T20585] ? kmem_cache_free+0x65/0x110 [ 584.715221][T20585] __se_sys_mount+0x24b/0x2f0 [ 584.719966][T20585] ? __this_cpu_preempt_check+0x18/0x20 [ 584.725525][T20585] __x64_sys_mount+0x63/0x70 [ 584.730119][T20585] do_syscall_64+0x44/0xd0 [ 584.734577][T20585] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 584.741168][T20585] RIP: 0033:0x7f7ca8c3202a [ 584.745618][T20585] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 584.765255][T20585] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 584.773772][T20585] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 584.781739][T20585] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 584.789706][T20585] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 584.797703][T20585] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 584.805740][T20585] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 584.813717][T20585] 22:16:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 64) 22:16:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 584.861909][T20587] loop0: detected capacity change from 0 to 6 [ 584.870731][T20587] FAULT_INJECTION: forcing a failure. [ 584.870731][T20587] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 584.883835][T20587] CPU: 1 PID: 20587 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 584.892603][T20587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.902657][T20587] Call Trace: [ 584.905934][T20587] [ 584.908856][T20587] dump_stack_lvl+0xd6/0x122 [ 584.913466][T20587] dump_stack+0x11/0x1b [ 584.917677][T20587] should_fail+0x23c/0x250 [ 584.922090][T20587] should_fail_usercopy+0x16/0x20 [ 584.927124][T20587] strncpy_from_user+0x21/0x250 [ 584.931984][T20587] getname_flags+0xb8/0x3f0 [ 584.936496][T20587] __x64_sys_mkdir+0x31/0x50 [ 584.941089][T20587] do_syscall_64+0x44/0xd0 [ 584.945586][T20587] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 584.951484][T20587] RIP: 0033:0x7fa83371ac07 [ 584.955912][T20587] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 584.975609][T20587] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 584.984061][T20587] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371ac07 [ 584.992031][T20587] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200001c0 [ 585.000030][T20587] RBP: 00007fa832e92040 R08: 0000000000000000 R09: ffffffffffffffff [ 585.008091][T20587] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 585.016063][T20587] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 585.024069][T20587] [ 585.032210][T20587] FAT-fs (loop0): Directory bread(block 6) failed 22:16:53 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 39) [ 585.077365][T20591] loop4: detected capacity change from 0 to 7 [ 585.095605][T20591] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 585.123990][T20589] loop2: detected capacity change from 0 to 264192 [ 585.142188][T20589] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 585.162188][T20591] loop4: detected capacity change from 0 to 7 [ 585.169195][T20591] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 585.216056][T20597] loop3: detected capacity change from 0 to 38 [ 585.225922][T20598] loop5: detected capacity change from 0 to 4096 [ 585.238871][T20597] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 585.255427][T20598] FAULT_INJECTION: forcing a failure. [ 585.255427][T20598] name failslab, interval 1, probability 0, space 0, times 0 [ 585.268109][T20598] CPU: 1 PID: 20598 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 585.276885][T20598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.286998][T20598] Call Trace: [ 585.290273][T20598] [ 585.293201][T20598] dump_stack_lvl+0xd6/0x122 [ 585.297828][T20598] dump_stack+0x11/0x1b [ 585.301978][T20598] should_fail+0x23c/0x250 [ 585.306396][T20598] ? legacy_init_fs_context+0x2d/0x70 [ 585.311806][T20598] __should_failslab+0x81/0x90 [ 585.316640][T20598] should_failslab+0x5/0x20 [ 585.321145][T20598] kmem_cache_alloc_trace+0x52/0x350 [ 585.326502][T20598] ? kmem_cache_alloc_trace+0x24b/0x350 [ 585.332050][T20598] legacy_init_fs_context+0x2d/0x70 [ 585.337342][T20598] alloc_fs_context+0x419/0x500 [ 585.342222][T20598] fs_context_for_mount+0x1d/0x20 [ 585.347236][T20598] path_mount+0xdf0/0x1c40 [ 585.351649][T20598] ? kmem_cache_free+0x65/0x110 [ 585.356502][T20598] __se_sys_mount+0x24b/0x2f0 [ 585.361174][T20598] ? __this_cpu_preempt_check+0x18/0x20 [ 585.366729][T20598] __x64_sys_mount+0x63/0x70 [ 585.371367][T20598] do_syscall_64+0x44/0xd0 [ 585.375843][T20598] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 585.381734][T20598] RIP: 0033:0x7f7ca8c3202a [ 585.386159][T20598] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 585.405761][T20598] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:16:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x20400, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 585.414175][T20598] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 585.422159][T20598] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 585.430155][T20598] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 585.438125][T20598] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 585.446091][T20598] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 585.454097][T20598] 22:16:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 65) [ 585.483615][T20597] loop3: detected capacity change from 0 to 38 [ 585.492050][T20597] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 585.513543][T20600] loop0: detected capacity change from 0 to 6 [ 585.520724][T20600] FAULT_INJECTION: forcing a failure. [ 585.520724][T20600] name failslab, interval 1, probability 0, space 0, times 0 [ 585.533406][T20600] CPU: 1 PID: 20600 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 585.542172][T20600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.552318][T20600] Call Trace: [ 585.555593][T20600] [ 585.558511][T20600] dump_stack_lvl+0xd6/0x122 [ 585.563100][T20600] dump_stack+0x11/0x1b [ 585.567250][T20600] should_fail+0x23c/0x250 [ 585.571665][T20600] ? strndup_user+0x64/0xa0 [ 585.576168][T20600] __should_failslab+0x81/0x90 [ 585.580931][T20600] should_failslab+0x5/0x20 [ 585.585429][T20600] __kmalloc_track_caller+0x6d/0x370 [ 585.590713][T20600] memdup_user+0x22/0xb0 [ 585.594955][T20600] strndup_user+0x64/0xa0 [ 585.599285][T20600] __se_sys_mount+0x4e/0x2f0 [ 585.603875][T20600] __x64_sys_mount+0x63/0x70 [ 585.608545][T20600] do_syscall_64+0x44/0xd0 [ 585.612959][T20600] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 585.618852][T20600] RIP: 0033:0x7fa83371d02a [ 585.623258][T20600] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 585.642862][T20600] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 585.651361][T20600] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 585.659328][T20600] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 585.667387][T20600] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 585.675442][T20600] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 22:16:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:53 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 40) [ 585.683415][T20600] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 585.691384][T20600] [ 585.835599][T20602] loop4: detected capacity change from 0 to 7 [ 585.852122][T20602] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 585.910880][T20602] loop4: detected capacity change from 0 to 7 [ 585.918226][T20608] loop5: detected capacity change from 0 to 4096 [ 585.925211][T20611] loop3: detected capacity change from 0 to 48 [ 585.931837][T20602] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 585.945167][T20608] FAULT_INJECTION: forcing a failure. [ 585.945167][T20608] name failslab, interval 1, probability 0, space 0, times 0 [ 585.957866][T20608] CPU: 0 PID: 20608 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 585.966783][T20608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.976874][T20608] Call Trace: [ 585.980152][T20608] [ 585.983073][T20608] dump_stack_lvl+0xd6/0x122 [ 585.987669][T20608] dump_stack+0x11/0x1b [ 585.991833][T20608] should_fail+0x23c/0x250 [ 585.996254][T20608] ? vfs_parse_fs_string+0x6d/0xd0 [ 586.001426][T20608] __should_failslab+0x81/0x90 [ 586.006445][T20608] should_failslab+0x5/0x20 [ 586.010998][T20608] __kmalloc_track_caller+0x6d/0x370 [ 586.016360][T20608] kmemdup_nul+0x27/0x70 [ 586.020605][T20608] vfs_parse_fs_string+0x6d/0xd0 [ 586.025545][T20608] path_mount+0xf94/0x1c40 [ 586.029954][T20608] ? kmem_cache_free+0x65/0x110 [ 586.034809][T20608] __se_sys_mount+0x24b/0x2f0 [ 586.039543][T20608] ? __this_cpu_preempt_check+0x18/0x20 [ 586.045104][T20608] __x64_sys_mount+0x63/0x70 [ 586.049714][T20608] do_syscall_64+0x44/0xd0 [ 586.054200][T20608] entry_SYSCALL_64_after_hwframe+0x44/0xae 22:16:54 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x2000000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 586.060139][T20608] RIP: 0033:0x7f7ca8c3202a [ 586.064544][T20608] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 586.084246][T20608] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 586.092674][T20608] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 586.096216][T20611] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 586.100642][T20608] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 586.100657][T20608] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 586.100668][T20608] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 586.100681][T20608] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 586.100697][T20608] [ 586.163416][T20612] loop0: detected capacity change from 0 to 6 [ 586.176592][T20612] FAULT_INJECTION: forcing a failure. [ 586.176592][T20612] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 586.189767][T20612] CPU: 0 PID: 20612 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 586.198538][T20612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.208597][T20612] Call Trace: [ 586.211876][T20612] [ 586.214832][T20612] dump_stack_lvl+0xd6/0x122 [ 586.219432][T20612] dump_stack+0x11/0x1b [ 586.223589][T20612] should_fail+0x23c/0x250 [ 586.228026][T20612] should_fail_usercopy+0x16/0x20 [ 586.233052][T20612] _copy_from_user+0x1c/0xd0 [ 586.237654][T20612] memdup_user+0x5b/0xb0 [ 586.241904][T20612] strndup_user+0x64/0xa0 [ 586.243551][T20614] loop5: detected capacity change from 0 to 4096 [ 586.246237][T20612] __se_sys_mount+0x4e/0x2f0 [ 586.257140][T20612] __x64_sys_mount+0x63/0x70 [ 586.261743][T20612] do_syscall_64+0x44/0xd0 [ 586.263064][T20614] FAULT_INJECTION: forcing a failure. [ 586.263064][T20614] name failslab, interval 1, probability 0, space 0, times 0 [ 586.266157][T20612] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 586.284622][T20612] RIP: 0033:0x7fa83371d02a [ 586.289024][T20612] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 586.308615][T20612] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 586.317096][T20612] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 586.325052][T20612] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 586.333004][T20612] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 586.340957][T20612] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 586.348909][T20612] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 586.356885][T20612] [ 586.359888][T20614] CPU: 1 PID: 20614 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 586.368654][T20614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.378805][T20614] Call Trace: [ 586.382080][T20614] [ 586.385042][T20614] dump_stack_lvl+0xd6/0x122 [ 586.389640][T20614] dump_stack+0x11/0x1b [ 586.393856][T20614] should_fail+0x23c/0x250 [ 586.398352][T20614] ? ext4_mount+0x40/0x40 [ 586.402702][T20614] ? getname_kernel+0x37/0x1d0 [ 586.407465][T20614] __should_failslab+0x81/0x90 [ 586.412241][T20614] should_failslab+0x5/0x20 [ 586.416749][T20614] kmem_cache_alloc+0x4f/0x320 [ 586.421558][T20614] ? avc_has_perm_noaudit+0x1c0/0x270 [ 586.426972][T20614] ? ext4_mount+0x40/0x40 [ 586.431357][T20614] getname_kernel+0x37/0x1d0 [ 586.435952][T20614] ? ext4_mount+0x40/0x40 [ 586.440281][T20614] kern_path+0x1d/0x100 [ 586.444515][T20614] ? ext4_mount+0x40/0x40 [ 586.448842][T20614] blkdev_get_by_path+0x63/0x220 [ 586.453781][T20614] mount_bdev+0x47/0x290 [ 586.458031][T20614] ? ext4_errno_to_code+0x110/0x110 [ 586.463227][T20614] ext4_mount+0x2d/0x40 [ 586.467381][T20614] legacy_get_tree+0x70/0xc0 [ 586.472020][T20614] vfs_get_tree+0x4a/0x1a0 [ 586.476467][T20614] path_mount+0x11cf/0x1c40 [ 586.480970][T20614] ? kmem_cache_free+0x65/0x110 [ 586.485824][T20614] __se_sys_mount+0x24b/0x2f0 [ 586.490519][T20614] ? __this_cpu_preempt_check+0x18/0x20 [ 586.496070][T20614] __x64_sys_mount+0x63/0x70 [ 586.500666][T20614] do_syscall_64+0x44/0xd0 [ 586.505133][T20614] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 586.511024][T20614] RIP: 0033:0x7f7ca8c3202a [ 586.515431][T20614] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 586.535056][T20614] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 586.543467][T20614] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 586.551535][T20614] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 22:16:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 66) [ 586.559548][T20614] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 586.567510][T20614] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 586.575480][T20614] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 586.583455][T20614] [ 586.595069][T20611] loop3: detected capacity change from 0 to 48 22:16:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 67) 22:16:54 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 41) [ 586.605813][T20611] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 586.709605][T20617] loop4: detected capacity change from 0 to 8 [ 586.738146][T20617] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 586.794215][T20622] loop0: detected capacity change from 0 to 6 [ 586.807211][T20622] FAULT_INJECTION: forcing a failure. [ 586.807211][T20622] name failslab, interval 1, probability 0, space 0, times 0 [ 586.819882][T20622] CPU: 0 PID: 20622 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 586.828647][T20622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.838739][T20622] Call Trace: [ 586.841092][T20625] loop5: detected capacity change from 0 to 4096 [ 586.842019][T20622] [ 586.842028][T20622] dump_stack_lvl+0xd6/0x122 [ 586.855843][T20622] dump_stack+0x11/0x1b [ 586.857020][T20625] FAULT_INJECTION: forcing a failure. [ 586.857020][T20625] name failslab, interval 1, probability 0, space 0, times 0 [ 586.860006][T20622] should_fail+0x23c/0x250 [ 586.860029][T20622] ? strndup_user+0x64/0xa0 [ 586.860048][T20622] __should_failslab+0x81/0x90 [ 586.860067][T20622] should_failslab+0x5/0x20 [ 586.890719][T20622] __kmalloc_track_caller+0x6d/0x370 [ 586.895998][T20622] memdup_user+0x22/0xb0 [ 586.900224][T20622] strndup_user+0x64/0xa0 [ 586.904540][T20622] __se_sys_mount+0x91/0x2f0 [ 586.909116][T20622] __x64_sys_mount+0x63/0x70 [ 586.913689][T20622] do_syscall_64+0x44/0xd0 [ 586.918093][T20622] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 586.923974][T20622] RIP: 0033:0x7fa83371d02a [ 586.928369][T20622] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 586.947959][T20622] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 586.956356][T20622] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 586.964313][T20622] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 586.972314][T20622] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 586.980267][T20622] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 586.988232][T20622] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 586.996190][T20622] [ 586.999281][T20625] CPU: 1 PID: 20625 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 587.008046][T20625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 587.018228][T20625] Call Trace: [ 587.021546][T20625] [ 587.024461][T20625] dump_stack_lvl+0xd6/0x122 [ 587.029041][T20625] dump_stack+0x11/0x1b [ 587.033195][T20625] should_fail+0x23c/0x250 [ 587.037599][T20625] ? alloc_super+0x3a/0x520 [ 587.042108][T20625] __should_failslab+0x81/0x90 [ 587.046924][T20625] should_failslab+0x5/0x20 [ 587.051443][T20625] kmem_cache_alloc_trace+0x52/0x350 [ 587.056754][T20625] ? preempt_count_add+0x4e/0x90 [ 587.061717][T20625] ? mount_bdev+0x290/0x290 [ 587.066204][T20625] alloc_super+0x3a/0x520 [ 587.070602][T20625] ? mount_bdev+0x290/0x290 [ 587.075180][T20625] sget+0x189/0x370 [ 587.078970][T20625] ? test_bdev_super+0x30/0x30 [ 587.083766][T20625] mount_bdev+0xd3/0x290 [ 587.087994][T20625] ? ext4_mount+0x40/0x40 [ 587.092380][T20625] ? ext4_errno_to_code+0x110/0x110 [ 587.097564][T20625] ext4_mount+0x2d/0x40 [ 587.101752][T20625] legacy_get_tree+0x70/0xc0 [ 587.106342][T20625] vfs_get_tree+0x4a/0x1a0 [ 587.110742][T20625] path_mount+0x11cf/0x1c40 [ 587.115337][T20625] ? kmem_cache_free+0x65/0x110 [ 587.120172][T20625] __se_sys_mount+0x24b/0x2f0 [ 587.124861][T20625] ? __this_cpu_preempt_check+0x18/0x20 [ 587.130424][T20625] __x64_sys_mount+0x63/0x70 [ 587.135003][T20625] do_syscall_64+0x44/0xd0 [ 587.139407][T20625] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 587.145320][T20625] RIP: 0033:0x7f7ca8c3202a [ 587.149722][T20625] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 587.169433][T20625] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 587.177827][T20625] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 587.185785][T20625] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 22:16:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 587.193749][T20625] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 587.201703][T20625] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 587.209660][T20625] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 587.217793][T20625] [ 587.227282][T20627] loop3: detected capacity change from 0 to 52 22:16:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 68) 22:16:55 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 42) [ 587.243119][T20617] loop4: detected capacity change from 0 to 8 [ 587.250142][T20617] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 587.262083][T20627] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1100, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 587.298440][T20627] loop3: detected capacity change from 0 to 52 [ 587.306334][T20627] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 587.353417][T20629] loop2: detected capacity change from 0 to 264192 [ 587.374674][T20629] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 587.416371][T20633] loop5: detected capacity change from 0 to 4096 [ 587.430532][T20629] loop2: detected capacity change from 0 to 264192 [ 587.431060][T20633] FAULT_INJECTION: forcing a failure. [ 587.431060][T20633] name failslab, interval 1, probability 0, space 0, times 0 [ 587.437974][T20634] loop0: detected capacity change from 0 to 6 [ 587.449725][T20633] CPU: 1 PID: 20633 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 587.457027][T20634] FAULT_INJECTION: forcing a failure. [ 587.457027][T20634] name failslab, interval 1, probability 0, space 0, times 0 [ 587.464484][T20633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 587.464536][T20633] Call Trace: [ 587.464543][T20633] [ 587.464551][T20633] dump_stack_lvl+0xd6/0x122 [ 587.497991][T20633] dump_stack+0x11/0x1b [ 587.502131][T20633] should_fail+0x23c/0x250 [ 587.506575][T20633] ? kzalloc+0x1d/0x30 [ 587.510656][T20633] __should_failslab+0x81/0x90 [ 587.515430][T20633] should_failslab+0x5/0x20 [ 587.520002][T20633] __kmalloc+0x6f/0x370 [ 587.524235][T20633] kzalloc+0x1d/0x30 [ 587.528192][T20633] security_sb_alloc+0x3c/0x180 [ 587.533054][T20633] alloc_super+0x10b/0x520 [ 587.537460][T20633] ? mount_bdev+0x290/0x290 [ 587.541967][T20633] sget+0x189/0x370 [ 587.545837][T20633] ? test_bdev_super+0x30/0x30 [ 587.550652][T20633] mount_bdev+0xd3/0x290 [ 587.554885][T20633] ? ext4_mount+0x40/0x40 [ 587.559214][T20633] ? ext4_errno_to_code+0x110/0x110 [ 587.564407][T20633] ext4_mount+0x2d/0x40 [ 587.568596][T20633] legacy_get_tree+0x70/0xc0 [ 587.573174][T20633] vfs_get_tree+0x4a/0x1a0 [ 587.577676][T20633] path_mount+0x11cf/0x1c40 [ 587.582177][T20633] ? kmem_cache_free+0x65/0x110 [ 587.587029][T20633] __se_sys_mount+0x24b/0x2f0 [ 587.591689][T20633] ? __this_cpu_preempt_check+0x18/0x20 [ 587.597276][T20633] __x64_sys_mount+0x63/0x70 [ 587.601869][T20633] do_syscall_64+0x44/0xd0 [ 587.606388][T20633] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 587.612380][T20633] RIP: 0033:0x7f7ca8c3202a [ 587.616787][T20633] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 587.636381][T20633] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 587.645128][T20633] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 587.653084][T20633] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 587.661155][T20633] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 587.669151][T20633] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 587.677182][T20633] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 587.685165][T20633] [ 587.688175][T20634] CPU: 0 PID: 20634 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 587.696940][T20634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 587.706996][T20634] Call Trace: [ 587.710364][T20634] [ 587.713288][T20634] dump_stack_lvl+0xd6/0x122 [ 587.717882][T20634] dump_stack+0x11/0x1b [ 587.722043][T20634] should_fail+0x23c/0x250 [ 587.726458][T20634] ? strndup_user+0x64/0xa0 [ 587.730969][T20634] __should_failslab+0x81/0x90 [ 587.735742][T20634] should_failslab+0x5/0x20 [ 587.740239][T20634] __kmalloc_track_caller+0x6d/0x370 [ 587.745705][T20634] memdup_user+0x22/0xb0 [ 587.749949][T20634] strndup_user+0x64/0xa0 [ 587.750530][T20629] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 587.754279][T20634] __se_sys_mount+0x91/0x2f0 [ 587.754303][T20634] __x64_sys_mount+0x63/0x70 [ 587.754320][T20634] do_syscall_64+0x44/0xd0 [ 587.754339][T20634] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 587.754361][T20634] RIP: 0033:0x7fa83371d02a [ 587.754375][T20634] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 587.754390][T20634] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 587.816857][T20634] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 587.824830][T20634] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 587.832785][T20634] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 587.840739][T20634] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 587.848697][T20634] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 587.856832][T20634] 22:16:56 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x2030000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 587.863120][T20636] loop4: detected capacity change from 0 to 8 22:16:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) 22:16:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 69) 22:16:56 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 43) [ 587.896797][T20636] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1200, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 587.960466][T20636] loop4: detected capacity change from 0 to 8 [ 587.960650][T20639] loop3: detected capacity change from 0 to 54 [ 587.967041][T20636] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 587.996884][T20639] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 588.048496][T20639] loop3: detected capacity change from 0 to 54 [ 588.055469][T20639] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 588.124664][T20645] loop5: detected capacity change from 0 to 4096 [ 588.141884][T20645] FAULT_INJECTION: forcing a failure. [ 588.141884][T20645] name failslab, interval 1, probability 0, space 0, times 0 [ 588.154611][T20645] CPU: 1 PID: 20645 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 588.163480][T20645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.173530][T20645] Call Trace: [ 588.176809][T20645] [ 588.179737][T20645] dump_stack_lvl+0xd6/0x122 [ 588.184335][T20645] dump_stack+0x11/0x1b [ 588.188519][T20645] should_fail+0x23c/0x250 [ 588.193009][T20645] ? __list_lru_init+0x70/0x6d0 [ 588.197985][T20645] __should_failslab+0x81/0x90 [ 588.202854][T20645] should_failslab+0x5/0x20 [ 588.207501][T20645] __kmalloc+0x6f/0x370 [ 588.211665][T20645] ? prealloc_memcg_shrinker+0x444/0x460 [ 588.217297][T20645] __list_lru_init+0x70/0x6d0 [ 588.222066][T20645] alloc_super+0x490/0x520 [ 588.226490][T20645] ? mount_bdev+0x290/0x290 [ 588.230986][T20645] sget+0x189/0x370 [ 588.234792][T20645] ? test_bdev_super+0x30/0x30 [ 588.239595][T20645] mount_bdev+0xd3/0x290 [ 588.243849][T20645] ? ext4_mount+0x40/0x40 [ 588.248227][T20645] ? ext4_errno_to_code+0x110/0x110 [ 588.253429][T20645] ext4_mount+0x2d/0x40 [ 588.257647][T20645] legacy_get_tree+0x70/0xc0 [ 588.262244][T20645] vfs_get_tree+0x4a/0x1a0 [ 588.266665][T20645] path_mount+0x11cf/0x1c40 [ 588.271162][T20645] ? kmem_cache_free+0x65/0x110 [ 588.276052][T20645] __se_sys_mount+0x24b/0x2f0 [ 588.280806][T20645] ? __this_cpu_preempt_check+0x18/0x20 [ 588.286356][T20645] __x64_sys_mount+0x63/0x70 [ 588.290941][T20645] do_syscall_64+0x44/0xd0 [ 588.295372][T20645] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 588.301263][T20645] RIP: 0033:0x7f7ca8c3202a [ 588.305669][T20645] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 588.325317][T20645] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 588.333787][T20645] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 588.341751][T20645] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 588.349725][T20645] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 588.357746][T20645] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 588.365740][T20645] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 588.373747][T20645] [ 588.377716][T20646] loop0: detected capacity change from 0 to 6 [ 588.385178][T20646] FAULT_INJECTION: forcing a failure. [ 588.385178][T20646] name failslab, interval 1, probability 0, space 0, times 0 [ 588.397834][T20646] CPU: 1 PID: 20646 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 588.406595][T20646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.416645][T20646] Call Trace: [ 588.419917][T20646] [ 588.422841][T20646] dump_stack_lvl+0xd6/0x122 [ 588.427435][T20646] dump_stack+0x11/0x1b [ 588.431586][T20646] should_fail+0x23c/0x250 [ 588.435991][T20646] ? __se_sys_mount+0xf7/0x2f0 [ 588.440753][T20646] __should_failslab+0x81/0x90 [ 588.445516][T20646] should_failslab+0x5/0x20 [ 588.450018][T20646] kmem_cache_alloc_trace+0x52/0x350 [ 588.455299][T20646] ? memdup_user+0x96/0xb0 [ 588.459712][T20646] __se_sys_mount+0xf7/0x2f0 [ 588.464293][T20646] __x64_sys_mount+0x63/0x70 [ 588.468875][T20646] do_syscall_64+0x44/0xd0 [ 588.473288][T20646] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 588.479176][T20646] RIP: 0033:0x7fa83371d02a [ 588.483587][T20646] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 588.503186][T20646] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 588.511597][T20646] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a 22:16:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 70) [ 588.519563][T20646] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 588.527621][T20646] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 588.535588][T20646] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 588.543554][T20646] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 588.551609][T20646] [ 588.557555][T20649] loop2: detected capacity change from 0 to 264192 22:16:56 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 44) [ 588.588994][T20649] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 588.638616][T20649] loop2: detected capacity change from 0 to 264192 [ 588.646586][T20649] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 588.660027][T20651] loop4: detected capacity change from 0 to 9 [ 588.695871][T20651] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 588.767441][T20653] loop3: detected capacity change from 0 to 58 [ 588.780445][T20651] loop4: detected capacity change from 0 to 9 [ 588.791044][T20651] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 588.808654][T20653] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 588.837392][T20656] loop5: detected capacity change from 0 to 4096 [ 588.860655][T20653] loop3: detected capacity change from 0 to 58 [ 588.860667][T20658] loop0: detected capacity change from 0 to 6 [ 588.867228][T20656] FAULT_INJECTION: forcing a failure. [ 588.867228][T20656] name failslab, interval 1, probability 0, space 0, times 0 [ 588.880779][T20658] FAULT_INJECTION: forcing a failure. [ 588.880779][T20658] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 588.885607][T20656] CPU: 1 PID: 20656 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 588.907276][T20656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.917318][T20656] Call Trace: [ 588.920581][T20656] [ 588.923496][T20656] dump_stack_lvl+0xd6/0x122 [ 588.928078][T20656] dump_stack+0x11/0x1b [ 588.932298][T20656] should_fail+0x23c/0x250 [ 588.936698][T20656] __should_failslab+0x81/0x90 [ 588.941450][T20656] should_failslab+0x5/0x20 [ 588.945979][T20656] kmem_cache_alloc_node_trace+0x61/0x310 [ 588.951684][T20656] ? should_fail+0xd6/0x250 [ 588.956195][T20656] ? __kmalloc_node+0x30/0x40 [ 588.960855][T20656] __kmalloc_node+0x30/0x40 [ 588.965363][T20656] kvmalloc_node+0x81/0x110 [ 588.969916][T20656] __list_lru_init+0x2f7/0x6d0 [ 588.974721][T20656] alloc_super+0x490/0x520 [ 588.979307][T20656] ? mount_bdev+0x290/0x290 [ 588.983795][T20656] sget+0x189/0x370 [ 588.988021][T20656] ? test_bdev_super+0x30/0x30 [ 588.992813][T20656] mount_bdev+0xd3/0x290 [ 588.997042][T20656] ? ext4_mount+0x40/0x40 [ 589.001355][T20656] ? ext4_errno_to_code+0x110/0x110 [ 589.006548][T20656] ext4_mount+0x2d/0x40 [ 589.010811][T20656] legacy_get_tree+0x70/0xc0 [ 589.015400][T20656] vfs_get_tree+0x4a/0x1a0 [ 589.019882][T20656] path_mount+0x11cf/0x1c40 [ 589.024461][T20656] ? kmem_cache_free+0x65/0x110 [ 589.029377][T20656] __se_sys_mount+0x24b/0x2f0 [ 589.034045][T20656] ? __this_cpu_preempt_check+0x18/0x20 [ 589.039614][T20656] __x64_sys_mount+0x63/0x70 [ 589.044215][T20656] do_syscall_64+0x44/0xd0 [ 589.048630][T20656] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 589.054509][T20656] RIP: 0033:0x7f7ca8c3202a [ 589.058910][T20656] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 589.078503][T20656] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 589.087073][T20656] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 589.095030][T20656] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 589.102992][T20656] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 589.110963][T20656] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 589.118916][T20656] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 589.126924][T20656] [ 589.129926][T20658] CPU: 0 PID: 20658 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 589.138696][T20658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.141538][T20653] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 589.148747][T20658] Call Trace: [ 589.148756][T20658] [ 589.148762][T20658] dump_stack_lvl+0xd6/0x122 [ 589.148785][T20658] dump_stack+0x11/0x1b [ 589.148801][T20658] should_fail+0x23c/0x250 [ 589.148818][T20658] should_fail_usercopy+0x16/0x20 [ 589.183257][T20658] _copy_from_user+0x1c/0xd0 [ 589.187867][T20658] __se_sys_mount+0x119/0x2f0 [ 589.192541][T20658] __x64_sys_mount+0x63/0x70 [ 589.197129][T20658] do_syscall_64+0x44/0xd0 [ 589.201532][T20658] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 589.207415][T20658] RIP: 0033:0x7fa83371d02a [ 589.211811][T20658] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 589.231400][T20658] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 589.239886][T20658] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 589.247839][T20658] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 589.255794][T20658] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 22:16:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:57 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x2040000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 589.263760][T20658] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 589.271715][T20658] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 589.279849][T20658] [ 589.287409][T20658] FAT-fs (loop0): Directory bread(block 6) failed 22:16:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 71) 22:16:57 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 45) [ 589.341129][T20661] loop2: detected capacity change from 0 to 264192 [ 589.370127][T20661] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 589.439343][T20661] loop2: detected capacity change from 0 to 264192 [ 589.446235][T20661] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 589.581390][T20666] loop4: detected capacity change from 0 to 16 [ 589.600161][T20666] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 589.627708][T20668] loop0: detected capacity change from 0 to 6 [ 589.635076][T20670] loop5: detected capacity change from 0 to 4096 [ 589.643123][T20668] FAULT_INJECTION: forcing a failure. [ 589.643123][T20668] name failslab, interval 1, probability 0, space 0, times 0 [ 589.651963][T20666] loop4: detected capacity change from 0 to 16 [ 589.655870][T20668] CPU: 0 PID: 20668 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 589.663901][T20672] loop3: detected capacity change from 0 to 61 [ 589.670707][T20668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.670720][T20668] Call Trace: [ 589.670726][T20668] [ 589.670732][T20668] dump_stack_lvl+0xd6/0x122 [ 589.670756][T20668] dump_stack+0x11/0x1b [ 589.679848][T20670] FAULT_INJECTION: forcing a failure. [ 589.679848][T20670] name failslab, interval 1, probability 0, space 0, times 0 [ 589.686947][T20668] should_fail+0x23c/0x250 [ 589.686972][T20668] ? getname_flags+0x84/0x3f0 [ 589.686988][T20668] __should_failslab+0x81/0x90 [ 589.687008][T20668] should_failslab+0x5/0x20 [ 589.732850][T20668] kmem_cache_alloc+0x4f/0x320 [ 589.737612][T20668] getname_flags+0x84/0x3f0 [ 589.742099][T20668] ? should_fail+0xd6/0x250 [ 589.746630][T20668] user_path_at_empty+0x28/0x110 [ 589.751550][T20668] __se_sys_mount+0x217/0x2f0 [ 589.756216][T20668] __x64_sys_mount+0x63/0x70 [ 589.760794][T20668] do_syscall_64+0x44/0xd0 [ 589.765199][T20668] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 589.771166][T20668] RIP: 0033:0x7fa83371d02a [ 589.775584][T20668] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 589.795264][T20668] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 589.803657][T20668] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 589.811625][T20668] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 589.819578][T20668] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 589.827530][T20668] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 589.835485][T20668] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 589.843444][T20668] [ 589.846446][T20670] CPU: 1 PID: 20670 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 589.855263][T20670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.865337][T20670] Call Trace: [ 589.868612][T20670] [ 589.871573][T20670] dump_stack_lvl+0xd6/0x122 [ 589.876318][T20670] dump_stack+0x11/0x1b [ 589.880473][T20670] should_fail+0x23c/0x250 [ 589.885082][T20670] __should_failslab+0x81/0x90 [ 589.889879][T20670] should_failslab+0x5/0x20 [ 589.894383][T20670] kmem_cache_alloc_node_trace+0x61/0x310 [ 589.900416][T20670] ? should_fail+0xd6/0x250 [ 589.904975][T20670] ? __kmalloc_node+0x30/0x40 [ 589.909733][T20670] __kmalloc_node+0x30/0x40 [ 589.914260][T20670] kvmalloc_node+0x81/0x110 [ 589.918767][T20670] __list_lru_init+0x2f7/0x6d0 [ 589.923525][T20670] alloc_super+0x490/0x520 [ 589.927941][T20670] ? mount_bdev+0x290/0x290 [ 589.932455][T20670] sget+0x189/0x370 [ 589.936315][T20670] ? test_bdev_super+0x30/0x30 [ 589.941076][T20670] mount_bdev+0xd3/0x290 [ 589.945394][T20670] ? ext4_mount+0x40/0x40 [ 589.949727][T20670] ? ext4_errno_to_code+0x110/0x110 [ 589.954960][T20670] ext4_mount+0x2d/0x40 [ 589.959122][T20670] legacy_get_tree+0x70/0xc0 [ 589.963708][T20670] vfs_get_tree+0x4a/0x1a0 [ 589.968173][T20670] path_mount+0x11cf/0x1c40 [ 589.972672][T20670] ? kmem_cache_free+0x65/0x110 [ 589.977531][T20670] __se_sys_mount+0x24b/0x2f0 [ 589.982198][T20670] ? __this_cpu_preempt_check+0x18/0x20 [ 589.987750][T20670] __x64_sys_mount+0x63/0x70 [ 589.992419][T20670] do_syscall_64+0x44/0xd0 [ 589.996836][T20670] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 590.002728][T20670] RIP: 0033:0x7f7ca8c3202a [ 590.007160][T20670] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 590.026846][T20670] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 590.035267][T20670] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 590.043240][T20670] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 590.051283][T20670] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 590.059252][T20670] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 590.067243][T20670] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 590.075215][T20670] [ 590.080996][T20666] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 590.092901][T20672] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 590.111660][T20675] loop2: detected capacity change from 0 to 264192 22:16:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:58 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 46) 22:16:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 72) [ 590.126165][T20675] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 590.142507][T20672] loop3: detected capacity change from 0 to 61 [ 590.149756][T20672] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9d05, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="0a000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 590.199726][T20675] loop2: detected capacity change from 0 to 264192 [ 590.206603][T20675] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 590.306940][T20680] loop5: detected capacity change from 0 to 4096 [ 590.317892][T20679] loop0: detected capacity change from 0 to 6 [ 590.325584][T20679] FAULT_INJECTION: forcing a failure. [ 590.325584][T20679] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 590.329325][T20680] FAULT_INJECTION: forcing a failure. [ 590.329325][T20680] name failslab, interval 1, probability 0, space 0, times 0 [ 590.338720][T20679] CPU: 0 PID: 20679 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 590.360013][T20679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.370055][T20679] Call Trace: [ 590.373318][T20679] [ 590.376235][T20679] dump_stack_lvl+0xd6/0x122 [ 590.380814][T20679] dump_stack+0x11/0x1b [ 590.384957][T20679] should_fail+0x23c/0x250 [ 590.389357][T20679] should_fail_usercopy+0x16/0x20 [ 590.394364][T20679] strncpy_from_user+0x21/0x250 [ 590.399203][T20679] getname_flags+0xb8/0x3f0 [ 590.403698][T20679] ? should_fail+0xd6/0x250 [ 590.408214][T20679] user_path_at_empty+0x28/0x110 [ 590.413133][T20679] __se_sys_mount+0x217/0x2f0 [ 590.417793][T20679] __x64_sys_mount+0x63/0x70 [ 590.422364][T20679] do_syscall_64+0x44/0xd0 [ 590.426767][T20679] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 590.432644][T20679] RIP: 0033:0x7fa83371d02a [ 590.437040][T20679] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 590.456629][T20679] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 590.465035][T20679] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 590.472992][T20679] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 590.480946][T20679] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 590.488900][T20679] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 590.496860][T20679] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 590.504845][T20679] [ 590.507857][T20680] CPU: 1 PID: 20680 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 590.516636][T20680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.526728][T20680] Call Trace: [ 590.530008][T20680] [ 590.532932][T20680] dump_stack_lvl+0xd6/0x122 [ 590.537531][T20680] dump_stack+0x11/0x1b [ 590.541813][T20680] should_fail+0x23c/0x250 [ 590.546468][T20680] ? __list_lru_init+0x352/0x6d0 [ 590.551409][T20680] __should_failslab+0x81/0x90 [ 590.556181][T20680] should_failslab+0x5/0x20 [ 590.561098][T20680] kmem_cache_alloc_trace+0x52/0x350 [ 590.566387][T20680] ? __list_lru_init+0x352/0x6d0 [ 590.571392][T20680] __list_lru_init+0x352/0x6d0 [ 590.576221][T20680] alloc_super+0x490/0x520 [ 590.580644][T20680] ? mount_bdev+0x290/0x290 [ 590.585195][T20680] sget+0x189/0x370 [ 590.589079][T20680] ? test_bdev_super+0x30/0x30 [ 590.593837][T20680] mount_bdev+0xd3/0x290 [ 590.598113][T20680] ? ext4_mount+0x40/0x40 [ 590.602472][T20680] ? ext4_errno_to_code+0x110/0x110 [ 590.607676][T20680] ext4_mount+0x2d/0x40 [ 590.611840][T20680] legacy_get_tree+0x70/0xc0 [ 590.616444][T20680] vfs_get_tree+0x4a/0x1a0 [ 590.620931][T20680] path_mount+0x11cf/0x1c40 [ 590.625486][T20680] ? kmem_cache_free+0x65/0x110 [ 590.630339][T20680] __se_sys_mount+0x24b/0x2f0 [ 590.635074][T20680] ? __this_cpu_preempt_check+0x18/0x20 [ 590.640626][T20680] __x64_sys_mount+0x63/0x70 [ 590.645290][T20680] do_syscall_64+0x44/0xd0 [ 590.649727][T20680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 590.655732][T20680] RIP: 0033:0x7f7ca8c3202a [ 590.660203][T20680] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 590.679885][T20680] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 590.688400][T20680] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 590.696372][T20680] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 22:16:59 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x4000000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 590.704344][T20680] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 590.712345][T20680] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 590.720580][T20680] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 590.728619][T20680] 22:16:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 73) 22:16:59 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 47) [ 590.775727][T20686] loop4: detected capacity change from 0 to 16 [ 590.776347][T20688] loop3: detected capacity change from 0 to 78 [ 590.810785][T20686] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 590.810824][T20688] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 590.851672][T20688] loop3: detected capacity change from 0 to 78 [ 590.855844][T20689] loop2: detected capacity change from 0 to 264192 [ 590.859569][T20688] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc305, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2200, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 590.878358][T20689] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 590.890885][T20686] loop4: detected capacity change from 0 to 16 [ 590.898208][T20686] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 590.942640][T20689] loop2: detected capacity change from 0 to 264192 [ 590.951426][T20689] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 591.050737][T20694] loop5: detected capacity change from 0 to 4096 [ 591.062218][T20694] FAULT_INJECTION: forcing a failure. [ 591.062218][T20694] name failslab, interval 1, probability 0, space 0, times 0 [ 591.065981][T20695] loop0: detected capacity change from 0 to 6 [ 591.074900][T20694] CPU: 1 PID: 20694 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 591.089726][T20694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.098421][T20695] FAULT_INJECTION: forcing a failure. [ 591.098421][T20695] name failslab, interval 1, probability 0, space 0, times 0 [ 591.099777][T20694] Call Trace: [ 591.099785][T20694] [ 591.099792][T20694] dump_stack_lvl+0xd6/0x122 [ 591.123158][T20694] dump_stack+0x11/0x1b [ 591.127315][T20694] should_fail+0x23c/0x250 [ 591.131729][T20694] ? __list_lru_init+0x352/0x6d0 [ 591.136659][T20694] __should_failslab+0x81/0x90 [ 591.141425][T20694] should_failslab+0x5/0x20 [ 591.146009][T20694] kmem_cache_alloc_trace+0x52/0x350 [ 591.151288][T20694] ? __list_lru_init+0x352/0x6d0 [ 591.156234][T20694] __list_lru_init+0x352/0x6d0 [ 591.160996][T20694] alloc_super+0x490/0x520 [ 591.165404][T20694] ? mount_bdev+0x290/0x290 [ 591.169887][T20694] sget+0x189/0x370 [ 591.173680][T20694] ? test_bdev_super+0x30/0x30 [ 591.178428][T20694] mount_bdev+0xd3/0x290 [ 591.182656][T20694] ? ext4_mount+0x40/0x40 [ 591.186972][T20694] ? ext4_errno_to_code+0x110/0x110 [ 591.192156][T20694] ext4_mount+0x2d/0x40 [ 591.196498][T20694] legacy_get_tree+0x70/0xc0 [ 591.201072][T20694] vfs_get_tree+0x4a/0x1a0 [ 591.205472][T20694] path_mount+0x11cf/0x1c40 [ 591.209999][T20694] ? kmem_cache_free+0x65/0x110 [ 591.214836][T20694] __se_sys_mount+0x24b/0x2f0 [ 591.219551][T20694] ? __this_cpu_preempt_check+0x18/0x20 [ 591.225228][T20694] __x64_sys_mount+0x63/0x70 [ 591.229991][T20694] do_syscall_64+0x44/0xd0 [ 591.234394][T20694] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 591.240336][T20694] RIP: 0033:0x7f7ca8c3202a [ 591.244731][T20694] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 591.264470][T20694] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 591.272879][T20694] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 591.280835][T20694] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 591.288794][T20694] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 591.296749][T20694] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 591.304769][T20694] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 591.312725][T20694] [ 591.315730][T20695] CPU: 0 PID: 20695 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 591.324586][T20695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.334638][T20695] Call Trace: [ 591.337917][T20695] [ 591.340848][T20695] dump_stack_lvl+0xd6/0x122 [ 591.345500][T20695] dump_stack+0x11/0x1b [ 591.349680][T20695] should_fail+0x23c/0x250 [ 591.354104][T20695] ? alloc_fs_context+0x46/0x500 [ 591.359043][T20695] __should_failslab+0x81/0x90 [ 591.363879][T20695] should_failslab+0x5/0x20 [ 591.368385][T20695] kmem_cache_alloc_trace+0x52/0x350 [ 591.373710][T20695] alloc_fs_context+0x46/0x500 [ 591.378481][T20695] ? strncmp+0x34/0x70 [ 591.382616][T20695] fs_context_for_mount+0x1d/0x20 [ 591.387648][T20695] path_mount+0xdf0/0x1c40 [ 591.392086][T20695] ? kmem_cache_free+0x65/0x110 [ 591.396985][T20695] __se_sys_mount+0x24b/0x2f0 [ 591.401672][T20695] __x64_sys_mount+0x63/0x70 [ 591.406264][T20695] do_syscall_64+0x44/0xd0 [ 591.410726][T20695] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 591.416627][T20695] RIP: 0033:0x7fa83371d02a [ 591.421066][T20695] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 591.440885][T20695] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 591.449300][T20695] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 591.457279][T20695] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 591.465251][T20695] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 591.473282][T20695] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 591.481251][T20695] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 591.489343][T20695] [ 591.495593][T20699] loop3: detected capacity change from 0 to 97 22:16:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 74) [ 591.516767][T20699] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 591.531006][T20701] loop4: detected capacity change from 0 to 17 [ 591.546142][T20702] loop2: detected capacity change from 0 to 264192 22:16:59 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 48) [ 591.557875][T20701] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 591.576161][T20702] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 591.588516][T20699] loop3: detected capacity change from 0 to 97 [ 591.595519][T20699] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 591.619279][T20701] loop4: detected capacity change from 0 to 17 [ 591.625988][T20701] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:16:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:16:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 591.664122][T20702] loop2: detected capacity change from 0 to 264192 [ 591.672132][T20702] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 591.751073][T20705] loop5: detected capacity change from 0 to 4096 [ 591.768971][T20705] FAULT_INJECTION: forcing a failure. [ 591.768971][T20705] name failslab, interval 1, probability 0, space 0, times 0 [ 591.781710][T20705] CPU: 1 PID: 20705 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 591.790473][T20705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.800525][T20705] Call Trace: [ 591.803798][T20705] [ 591.806717][T20705] dump_stack_lvl+0xd6/0x122 [ 591.811323][T20705] dump_stack+0x11/0x1b [ 591.815479][T20705] should_fail+0x23c/0x250 [ 591.819988][T20705] ? __list_lru_init+0x352/0x6d0 [ 591.824937][T20705] __should_failslab+0x81/0x90 [ 591.829699][T20705] should_failslab+0x5/0x20 [ 591.834196][T20705] kmem_cache_alloc_trace+0x52/0x350 [ 591.839512][T20705] ? __list_lru_init+0x352/0x6d0 [ 591.844450][T20705] __list_lru_init+0x352/0x6d0 [ 591.849220][T20705] alloc_super+0x490/0x520 [ 591.853668][T20705] ? mount_bdev+0x290/0x290 [ 591.858174][T20705] sget+0x189/0x370 [ 591.861988][T20705] ? test_bdev_super+0x30/0x30 [ 591.866780][T20705] mount_bdev+0xd3/0x290 [ 591.871019][T20705] ? ext4_mount+0x40/0x40 [ 591.875349][T20705] ? ext4_errno_to_code+0x110/0x110 [ 591.880550][T20705] ext4_mount+0x2d/0x40 [ 591.884869][T20705] legacy_get_tree+0x70/0xc0 [ 591.889457][T20705] vfs_get_tree+0x4a/0x1a0 [ 591.893950][T20705] path_mount+0x11cf/0x1c40 [ 591.898457][T20705] ? kmem_cache_free+0x65/0x110 [ 591.903315][T20705] __se_sys_mount+0x24b/0x2f0 [ 591.908065][T20705] ? __this_cpu_preempt_check+0x18/0x20 [ 591.913643][T20705] __x64_sys_mount+0x63/0x70 [ 591.918237][T20705] do_syscall_64+0x44/0xd0 [ 591.922697][T20705] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 591.928708][T20705] RIP: 0033:0x7f7ca8c3202a [ 591.933190][T20705] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 591.952793][T20705] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 591.961275][T20705] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 591.969241][T20705] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 591.977209][T20705] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 591.985184][T20705] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 591.993157][T20705] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 592.001225][T20705] 22:17:00 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x6040000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:17:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 75) [ 592.024582][T20709] loop0: detected capacity change from 0 to 6 [ 592.052163][T20709] FAULT_INJECTION: forcing a failure. [ 592.052163][T20709] name failslab, interval 1, probability 0, space 0, times 0 [ 592.064867][T20709] CPU: 0 PID: 20709 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 592.073648][T20709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.083695][T20709] Call Trace: [ 592.086973][T20709] [ 592.089913][T20709] dump_stack_lvl+0xd6/0x122 [ 592.094506][T20709] dump_stack+0x11/0x1b [ 592.098664][T20709] should_fail+0x23c/0x250 [ 592.103209][T20709] ? legacy_init_fs_context+0x2d/0x70 [ 592.108709][T20709] __should_failslab+0x81/0x90 [ 592.113473][T20709] should_failslab+0x5/0x20 [ 592.117994][T20709] kmem_cache_alloc_trace+0x52/0x350 [ 592.123289][T20709] ? kmem_cache_alloc_trace+0x24b/0x350 [ 592.128840][T20709] legacy_init_fs_context+0x2d/0x70 [ 592.134059][T20709] alloc_fs_context+0x419/0x500 [ 592.139607][T20709] fs_context_for_mount+0x1d/0x20 [ 592.144681][T20709] path_mount+0xdf0/0x1c40 [ 592.149196][T20709] ? kmem_cache_free+0x65/0x110 [ 592.154189][T20709] __se_sys_mount+0x24b/0x2f0 [ 592.158871][T20709] __x64_sys_mount+0x63/0x70 [ 592.163469][T20709] do_syscall_64+0x44/0xd0 [ 592.167892][T20709] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 592.168326][T20713] loop4: detected capacity change from 0 to 18 [ 592.173878][T20709] RIP: 0033:0x7fa83371d02a [ 592.173898][T20709] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 592.200531][T20713] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 592.204024][T20709] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 592.204047][T20709] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 592.204060][T20709] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 592.238561][T20709] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 592.246598][T20709] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 592.254570][T20709] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 592.262736][T20709] 22:17:00 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 49) [ 592.293494][T20717] loop2: detected capacity change from 0 to 264192 [ 592.293664][T20718] loop5: detected capacity change from 0 to 4096 [ 592.300845][T20719] loop3: detected capacity change from 0 to 118 [ 592.316123][T20713] loop4: detected capacity change from 0 to 18 [ 592.322987][T20713] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 592.336117][T20718] FAULT_INJECTION: forcing a failure. [ 592.336117][T20718] name failslab, interval 1, probability 0, space 0, times 0 [ 592.348939][T20718] CPU: 1 PID: 20718 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 592.357787][T20718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.367908][T20718] Call Trace: [ 592.371191][T20718] [ 592.374118][T20718] dump_stack_lvl+0xd6/0x122 [ 592.378708][T20718] dump_stack+0x11/0x1b [ 592.382864][T20718] should_fail+0x23c/0x250 [ 592.387410][T20718] ? __list_lru_init+0x352/0x6d0 [ 592.392440][T20718] __should_failslab+0x81/0x90 [ 592.397208][T20718] should_failslab+0x5/0x20 [ 592.401809][T20718] kmem_cache_alloc_trace+0x52/0x350 [ 592.407120][T20718] ? __list_lru_init+0x352/0x6d0 [ 592.412186][T20718] __list_lru_init+0x352/0x6d0 [ 592.416946][T20718] alloc_super+0x490/0x520 [ 592.421433][T20718] ? mount_bdev+0x290/0x290 [ 592.425969][T20718] sget+0x189/0x370 [ 592.429852][T20718] ? test_bdev_super+0x30/0x30 [ 592.434616][T20718] mount_bdev+0xd3/0x290 [ 592.438880][T20718] ? ext4_mount+0x40/0x40 [ 592.443209][T20718] ? ext4_errno_to_code+0x110/0x110 [ 592.448406][T20718] ext4_mount+0x2d/0x40 [ 592.452641][T20718] legacy_get_tree+0x70/0xc0 [ 592.457252][T20718] vfs_get_tree+0x4a/0x1a0 [ 592.461665][T20718] path_mount+0x11cf/0x1c40 [ 592.466161][T20718] ? kmem_cache_free+0x65/0x110 [ 592.471078][T20718] __se_sys_mount+0x24b/0x2f0 [ 592.475756][T20718] ? __this_cpu_preempt_check+0x18/0x20 [ 592.481354][T20718] __x64_sys_mount+0x63/0x70 [ 592.485942][T20718] do_syscall_64+0x44/0xd0 [ 592.490466][T20718] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 592.496384][T20718] RIP: 0033:0x7f7ca8c3202a [ 592.500794][T20718] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 592.520605][T20718] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 592.529018][T20718] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 592.536990][T20718] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 22:17:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 592.544960][T20718] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 592.552929][T20718] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 592.560956][T20718] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 592.568984][T20718] [ 592.573527][T20719] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 592.581855][T20717] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 76) [ 592.605013][T20719] loop3: detected capacity change from 0 to 118 [ 592.612329][T20719] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfeff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 592.660412][T20717] loop2: detected capacity change from 0 to 264192 [ 592.672183][T20717] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 592.843996][T20725] loop0: detected capacity change from 0 to 6 [ 592.851675][T20725] FAULT_INJECTION: forcing a failure. [ 592.851675][T20725] name failslab, interval 1, probability 0, space 0, times 0 [ 592.864387][T20725] CPU: 1 PID: 20725 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 592.873421][T20725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.883470][T20725] Call Trace: [ 592.886745][T20725] [ 592.889693][T20725] dump_stack_lvl+0xd6/0x122 [ 592.894284][T20725] dump_stack+0x11/0x1b [ 592.898576][T20725] should_fail+0x23c/0x250 [ 592.903084][T20725] ? vfs_parse_fs_string+0x6d/0xd0 [ 592.908194][T20725] __should_failslab+0x81/0x90 [ 592.913041][T20725] should_failslab+0x5/0x20 [ 592.917546][T20725] __kmalloc_track_caller+0x6d/0x370 [ 592.922835][T20725] kmemdup_nul+0x27/0x70 [ 592.927110][T20725] vfs_parse_fs_string+0x6d/0xd0 [ 592.932063][T20725] path_mount+0xf94/0x1c40 [ 592.936476][T20725] ? kmem_cache_free+0x65/0x110 [ 592.941322][T20725] __se_sys_mount+0x24b/0x2f0 [ 592.946049][T20725] __x64_sys_mount+0x63/0x70 [ 592.950649][T20725] do_syscall_64+0x44/0xd0 [ 592.955083][T20725] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 592.961079][T20725] RIP: 0033:0x7fa83371d02a [ 592.965487][T20725] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 592.985171][T20725] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 592.993592][T20725] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 593.001596][T20725] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 593.009565][T20725] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 593.017535][T20725] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 593.025503][T20725] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 593.033477][T20725] [ 593.042113][T20726] loop5: detected capacity change from 0 to 4096 [ 593.073290][T20729] loop4: detected capacity change from 0 to 31 [ 593.077747][T20726] FAULT_INJECTION: forcing a failure. [ 593.077747][T20726] name failslab, interval 1, probability 0, space 0, times 0 [ 593.092162][T20726] CPU: 0 PID: 20726 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 593.100937][T20726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 593.111001][T20726] Call Trace: [ 593.114275][T20726] [ 593.117200][T20726] dump_stack_lvl+0xd6/0x122 [ 593.121898][T20726] dump_stack+0x11/0x1b [ 593.126054][T20726] should_fail+0x23c/0x250 [ 593.130549][T20726] ? __list_lru_init+0x352/0x6d0 [ 593.135487][T20726] __should_failslab+0x81/0x90 [ 593.140281][T20726] should_failslab+0x5/0x20 [ 593.145000][T20726] kmem_cache_alloc_trace+0x52/0x350 [ 593.150287][T20726] ? __list_lru_init+0x352/0x6d0 [ 593.155402][T20726] __list_lru_init+0x352/0x6d0 [ 593.160177][T20726] alloc_super+0x490/0x520 [ 593.164594][T20726] ? mount_bdev+0x290/0x290 [ 593.169277][T20726] sget+0x189/0x370 [ 593.173130][T20726] ? test_bdev_super+0x30/0x30 [ 593.177906][T20726] mount_bdev+0xd3/0x290 [ 593.182272][T20726] ? ext4_mount+0x40/0x40 [ 593.186685][T20726] ? ext4_errno_to_code+0x110/0x110 [ 593.191914][T20726] ext4_mount+0x2d/0x40 [ 593.196070][T20726] legacy_get_tree+0x70/0xc0 [ 593.200687][T20726] vfs_get_tree+0x4a/0x1a0 [ 593.205104][T20726] path_mount+0x11cf/0x1c40 [ 593.209616][T20726] ? kmem_cache_free+0x65/0x110 [ 593.214481][T20726] __se_sys_mount+0x24b/0x2f0 [ 593.219161][T20726] ? __this_cpu_preempt_check+0x18/0x20 [ 593.224768][T20726] __x64_sys_mount+0x63/0x70 [ 593.229360][T20726] do_syscall_64+0x44/0xd0 [ 593.233775][T20726] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 593.239697][T20726] RIP: 0033:0x7f7ca8c3202a [ 593.244369][T20726] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 593.264051][T20726] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 593.272520][T20726] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 593.280551][T20726] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 593.282621][T20729] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 593.288522][T20726] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 593.288577][T20726] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 593.288588][T20726] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 22:17:01 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 50) 22:17:01 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x7000000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:17:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 77) [ 593.288604][T20726] [ 593.330956][T20732] loop3: detected capacity change from 0 to 127 [ 593.350883][T20733] loop2: detected capacity change from 0 to 264192 22:17:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 593.376392][T20729] loop4: detected capacity change from 0 to 31 [ 593.384537][T20733] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 593.384999][T20729] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 593.394814][T20732] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 593.480489][T20733] loop2: detected capacity change from 0 to 264192 [ 593.487263][T20732] loop3: detected capacity change from 0 to 127 [ 593.495713][T20733] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 593.507013][T20732] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 593.565197][T20737] loop0: detected capacity change from 0 to 6 [ 593.579474][T20737] FAULT_INJECTION: forcing a failure. [ 593.579474][T20737] name failslab, interval 1, probability 0, space 0, times 0 [ 593.592172][T20737] CPU: 1 PID: 20737 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 593.600931][T20737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 593.610982][T20737] Call Trace: [ 593.614253][T20737] [ 593.617184][T20737] dump_stack_lvl+0xd6/0x122 [ 593.621978][T20737] dump_stack+0x11/0x1b [ 593.626133][T20737] should_fail+0x23c/0x250 [ 593.630544][T20737] ? vfat_mount+0x40/0x40 [ 593.634932][T20737] ? getname_kernel+0x37/0x1d0 [ 593.639717][T20737] __should_failslab+0x81/0x90 [ 593.644606][T20737] should_failslab+0x5/0x20 [ 593.649147][T20737] kmem_cache_alloc+0x4f/0x320 [ 593.653905][T20737] ? avc_has_perm_noaudit+0x1c0/0x270 [ 593.659364][T20737] ? vfat_mount+0x40/0x40 [ 593.663706][T20737] getname_kernel+0x37/0x1d0 [ 593.668372][T20737] ? vfat_mount+0x40/0x40 [ 593.672854][T20737] kern_path+0x1d/0x100 [ 593.677113][T20737] ? vfat_mount+0x40/0x40 [ 593.681487][T20737] blkdev_get_by_path+0x63/0x220 [ 593.686554][T20737] mount_bdev+0x47/0x290 [ 593.690793][T20737] ? tsan.module_ctor+0x10/0x10 [ 593.695753][T20737] vfat_mount+0x2d/0x40 [ 593.700050][T20737] legacy_get_tree+0x70/0xc0 [ 593.704639][T20737] vfs_get_tree+0x4a/0x1a0 [ 593.709131][T20737] path_mount+0x11cf/0x1c40 [ 593.713632][T20737] ? kmem_cache_free+0x65/0x110 [ 593.718483][T20737] __se_sys_mount+0x24b/0x2f0 [ 593.723348][T20737] __x64_sys_mount+0x63/0x70 [ 593.728085][T20737] do_syscall_64+0x44/0xd0 [ 593.732557][T20737] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 593.738455][T20737] RIP: 0033:0x7fa83371d02a [ 593.742869][T20737] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 593.762677][T20737] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 593.771100][T20737] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 593.779104][T20737] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 593.787158][T20737] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 593.795125][T20737] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 593.803245][T20737] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 593.811289][T20737] 22:17:02 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 51) [ 593.844238][T20742] loop5: detected capacity change from 0 to 4096 [ 593.884791][T20742] FAULT_INJECTION: forcing a failure. [ 593.884791][T20742] name failslab, interval 1, probability 0, space 0, times 0 [ 593.897581][T20742] CPU: 0 PID: 20742 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 593.906396][T20742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 593.916455][T20742] Call Trace: [ 593.919729][T20742] [ 593.922651][T20742] dump_stack_lvl+0xd6/0x122 [ 593.927364][T20742] dump_stack+0x11/0x1b [ 593.931581][T20742] should_fail+0x23c/0x250 [ 593.935990][T20742] ? __list_lru_init+0x352/0x6d0 [ 593.940965][T20742] __should_failslab+0x81/0x90 [ 593.945730][T20742] should_failslab+0x5/0x20 [ 593.950329][T20742] kmem_cache_alloc_trace+0x52/0x350 [ 593.955644][T20742] ? __list_lru_init+0x352/0x6d0 [ 593.960574][T20742] __list_lru_init+0x352/0x6d0 [ 593.965393][T20742] alloc_super+0x490/0x520 [ 593.969812][T20742] ? mount_bdev+0x290/0x290 [ 593.974318][T20742] sget+0x189/0x370 [ 593.978122][T20742] ? test_bdev_super+0x30/0x30 [ 593.982902][T20742] mount_bdev+0xd3/0x290 [ 593.987145][T20742] ? ext4_mount+0x40/0x40 [ 593.991552][T20742] ? ext4_errno_to_code+0x110/0x110 [ 593.996745][T20742] ext4_mount+0x2d/0x40 [ 594.000906][T20742] legacy_get_tree+0x70/0xc0 [ 594.005496][T20742] vfs_get_tree+0x4a/0x1a0 [ 594.009913][T20742] path_mount+0x11cf/0x1c40 [ 594.014423][T20742] ? kmem_cache_free+0x65/0x110 [ 594.019273][T20742] __se_sys_mount+0x24b/0x2f0 [ 594.023947][T20742] ? __this_cpu_preempt_check+0x18/0x20 [ 594.029546][T20742] __x64_sys_mount+0x63/0x70 [ 594.034161][T20742] do_syscall_64+0x44/0xd0 [ 594.038638][T20742] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 594.044528][T20742] RIP: 0033:0x7f7ca8c3202a [ 594.048930][T20742] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 594.068689][T20742] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 594.077098][T20742] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a 22:17:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 78) [ 594.085066][T20742] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 594.093188][T20742] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 594.101193][T20742] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 594.109162][T20742] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 594.117193][T20742] 22:17:02 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x8000000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 594.149438][T20745] loop4: detected capacity change from 0 to 32 [ 594.174112][T20745] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 594.209203][T20745] loop4: detected capacity change from 0 to 32 [ 594.215888][T20745] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 594.313965][T20749] loop2: detected capacity change from 0 to 264192 [ 594.314982][T20750] loop3: detected capacity change from 0 to 127 [ 594.335347][T20749] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 594.355576][T20750] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 594.368589][T20749] loop2: detected capacity change from 0 to 264192 [ 594.376018][T20753] loop0: detected capacity change from 0 to 6 [ 594.377873][T20749] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 594.393398][T20753] FAULT_INJECTION: forcing a failure. [ 594.393398][T20753] name failslab, interval 1, probability 0, space 0, times 0 [ 594.406040][T20753] CPU: 0 PID: 20753 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 594.414803][T20753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.424860][T20753] Call Trace: [ 594.428133][T20753] [ 594.431056][T20753] dump_stack_lvl+0xd6/0x122 [ 594.435854][T20753] dump_stack+0x11/0x1b [ 594.440043][T20753] should_fail+0x23c/0x250 [ 594.444504][T20753] ? alloc_super+0x3a/0x520 [ 594.449011][T20753] __should_failslab+0x81/0x90 [ 594.453831][T20753] should_failslab+0x5/0x20 [ 594.458333][T20753] kmem_cache_alloc_trace+0x52/0x350 [ 594.463622][T20753] ? preempt_count_add+0x4e/0x90 [ 594.468656][T20753] ? mount_bdev+0x290/0x290 [ 594.473161][T20753] alloc_super+0x3a/0x520 [ 594.477491][T20753] ? mount_bdev+0x290/0x290 [ 594.481992][T20753] sget+0x189/0x370 [ 594.485805][T20753] ? test_bdev_super+0x30/0x30 [ 594.490656][T20753] mount_bdev+0xd3/0x290 [ 594.494904][T20753] ? vfat_mount+0x40/0x40 [ 594.499291][T20753] ? tsan.module_ctor+0x10/0x10 [ 594.504202][T20753] vfat_mount+0x2d/0x40 [ 594.508361][T20753] legacy_get_tree+0x70/0xc0 [ 594.512962][T20753] vfs_get_tree+0x4a/0x1a0 [ 594.517498][T20753] path_mount+0x11cf/0x1c40 [ 594.522001][T20753] ? kmem_cache_free+0x65/0x110 [ 594.526938][T20753] __se_sys_mount+0x24b/0x2f0 [ 594.531703][T20753] __x64_sys_mount+0x63/0x70 [ 594.536609][T20753] do_syscall_64+0x44/0xd0 [ 594.536827][T20755] loop5: detected capacity change from 0 to 4096 [ 594.541084][T20753] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 594.553387][T20753] RIP: 0033:0x7fa83371d02a [ 594.559675][T20753] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 594.579359][T20753] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 594.584437][T20755] FAULT_INJECTION: forcing a failure. [ 594.584437][T20755] name failslab, interval 1, probability 0, space 0, times 0 [ 594.587777][T20753] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 594.587794][T20753] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 594.587805][T20753] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 594.587816][T20753] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 594.587828][T20753] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 594.640258][T20753] [ 594.643318][T20755] CPU: 1 PID: 20755 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 594.652081][T20755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.662189][T20755] Call Trace: [ 594.665553][T20755] [ 594.668554][T20755] dump_stack_lvl+0xd6/0x122 [ 594.673161][T20755] dump_stack+0x11/0x1b [ 594.677318][T20755] should_fail+0x23c/0x250 [ 594.681757][T20755] ? __list_lru_init+0x352/0x6d0 [ 594.686697][T20755] __should_failslab+0x81/0x90 [ 594.691485][T20755] should_failslab+0x5/0x20 [ 594.695995][T20755] kmem_cache_alloc_trace+0x52/0x350 [ 594.701325][T20755] ? __list_lru_init+0x352/0x6d0 [ 594.706257][T20755] __list_lru_init+0x352/0x6d0 [ 594.711046][T20755] alloc_super+0x490/0x520 [ 594.715458][T20755] ? mount_bdev+0x290/0x290 [ 594.720028][T20755] sget+0x189/0x370 [ 594.723836][T20755] ? test_bdev_super+0x30/0x30 [ 594.728592][T20755] mount_bdev+0xd3/0x290 [ 594.732835][T20755] ? ext4_mount+0x40/0x40 [ 594.737166][T20755] ? ext4_errno_to_code+0x110/0x110 [ 594.742380][T20755] ext4_mount+0x2d/0x40 [ 594.746667][T20755] legacy_get_tree+0x70/0xc0 [ 594.751266][T20755] vfs_get_tree+0x4a/0x1a0 [ 594.755687][T20755] path_mount+0x11cf/0x1c40 [ 594.760190][T20755] ? kmem_cache_free+0x65/0x110 [ 594.765038][T20755] __se_sys_mount+0x24b/0x2f0 [ 594.769840][T20755] ? __this_cpu_preempt_check+0x18/0x20 [ 594.775395][T20755] __x64_sys_mount+0x63/0x70 [ 594.779984][T20755] do_syscall_64+0x44/0xd0 [ 594.784407][T20755] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 594.790372][T20755] RIP: 0033:0x7f7ca8c3202a [ 594.794781][T20755] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:17:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 594.814521][T20755] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 594.822937][T20755] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 594.830904][T20755] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 594.838867][T20755] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 594.846835][T20755] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 594.854793][T20755] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 594.862859][T20755] 22:17:03 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x10000000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:17:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 79) 22:17:03 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 52) [ 594.883335][T20750] loop3: detected capacity change from 0 to 127 [ 594.895373][T20750] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 594.918426][T20761] loop4: detected capacity change from 0 to 36 22:17:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 594.953660][T20761] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 594.998658][T20761] loop4: detected capacity change from 0 to 36 [ 595.005486][T20761] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4900, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 595.087282][T20767] loop2: detected capacity change from 0 to 264192 [ 595.106933][T20767] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 595.107089][T20769] loop5: detected capacity change from 0 to 4096 [ 595.133955][T20769] FAULT_INJECTION: forcing a failure. [ 595.133955][T20769] name failslab, interval 1, probability 0, space 0, times 0 [ 595.146682][T20769] CPU: 1 PID: 20769 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 595.155541][T20769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.165596][T20769] Call Trace: [ 595.168873][T20769] [ 595.171805][T20769] dump_stack_lvl+0xd6/0x122 [ 595.176396][T20769] dump_stack+0x11/0x1b [ 595.180593][T20769] should_fail+0x23c/0x250 [ 595.185096][T20769] ? __list_lru_init+0x352/0x6d0 [ 595.190033][T20769] __should_failslab+0x81/0x90 [ 595.194803][T20769] should_failslab+0x5/0x20 [ 595.199309][T20769] kmem_cache_alloc_trace+0x52/0x350 [ 595.204670][T20769] ? __list_lru_init+0x352/0x6d0 [ 595.209606][T20769] __list_lru_init+0x352/0x6d0 [ 595.214412][T20769] alloc_super+0x490/0x520 [ 595.218877][T20769] ? mount_bdev+0x290/0x290 [ 595.223439][T20769] sget+0x189/0x370 [ 595.227238][T20769] ? test_bdev_super+0x30/0x30 [ 595.232000][T20769] mount_bdev+0xd3/0x290 [ 595.236249][T20769] ? ext4_mount+0x40/0x40 [ 595.240624][T20769] ? ext4_errno_to_code+0x110/0x110 [ 595.245829][T20769] ext4_mount+0x2d/0x40 [ 595.249985][T20769] legacy_get_tree+0x70/0xc0 [ 595.254579][T20769] vfs_get_tree+0x4a/0x1a0 [ 595.259050][T20769] path_mount+0x11cf/0x1c40 [ 595.263605][T20769] ? kmem_cache_free+0x65/0x110 [ 595.268464][T20769] __se_sys_mount+0x24b/0x2f0 [ 595.273225][T20769] ? __this_cpu_preempt_check+0x18/0x20 [ 595.278787][T20769] __x64_sys_mount+0x63/0x70 [ 595.283374][T20769] do_syscall_64+0x44/0xd0 [ 595.287850][T20769] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 595.295826][T20769] RIP: 0033:0x7f7ca8c3202a [ 595.300239][T20769] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 595.319845][T20769] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 595.328296][T20769] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 595.336362][T20769] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 595.344335][T20769] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 595.352514][T20769] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 595.360476][T20769] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 595.368445][T20769] [ 595.381532][T20767] loop2: detected capacity change from 0 to 264192 [ 595.393391][T20771] loop0: detected capacity change from 0 to 6 [ 595.399919][T20772] loop3: detected capacity change from 0 to 127 [ 595.412130][T20771] FAULT_INJECTION: forcing a failure. [ 595.412130][T20771] name failslab, interval 1, probability 0, space 0, times 0 [ 595.424774][T20771] CPU: 0 PID: 20771 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 595.433617][T20771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.443667][T20771] Call Trace: [ 595.446940][T20771] [ 595.449865][T20771] dump_stack_lvl+0xd6/0x122 [ 595.454461][T20771] dump_stack+0x11/0x1b [ 595.458758][T20771] should_fail+0x23c/0x250 [ 595.463177][T20771] ? alloc_super+0x3a/0x520 [ 595.467720][T20771] __should_failslab+0x81/0x90 [ 595.472537][T20771] should_failslab+0x5/0x20 [ 595.477038][T20771] kmem_cache_alloc_trace+0x52/0x350 [ 595.482376][T20771] ? preempt_count_add+0x4e/0x90 [ 595.487313][T20771] ? mount_bdev+0x290/0x290 [ 595.491814][T20771] alloc_super+0x3a/0x520 [ 595.496149][T20771] ? mount_bdev+0x290/0x290 [ 595.500863][T20771] sget+0x189/0x370 [ 595.504760][T20771] ? test_bdev_super+0x30/0x30 [ 595.509573][T20771] mount_bdev+0xd3/0x290 [ 595.513817][T20771] ? vfat_mount+0x40/0x40 [ 595.518191][T20771] ? tsan.module_ctor+0x10/0x10 [ 595.523144][T20771] vfat_mount+0x2d/0x40 [ 595.527311][T20771] legacy_get_tree+0x70/0xc0 [ 595.531963][T20771] vfs_get_tree+0x4a/0x1a0 [ 595.536378][T20771] path_mount+0x11cf/0x1c40 [ 595.540923][T20771] ? kmem_cache_free+0x65/0x110 [ 595.545779][T20771] __se_sys_mount+0x24b/0x2f0 [ 595.550456][T20771] __x64_sys_mount+0x63/0x70 [ 595.555047][T20771] do_syscall_64+0x44/0xd0 [ 595.559471][T20771] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 595.565367][T20771] RIP: 0033:0x7fa83371d02a [ 595.569832][T20771] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:17:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 80) [ 595.589464][T20771] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 595.597921][T20771] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 595.605892][T20771] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 595.607976][T20767] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 595.613863][T20771] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 595.613899][T20771] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 22:17:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 595.640001][T20771] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 595.647976][T20771] [ 595.656293][T20772] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:03 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 53) [ 595.702883][T20772] loop3: detected capacity change from 0 to 127 [ 595.710213][T20772] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 595.763813][T20775] loop4: detected capacity change from 0 to 36 [ 595.786730][T20775] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 595.833510][T20777] loop5: detected capacity change from 0 to 4096 [ 595.843402][T20775] loop4: detected capacity change from 0 to 36 [ 595.851227][T20775] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 595.859441][T20777] FAULT_INJECTION: forcing a failure. [ 595.859441][T20777] name failslab, interval 1, probability 0, space 0, times 0 [ 595.874085][T20777] CPU: 1 PID: 20777 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 595.882867][T20777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.892921][T20777] Call Trace: [ 595.896199][T20777] [ 595.899127][T20777] dump_stack_lvl+0xd6/0x122 [ 595.903802][T20777] dump_stack+0x11/0x1b [ 595.907958][T20777] should_fail+0x23c/0x250 [ 595.912366][T20777] ? __list_lru_init+0x352/0x6d0 [ 595.917301][T20777] __should_failslab+0x81/0x90 [ 595.922064][T20777] should_failslab+0x5/0x20 [ 595.926566][T20777] kmem_cache_alloc_trace+0x52/0x350 [ 595.931856][T20777] ? __list_lru_init+0x352/0x6d0 [ 595.936799][T20777] __list_lru_init+0x352/0x6d0 [ 595.941622][T20777] alloc_super+0x490/0x520 [ 595.946058][T20777] ? mount_bdev+0x290/0x290 [ 595.950564][T20777] sget+0x189/0x370 [ 595.954426][T20777] ? test_bdev_super+0x30/0x30 [ 595.959188][T20777] mount_bdev+0xd3/0x290 [ 595.963445][T20777] ? ext4_mount+0x40/0x40 [ 595.967831][T20777] ? ext4_errno_to_code+0x110/0x110 [ 595.973038][T20777] ext4_mount+0x2d/0x40 [ 595.977362][T20777] legacy_get_tree+0x70/0xc0 [ 595.982008][T20777] vfs_get_tree+0x4a/0x1a0 [ 595.986429][T20777] path_mount+0x11cf/0x1c40 [ 595.990925][T20777] ? kmem_cache_free+0x65/0x110 [ 595.995821][T20777] __se_sys_mount+0x24b/0x2f0 [ 596.000499][T20777] ? __this_cpu_preempt_check+0x18/0x20 [ 596.006045][T20777] __x64_sys_mount+0x63/0x70 [ 596.010633][T20777] do_syscall_64+0x44/0xd0 [ 596.015122][T20777] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 596.021074][T20777] RIP: 0033:0x7f7ca8c3202a [ 596.025477][T20777] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 596.045225][T20777] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 596.053640][T20777] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 596.061717][T20777] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 596.069682][T20777] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 22:17:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:04 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x1e030000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 596.077645][T20777] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 596.085604][T20777] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 596.093572][T20777] [ 596.116315][T20782] loop0: detected capacity change from 0 to 6 [ 596.130159][T20782] FAULT_INJECTION: forcing a failure. [ 596.130159][T20782] name failslab, interval 1, probability 0, space 0, times 0 [ 596.142855][T20782] CPU: 0 PID: 20782 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 596.151617][T20782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 596.161669][T20782] Call Trace: [ 596.164962][T20782] [ 596.167889][T20782] dump_stack_lvl+0xd6/0x122 [ 596.172484][T20782] dump_stack+0x11/0x1b [ 596.176640][T20782] should_fail+0x23c/0x250 [ 596.181057][T20782] ? __list_lru_init+0x70/0x6d0 [ 596.185992][T20782] __should_failslab+0x81/0x90 [ 596.190807][T20782] should_failslab+0x5/0x20 [ 596.195320][T20782] __kmalloc+0x6f/0x370 [ 596.199535][T20782] ? prealloc_memcg_shrinker+0x444/0x460 [ 596.205164][T20782] __list_lru_init+0x70/0x6d0 [ 596.209842][T20782] alloc_super+0x490/0x520 [ 596.214254][T20782] ? mount_bdev+0x290/0x290 [ 596.218809][T20782] sget+0x189/0x370 [ 596.222634][T20782] ? test_bdev_super+0x30/0x30 [ 596.227417][T20782] mount_bdev+0xd3/0x290 [ 596.231658][T20782] ? vfat_mount+0x40/0x40 [ 596.235993][T20782] ? tsan.module_ctor+0x10/0x10 [ 596.240867][T20782] vfat_mount+0x2d/0x40 [ 596.245074][T20782] legacy_get_tree+0x70/0xc0 [ 596.249675][T20782] vfs_get_tree+0x4a/0x1a0 [ 596.254116][T20782] path_mount+0x11cf/0x1c40 [ 596.258630][T20782] ? kmem_cache_free+0x65/0x110 [ 596.263524][T20782] __se_sys_mount+0x24b/0x2f0 [ 596.268207][T20782] __x64_sys_mount+0x63/0x70 [ 596.272795][T20782] do_syscall_64+0x44/0xd0 [ 596.277246][T20782] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 596.283143][T20782] RIP: 0033:0x7fa83371d02a [ 596.287557][T20782] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 596.307161][T20782] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 596.316042][T20782] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 596.324047][T20782] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 22:17:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 81) [ 596.332019][T20782] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 596.340013][T20782] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 596.347989][T20782] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 596.355958][T20782] [ 596.362230][T20789] loop2: detected capacity change from 0 to 264192 22:17:04 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 54) [ 596.377625][T20789] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 596.395538][T20790] loop4: detected capacity change from 0 to 38 [ 596.402586][T20791] loop3: detected capacity change from 0 to 1024 [ 596.420918][T20790] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 596.434261][T20789] loop2: detected capacity change from 0 to 264192 [ 596.441153][T20791] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 596.453676][T20789] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 596.483524][T20793] loop5: detected capacity change from 0 to 4096 [ 596.499126][T20793] FAULT_INJECTION: forcing a failure. [ 596.499126][T20793] name failslab, interval 1, probability 0, space 0, times 0 [ 596.511826][T20793] CPU: 1 PID: 20793 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 596.520602][T20793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 596.530657][T20793] Call Trace: [ 596.533931][T20793] [ 596.536851][T20793] dump_stack_lvl+0xd6/0x122 [ 596.541487][T20793] dump_stack+0x11/0x1b [ 596.545641][T20793] should_fail+0x23c/0x250 [ 596.550052][T20793] ? __list_lru_init+0x70/0x6d0 [ 596.554929][T20793] __should_failslab+0x81/0x90 [ 596.559696][T20793] should_failslab+0x5/0x20 [ 596.564195][T20793] __kmalloc+0x6f/0x370 [ 596.568440][T20793] ? __list_lru_init+0x352/0x6d0 [ 596.573450][T20793] __list_lru_init+0x70/0x6d0 [ 596.578648][T20793] alloc_super+0x4bf/0x520 [ 596.583062][T20793] ? mount_bdev+0x290/0x290 [ 596.587644][T20793] sget+0x189/0x370 [ 596.591446][T20793] ? test_bdev_super+0x30/0x30 [ 596.596261][T20793] mount_bdev+0xd3/0x290 [ 596.600506][T20793] ? ext4_mount+0x40/0x40 [ 596.604890][T20793] ? ext4_errno_to_code+0x110/0x110 [ 596.610083][T20793] ext4_mount+0x2d/0x40 [ 596.614231][T20793] legacy_get_tree+0x70/0xc0 [ 596.618816][T20793] vfs_get_tree+0x4a/0x1a0 [ 596.623232][T20793] path_mount+0x11cf/0x1c40 [ 596.627792][T20793] ? kmem_cache_free+0x65/0x110 [ 596.632674][T20793] __se_sys_mount+0x24b/0x2f0 [ 596.637410][T20793] ? __this_cpu_preempt_check+0x18/0x20 [ 596.642954][T20793] __x64_sys_mount+0x63/0x70 [ 596.647623][T20793] do_syscall_64+0x44/0xd0 [ 596.652066][T20793] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 596.658052][T20793] RIP: 0033:0x7f7ca8c3202a [ 596.662523][T20793] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 596.682127][T20793] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 596.690580][T20793] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 596.698547][T20793] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 596.706514][T20793] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 596.714477][T20793] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 596.722446][T20793] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 596.730418][T20793] 22:17:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) 22:17:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 82) 22:17:05 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x1ffff000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:17:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80040, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 596.735748][T20791] loop3: detected capacity change from 0 to 1024 [ 596.749609][T20790] loop4: detected capacity change from 0 to 38 [ 596.754656][T20791] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 596.765511][T20790] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 596.870212][T20797] loop0: detected capacity change from 0 to 6 [ 596.876600][T20797] FAULT_INJECTION: forcing a failure. [ 596.876600][T20797] name failslab, interval 1, probability 0, space 0, times 0 [ 596.889260][T20797] CPU: 0 PID: 20797 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 596.898052][T20797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 596.908157][T20797] Call Trace: [ 596.911435][T20797] [ 596.914362][T20797] dump_stack_lvl+0xd6/0x122 [ 596.918959][T20797] dump_stack+0x11/0x1b [ 596.923112][T20797] should_fail+0x23c/0x250 [ 596.927536][T20797] __should_failslab+0x81/0x90 [ 596.932373][T20797] should_failslab+0x5/0x20 [ 596.936902][T20797] kmem_cache_alloc_node_trace+0x61/0x310 [ 596.942633][T20797] ? should_fail+0xd6/0x250 [ 596.947149][T20797] ? __kmalloc_node+0x30/0x40 [ 596.951838][T20797] __kmalloc_node+0x30/0x40 [ 596.956358][T20797] kvmalloc_node+0x81/0x110 [ 596.960890][T20797] __list_lru_init+0x2f7/0x6d0 [ 596.965662][T20797] alloc_super+0x490/0x520 [ 596.970081][T20797] ? mount_bdev+0x290/0x290 [ 596.974635][T20797] sget+0x189/0x370 [ 596.978486][T20797] ? test_bdev_super+0x30/0x30 [ 596.983291][T20797] mount_bdev+0xd3/0x290 [ 596.987549][T20797] ? vfat_mount+0x40/0x40 [ 596.991900][T20797] ? tsan.module_ctor+0x10/0x10 [ 596.996756][T20797] vfat_mount+0x2d/0x40 [ 597.000948][T20797] legacy_get_tree+0x70/0xc0 [ 597.005569][T20797] vfs_get_tree+0x4a/0x1a0 [ 597.009988][T20797] path_mount+0x11cf/0x1c40 [ 597.014490][T20797] ? kmem_cache_free+0x65/0x110 [ 597.019354][T20797] __se_sys_mount+0x24b/0x2f0 [ 597.024028][T20797] __x64_sys_mount+0x63/0x70 [ 597.028813][T20797] do_syscall_64+0x44/0xd0 [ 597.033232][T20797] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 597.039277][T20797] RIP: 0033:0x7fa83371d02a [ 597.043732][T20797] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 597.063338][T20797] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 597.071756][T20797] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 597.079733][T20797] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 597.087706][T20797] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 597.095710][T20797] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 597.103691][T20797] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 597.111664][T20797] [ 597.118088][T20803] loop4: detected capacity change from 0 to 48 [ 597.136645][T20803] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:05 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 55) [ 597.172359][T20804] loop5: detected capacity change from 0 to 4096 [ 597.180326][T20805] loop2: detected capacity change from 0 to 264192 [ 597.191665][T20803] loop4: detected capacity change from 0 to 48 [ 597.199921][T20803] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 597.200341][T20804] FAULT_INJECTION: forcing a failure. [ 597.200341][T20804] name failslab, interval 1, probability 0, space 0, times 0 [ 597.211048][T20807] loop3: detected capacity change from 0 to 1024 [ 597.222844][T20804] CPU: 0 PID: 20804 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 597.222868][T20804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 597.222877][T20804] Call Trace: [ 597.222882][T20804] [ 597.222888][T20804] dump_stack_lvl+0xd6/0x122 [ 597.222923][T20804] dump_stack+0x11/0x1b [ 597.222940][T20804] should_fail+0x23c/0x250 [ 597.222956][T20804] __should_failslab+0x81/0x90 [ 597.222975][T20804] should_failslab+0x5/0x20 [ 597.276607][T20804] kmem_cache_alloc_node_trace+0x61/0x310 [ 597.282366][T20804] ? should_fail+0xd6/0x250 [ 597.286916][T20804] ? __kmalloc_node+0x30/0x40 [ 597.291592][T20804] __kmalloc_node+0x30/0x40 [ 597.296094][T20804] kvmalloc_node+0x81/0x110 [ 597.300601][T20804] __list_lru_init+0x2f7/0x6d0 [ 597.305440][T20804] alloc_super+0x4bf/0x520 [ 597.309890][T20804] ? mount_bdev+0x290/0x290 [ 597.314422][T20804] sget+0x189/0x370 [ 597.318225][T20804] ? test_bdev_super+0x30/0x30 [ 597.323012][T20804] mount_bdev+0xd3/0x290 [ 597.327283][T20804] ? ext4_mount+0x40/0x40 [ 597.331609][T20804] ? ext4_errno_to_code+0x110/0x110 [ 597.336809][T20804] ext4_mount+0x2d/0x40 [ 597.340984][T20804] legacy_get_tree+0x70/0xc0 [ 597.345567][T20804] vfs_get_tree+0x4a/0x1a0 [ 597.349981][T20804] path_mount+0x11cf/0x1c40 [ 597.354486][T20804] ? kmem_cache_free+0x65/0x110 [ 597.359393][T20804] __se_sys_mount+0x24b/0x2f0 [ 597.364120][T20804] ? __this_cpu_preempt_check+0x18/0x20 [ 597.369876][T20804] __x64_sys_mount+0x63/0x70 [ 597.374462][T20804] do_syscall_64+0x44/0xd0 [ 597.378919][T20804] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 597.384818][T20804] RIP: 0033:0x7f7ca8c3202a [ 597.389319][T20804] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 597.409710][T20804] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 597.418178][T20804] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 597.426142][T20804] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 597.434149][T20804] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 597.442150][T20804] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 597.450120][T20804] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 597.458109][T20804] [ 597.462383][T20807] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 83) 22:17:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 597.474849][T20805] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 597.511207][T20807] loop3: detected capacity change from 0 to 1024 [ 597.512612][T20805] loop2: detected capacity change from 0 to 264192 22:17:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 597.522034][T20807] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 597.534697][T20805] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 597.629964][T20809] loop0: detected capacity change from 0 to 6 [ 597.637053][T20809] FAULT_INJECTION: forcing a failure. [ 597.637053][T20809] name failslab, interval 1, probability 0, space 0, times 0 [ 597.649735][T20809] CPU: 0 PID: 20809 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 597.658709][T20809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 597.668757][T20809] Call Trace: [ 597.672035][T20809] [ 597.674996][T20809] dump_stack_lvl+0xd6/0x122 [ 597.679706][T20809] dump_stack+0x11/0x1b [ 597.683883][T20809] should_fail+0x23c/0x250 [ 597.688310][T20809] ? __list_lru_init+0x352/0x6d0 [ 597.693270][T20809] __should_failslab+0x81/0x90 [ 597.698179][T20809] should_failslab+0x5/0x20 [ 597.702712][T20809] kmem_cache_alloc_trace+0x52/0x350 [ 597.708137][T20809] ? __kmalloc_node+0x30/0x40 [ 597.712823][T20809] __list_lru_init+0x352/0x6d0 [ 597.717600][T20809] alloc_super+0x490/0x520 [ 597.722020][T20809] ? mount_bdev+0x290/0x290 [ 597.726563][T20809] sget+0x189/0x370 [ 597.730434][T20809] ? test_bdev_super+0x30/0x30 [ 597.735203][T20809] mount_bdev+0xd3/0x290 [ 597.739443][T20809] ? vfat_mount+0x40/0x40 [ 597.743913][T20809] ? tsan.module_ctor+0x10/0x10 [ 597.748845][T20809] vfat_mount+0x2d/0x40 [ 597.753061][T20809] legacy_get_tree+0x70/0xc0 [ 597.757936][T20809] vfs_get_tree+0x4a/0x1a0 [ 597.762356][T20809] path_mount+0x11cf/0x1c40 [ 597.767468][T20809] ? kmem_cache_free+0x65/0x110 [ 597.772331][T20809] __se_sys_mount+0x24b/0x2f0 [ 597.777003][T20809] __x64_sys_mount+0x63/0x70 [ 597.781608][T20809] do_syscall_64+0x44/0xd0 [ 597.786029][T20809] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 597.791939][T20809] RIP: 0033:0x7fa83371d02a [ 597.796350][T20809] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 597.816025][T20809] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 597.824480][T20809] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 597.832448][T20809] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 597.840421][T20809] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 597.848386][T20809] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 597.856412][T20809] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 597.864001][T20813] loop5: detected capacity change from 0 to 4096 [ 597.864388][T20809] [ 597.895471][T20813] FAULT_INJECTION: forcing a failure. [ 597.895471][T20813] name failslab, interval 1, probability 0, space 0, times 0 [ 597.908147][T20813] CPU: 1 PID: 20813 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 597.916906][T20813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 597.926951][T20813] Call Trace: [ 597.930225][T20813] [ 597.933147][T20813] dump_stack_lvl+0xd6/0x122 [ 597.937799][T20813] dump_stack+0x11/0x1b [ 597.941952][T20813] should_fail+0x23c/0x250 [ 597.946358][T20813] ? __list_lru_init+0x352/0x6d0 [ 597.951294][T20813] __should_failslab+0x81/0x90 [ 597.956056][T20813] should_failslab+0x5/0x20 [ 597.960622][T20813] kmem_cache_alloc_trace+0x52/0x350 [ 597.965908][T20813] ? __kmalloc_node+0x30/0x40 [ 597.970639][T20813] __list_lru_init+0x352/0x6d0 [ 597.975399][T20813] alloc_super+0x4bf/0x520 [ 597.979816][T20813] ? mount_bdev+0x290/0x290 [ 597.984318][T20813] sget+0x189/0x370 [ 597.988166][T20813] ? test_bdev_super+0x30/0x30 [ 597.992930][T20813] mount_bdev+0xd3/0x290 [ 597.997170][T20813] ? ext4_mount+0x40/0x40 [ 598.001577][T20813] ? ext4_errno_to_code+0x110/0x110 [ 598.006773][T20813] ext4_mount+0x2d/0x40 [ 598.010931][T20813] legacy_get_tree+0x70/0xc0 [ 598.015518][T20813] vfs_get_tree+0x4a/0x1a0 [ 598.020038][T20813] path_mount+0x11cf/0x1c40 [ 598.024547][T20813] ? kmem_cache_free+0x65/0x110 [ 598.029401][T20813] __se_sys_mount+0x24b/0x2f0 [ 598.034072][T20813] ? __this_cpu_preempt_check+0x18/0x20 [ 598.039646][T20813] __x64_sys_mount+0x63/0x70 [ 598.044231][T20813] do_syscall_64+0x44/0xd0 [ 598.048641][T20813] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 598.054629][T20813] RIP: 0033:0x7f7ca8c3202a [ 598.059037][T20813] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 598.078642][T20813] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 598.087051][T20813] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a 22:17:06 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 56) [ 598.095022][T20813] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 598.103076][T20813] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 598.111129][T20813] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 598.119092][T20813] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 598.127143][T20813] 22:17:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 84) [ 598.164971][T20817] loop4: detected capacity change from 0 to 52 [ 598.188753][T20817] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 598.203043][T20818] loop2: detected capacity change from 0 to 264192 [ 598.203506][T20819] loop3: detected capacity change from 0 to 8192 [ 598.219330][T20818] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 598.230980][T20819] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 598.251451][T20817] loop4: detected capacity change from 0 to 52 22:17:06 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x20000000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:17:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 598.259606][T20817] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 598.260455][T20819] loop3: detected capacity change from 0 to 8192 [ 598.270185][T20818] loop2: detected capacity change from 0 to 264192 [ 598.286059][T20818] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 598.297229][T20819] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 598.384092][T20824] loop0: detected capacity change from 0 to 6 [ 598.392380][T20824] FAULT_INJECTION: forcing a failure. [ 598.392380][T20824] name failslab, interval 1, probability 0, space 0, times 0 [ 598.405004][T20824] CPU: 0 PID: 20824 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 598.413805][T20824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 598.423860][T20824] Call Trace: [ 598.427169][T20824] [ 598.430169][T20824] dump_stack_lvl+0xd6/0x122 [ 598.434767][T20824] dump_stack+0x11/0x1b [ 598.438919][T20824] should_fail+0x23c/0x250 [ 598.443334][T20824] ? __list_lru_init+0x352/0x6d0 [ 598.448311][T20824] __should_failslab+0x81/0x90 [ 598.453145][T20824] should_failslab+0x5/0x20 [ 598.457721][T20824] kmem_cache_alloc_trace+0x52/0x350 [ 598.463010][T20824] ? __kmalloc_node+0x30/0x40 [ 598.467713][T20824] __list_lru_init+0x352/0x6d0 [ 598.472475][T20824] alloc_super+0x490/0x520 [ 598.476894][T20824] ? mount_bdev+0x290/0x290 [ 598.481411][T20824] sget+0x189/0x370 [ 598.485299][T20824] ? test_bdev_super+0x30/0x30 [ 598.490062][T20824] mount_bdev+0xd3/0x290 [ 598.494319][T20824] ? vfat_mount+0x40/0x40 [ 598.498652][T20824] ? tsan.module_ctor+0x10/0x10 [ 598.503509][T20824] vfat_mount+0x2d/0x40 [ 598.504491][T20827] loop2: detected capacity change from 0 to 264192 [ 598.507665][T20824] legacy_get_tree+0x70/0xc0 [ 598.518779][T20824] vfs_get_tree+0x4a/0x1a0 [ 598.523206][T20824] path_mount+0x11cf/0x1c40 [ 598.527765][T20824] ? kmem_cache_free+0x65/0x110 [ 598.532620][T20824] __se_sys_mount+0x24b/0x2f0 [ 598.537334][T20824] __x64_sys_mount+0x63/0x70 [ 598.541922][T20824] do_syscall_64+0x44/0xd0 [ 598.546373][T20824] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 598.552274][T20824] RIP: 0033:0x7fa83371d02a [ 598.556684][T20824] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 598.557969][T20831] loop3: detected capacity change from 0 to 32768 [ 598.576293][T20824] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 598.576317][T20824] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 598.576328][T20824] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 598.576343][T20824] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 598.576355][T20824] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 598.576367][T20824] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 598.631881][T20824] [ 598.637969][T20828] loop5: detected capacity change from 0 to 4096 [ 598.646849][T20831] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 598.658197][T20827] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 598.670483][T20828] FAULT_INJECTION: forcing a failure. [ 598.670483][T20828] name failslab, interval 1, probability 0, space 0, times 0 [ 598.683230][T20828] CPU: 0 PID: 20828 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 598.691996][T20828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 598.702088][T20828] Call Trace: [ 598.705361][T20828] [ 598.708285][T20828] dump_stack_lvl+0xd6/0x122 [ 598.712960][T20828] dump_stack+0x11/0x1b [ 598.717153][T20828] should_fail+0x23c/0x250 [ 598.722212][T20828] ? __list_lru_init+0x352/0x6d0 [ 598.727151][T20828] __should_failslab+0x81/0x90 [ 598.731947][T20828] should_failslab+0x5/0x20 [ 598.736481][T20828] kmem_cache_alloc_trace+0x52/0x350 [ 598.741850][T20828] ? __list_lru_init+0x352/0x6d0 [ 598.746831][T20828] __list_lru_init+0x352/0x6d0 [ 598.751628][T20828] alloc_super+0x4bf/0x520 [ 598.756125][T20828] ? mount_bdev+0x290/0x290 [ 598.760628][T20828] sget+0x189/0x370 [ 598.764485][T20828] ? test_bdev_super+0x30/0x30 [ 598.769248][T20828] mount_bdev+0xd3/0x290 [ 598.773486][T20828] ? ext4_mount+0x40/0x40 [ 598.777885][T20828] ? ext4_errno_to_code+0x110/0x110 [ 598.783131][T20828] ext4_mount+0x2d/0x40 [ 598.787301][T20828] legacy_get_tree+0x70/0xc0 [ 598.791943][T20828] vfs_get_tree+0x4a/0x1a0 [ 598.796439][T20828] path_mount+0x11cf/0x1c40 [ 598.800979][T20828] ? kmem_cache_free+0x65/0x110 [ 598.805872][T20828] __se_sys_mount+0x24b/0x2f0 [ 598.810554][T20828] ? __this_cpu_preempt_check+0x18/0x20 [ 598.816254][T20828] __x64_sys_mount+0x63/0x70 [ 598.820902][T20828] do_syscall_64+0x44/0xd0 [ 598.825329][T20828] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 598.831224][T20828] RIP: 0033:0x7f7ca8c3202a [ 598.835739][T20828] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 598.855355][T20828] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 598.863778][T20828] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 598.872618][T20828] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 598.880641][T20828] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 22:17:07 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 57) [ 598.888746][T20828] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 598.896713][T20828] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 598.904683][T20828] [ 598.920041][T20831] loop3: detected capacity change from 0 to 32768 [ 598.920563][T20827] loop2: detected capacity change from 0 to 264192 22:17:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 85) 22:17:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 598.931252][T20831] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 598.944395][T20827] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 598.959910][T20832] loop4: detected capacity change from 0 to 54 [ 598.989318][T20832] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 599.029176][T20832] loop4: detected capacity change from 0 to 54 [ 599.035899][T20832] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 599.158610][T20839] loop5: detected capacity change from 0 to 4096 [ 599.169635][T20838] loop0: detected capacity change from 0 to 6 [ 599.173347][T20839] FAULT_INJECTION: forcing a failure. [ 599.173347][T20839] name failslab, interval 1, probability 0, space 0, times 0 [ 599.176196][T20840] loop3: detected capacity change from 0 to 65536 [ 599.188518][T20839] CPU: 1 PID: 20839 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 599.197204][T20838] FAULT_INJECTION: forcing a failure. [ 599.197204][T20838] name failslab, interval 1, probability 0, space 0, times 0 [ 599.203716][T20839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 599.203728][T20839] Call Trace: [ 599.203734][T20839] [ 599.203741][T20839] dump_stack_lvl+0xd6/0x122 [ 599.203773][T20839] dump_stack+0x11/0x1b [ 599.241246][T20839] should_fail+0x23c/0x250 [ 599.245704][T20839] ? __list_lru_init+0x352/0x6d0 [ 599.250627][T20839] __should_failslab+0x81/0x90 [ 599.255388][T20839] should_failslab+0x5/0x20 [ 599.259880][T20839] kmem_cache_alloc_trace+0x52/0x350 [ 599.265159][T20839] ? __list_lru_init+0x352/0x6d0 [ 599.270079][T20839] __list_lru_init+0x352/0x6d0 [ 599.274831][T20839] alloc_super+0x4bf/0x520 [ 599.279232][T20839] ? mount_bdev+0x290/0x290 [ 599.283717][T20839] sget+0x189/0x370 [ 599.287511][T20839] ? test_bdev_super+0x30/0x30 [ 599.292281][T20839] mount_bdev+0xd3/0x290 [ 599.296603][T20839] ? ext4_mount+0x40/0x40 [ 599.300985][T20839] ? ext4_errno_to_code+0x110/0x110 [ 599.306170][T20839] ext4_mount+0x2d/0x40 [ 599.310391][T20839] legacy_get_tree+0x70/0xc0 [ 599.314972][T20839] vfs_get_tree+0x4a/0x1a0 [ 599.319382][T20839] path_mount+0x11cf/0x1c40 [ 599.323891][T20839] ? kmem_cache_free+0x65/0x110 [ 599.328726][T20839] __se_sys_mount+0x24b/0x2f0 [ 599.333514][T20839] ? __this_cpu_preempt_check+0x18/0x20 [ 599.339073][T20839] __x64_sys_mount+0x63/0x70 [ 599.343646][T20839] do_syscall_64+0x44/0xd0 [ 599.348085][T20839] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 599.354087][T20839] RIP: 0033:0x7f7ca8c3202a [ 599.358488][T20839] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 599.378129][T20839] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 599.386526][T20839] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 599.394549][T20839] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 599.402523][T20839] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 599.410511][T20839] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 599.418555][T20839] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 599.426513][T20839] [ 599.429572][T20838] CPU: 0 PID: 20838 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 599.430327][T20841] loop2: detected capacity change from 0 to 264192 [ 599.438337][T20838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 599.438394][T20838] Call Trace: [ 599.438400][T20838] [ 599.438406][T20838] dump_stack_lvl+0xd6/0x122 [ 599.457314][T20841] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 599.458204][T20838] dump_stack+0x11/0x1b [ 599.458227][T20838] should_fail+0x23c/0x250 [ 599.484469][T20838] ? __list_lru_init+0x352/0x6d0 [ 599.489410][T20838] __should_failslab+0x81/0x90 [ 599.494262][T20838] should_failslab+0x5/0x20 [ 599.494274][T20840] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 599.508954][T20838] kmem_cache_alloc_trace+0x52/0x350 [ 599.514260][T20838] ? __list_lru_init+0x352/0x6d0 [ 599.519237][T20838] __list_lru_init+0x352/0x6d0 [ 599.520610][T20845] loop4: detected capacity change from 0 to 58 [ 599.524008][T20838] alloc_super+0x490/0x520 [ 599.534625][T20838] ? mount_bdev+0x290/0x290 [ 599.539240][T20838] sget+0x189/0x370 [ 599.541489][T20845] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 599.543043][T20838] ? test_bdev_super+0x30/0x30 [ 599.558122][T20838] mount_bdev+0xd3/0x290 [ 599.562379][T20838] ? vfat_mount+0x40/0x40 [ 599.566719][T20838] ? tsan.module_ctor+0x10/0x10 [ 599.571646][T20838] vfat_mount+0x2d/0x40 [ 599.575802][T20838] legacy_get_tree+0x70/0xc0 [ 599.580412][T20838] vfs_get_tree+0x4a/0x1a0 [ 599.584845][T20838] path_mount+0x11cf/0x1c40 [ 599.589440][T20838] ? kmem_cache_free+0x65/0x110 [ 599.594311][T20838] __se_sys_mount+0x24b/0x2f0 [ 599.598984][T20838] __x64_sys_mount+0x63/0x70 [ 599.603577][T20838] do_syscall_64+0x44/0xd0 [ 599.607991][T20838] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 599.613908][T20838] RIP: 0033:0x7fa83371d02a [ 599.618318][T20838] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 599.637928][T20838] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 599.646342][T20838] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 599.654352][T20838] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 599.662409][T20838] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 599.670406][T20838] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 599.678376][T20838] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 599.686348][T20838] [ 599.704194][T20841] loop2: detected capacity change from 0 to 264192 22:17:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 86) 22:17:08 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 58) 22:17:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 599.711453][T20840] loop3: detected capacity change from 0 to 65536 [ 599.719045][T20845] loop4: detected capacity change from 0 to 58 [ 599.726120][T20840] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 599.736711][T20841] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 599.749339][T20845] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2040000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:08 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x20002000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 599.874740][T20849] loop5: detected capacity change from 0 to 4096 [ 599.887301][T20849] FAULT_INJECTION: forcing a failure. [ 599.887301][T20849] name failslab, interval 1, probability 0, space 0, times 0 [ 599.900224][T20849] CPU: 1 PID: 20849 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 599.909020][T20849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 599.919128][T20849] Call Trace: [ 599.922405][T20849] [ 599.925434][T20849] dump_stack_lvl+0xd6/0x122 [ 599.930083][T20849] dump_stack+0x11/0x1b [ 599.934271][T20849] should_fail+0x23c/0x250 [ 599.938756][T20849] ? __list_lru_init+0x352/0x6d0 [ 599.943731][T20849] __should_failslab+0x81/0x90 [ 599.948492][T20849] should_failslab+0x5/0x20 [ 599.952987][T20849] kmem_cache_alloc_trace+0x52/0x350 [ 599.958321][T20849] ? __list_lru_init+0x352/0x6d0 [ 599.963254][T20849] __list_lru_init+0x352/0x6d0 [ 599.968014][T20849] alloc_super+0x4bf/0x520 [ 599.972511][T20849] ? mount_bdev+0x290/0x290 [ 599.977061][T20849] sget+0x189/0x370 [ 599.980882][T20849] ? test_bdev_super+0x30/0x30 [ 599.985673][T20849] mount_bdev+0xd3/0x290 [ 599.990014][T20849] ? ext4_mount+0x40/0x40 [ 599.994402][T20849] ? ext4_errno_to_code+0x110/0x110 [ 599.999625][T20849] ext4_mount+0x2d/0x40 [ 600.003824][T20849] legacy_get_tree+0x70/0xc0 [ 600.008434][T20849] vfs_get_tree+0x4a/0x1a0 [ 600.012847][T20849] path_mount+0x11cf/0x1c40 [ 600.017420][T20849] ? kmem_cache_free+0x65/0x110 [ 600.022337][T20849] __se_sys_mount+0x24b/0x2f0 [ 600.027011][T20849] ? __this_cpu_preempt_check+0x18/0x20 [ 600.032619][T20849] __x64_sys_mount+0x63/0x70 [ 600.037266][T20849] do_syscall_64+0x44/0xd0 [ 600.041708][T20849] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 600.047674][T20849] RIP: 0033:0x7f7ca8c3202a [ 600.052110][T20849] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 600.071721][T20849] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 600.080135][T20849] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 600.088099][T20849] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 600.096142][T20849] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 600.104110][T20849] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 600.112260][T20849] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 600.120232][T20849] 22:17:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 87) [ 600.169458][T20855] loop3: detected capacity change from 0 to 66048 [ 600.177400][T20853] loop0: detected capacity change from 0 to 6 [ 600.185606][T20856] loop2: detected capacity change from 0 to 264192 [ 600.186563][T20853] FAULT_INJECTION: forcing a failure. [ 600.186563][T20853] name failslab, interval 1, probability 0, space 0, times 0 [ 600.204807][T20853] CPU: 0 PID: 20853 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 600.213591][T20853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 600.223673][T20853] Call Trace: [ 600.227049][T20853] [ 600.229970][T20853] dump_stack_lvl+0xd6/0x122 [ 600.234635][T20853] dump_stack+0x11/0x1b [ 600.238797][T20853] should_fail+0x23c/0x250 [ 600.243211][T20853] ? __list_lru_init+0x352/0x6d0 [ 600.248607][T20853] __should_failslab+0x81/0x90 [ 600.253374][T20853] should_failslab+0x5/0x20 [ 600.257879][T20853] kmem_cache_alloc_trace+0x52/0x350 [ 600.263163][T20853] ? __list_lru_init+0x352/0x6d0 [ 600.268094][T20853] __list_lru_init+0x352/0x6d0 [ 600.272977][T20853] alloc_super+0x490/0x520 [ 600.277461][T20853] ? mount_bdev+0x290/0x290 [ 600.281962][T20853] sget+0x189/0x370 [ 600.285766][T20853] ? test_bdev_super+0x30/0x30 [ 600.290609][T20853] mount_bdev+0xd3/0x290 [ 600.294916][T20853] ? vfat_mount+0x40/0x40 [ 600.299271][T20853] ? tsan.module_ctor+0x10/0x10 [ 600.304320][T20853] vfat_mount+0x2d/0x40 [ 600.308513][T20853] legacy_get_tree+0x70/0xc0 [ 600.313100][T20853] vfs_get_tree+0x4a/0x1a0 [ 600.317596][T20853] path_mount+0x11cf/0x1c40 [ 600.322116][T20853] ? kmem_cache_free+0x65/0x110 [ 600.327065][T20853] __se_sys_mount+0x24b/0x2f0 [ 600.331747][T20853] __x64_sys_mount+0x63/0x70 [ 600.336468][T20853] do_syscall_64+0x44/0xd0 [ 600.340891][T20853] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 600.346791][T20853] RIP: 0033:0x7fa83371d02a [ 600.351201][T20853] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 600.371251][T20853] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 600.379731][T20853] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 600.387701][T20853] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 600.395762][T20853] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 600.403777][T20853] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 600.411954][T20853] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 22:17:08 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 59) [ 600.419940][T20853] [ 600.426341][T20855] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 600.441836][T20856] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 600.457284][T20857] loop4: detected capacity change from 0 to 61 [ 600.479129][T20856] loop2: detected capacity change from 0 to 264192 [ 600.486262][T20855] loop3: detected capacity change from 0 to 66048 [ 600.493628][T20857] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 600.504451][T20856] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 600.515577][T20855] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200a0000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) 22:17:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 600.549616][T20857] loop4: detected capacity change from 0 to 61 [ 600.556975][T20857] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9d05, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 600.708452][T20862] loop5: detected capacity change from 0 to 4096 [ 600.725050][T20862] FAULT_INJECTION: forcing a failure. [ 600.725050][T20862] name failslab, interval 1, probability 0, space 0, times 0 [ 600.737855][T20862] CPU: 1 PID: 20862 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 600.746632][T20862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 600.756688][T20862] Call Trace: [ 600.759969][T20862] [ 600.762904][T20862] dump_stack_lvl+0xd6/0x122 [ 600.767635][T20862] dump_stack+0x11/0x1b [ 600.771840][T20862] should_fail+0x23c/0x250 [ 600.776251][T20862] ? __list_lru_init+0x352/0x6d0 [ 600.781212][T20862] __should_failslab+0x81/0x90 [ 600.785975][T20862] should_failslab+0x5/0x20 [ 600.790477][T20862] kmem_cache_alloc_trace+0x52/0x350 [ 600.795829][T20862] ? __list_lru_init+0x352/0x6d0 [ 600.800763][T20862] __list_lru_init+0x352/0x6d0 [ 600.805522][T20862] alloc_super+0x4bf/0x520 [ 600.809977][T20862] ? mount_bdev+0x290/0x290 [ 600.814477][T20862] sget+0x189/0x370 [ 600.818387][T20862] ? test_bdev_super+0x30/0x30 [ 600.823149][T20862] mount_bdev+0xd3/0x290 [ 600.827397][T20862] ? ext4_mount+0x40/0x40 [ 600.831720][T20862] ? ext4_errno_to_code+0x110/0x110 [ 600.836976][T20862] ext4_mount+0x2d/0x40 [ 600.841165][T20862] legacy_get_tree+0x70/0xc0 [ 600.845803][T20862] vfs_get_tree+0x4a/0x1a0 [ 600.850331][T20862] path_mount+0x11cf/0x1c40 [ 600.854835][T20862] ? kmem_cache_free+0x65/0x110 [ 600.859742][T20862] __se_sys_mount+0x24b/0x2f0 [ 600.864591][T20862] ? __this_cpu_preempt_check+0x18/0x20 [ 600.870166][T20862] __x64_sys_mount+0x63/0x70 [ 600.874789][T20862] do_syscall_64+0x44/0xd0 [ 600.879204][T20862] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 600.885187][T20862] RIP: 0033:0x7f7ca8c3202a [ 600.889627][T20862] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 600.909293][T20862] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 600.917808][T20862] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 600.925780][T20862] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 600.933845][T20862] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 600.941813][T20862] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 600.949781][T20862] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 600.957782][T20862] [ 600.975612][T20866] loop2: detected capacity change from 0 to 264192 [ 600.985983][T20868] loop3: detected capacity change from 0 to 98304 [ 600.993163][T20867] loop0: detected capacity change from 0 to 6 [ 600.999773][T20870] loop4: detected capacity change from 0 to 78 [ 601.016298][T20867] FAULT_INJECTION: forcing a failure. [ 601.016298][T20867] name failslab, interval 1, probability 0, space 0, times 0 [ 601.029025][T20867] CPU: 0 PID: 20867 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 601.037790][T20867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 601.048191][T20867] Call Trace: [ 601.051466][T20867] [ 601.054397][T20867] dump_stack_lvl+0xd6/0x122 [ 601.059017][T20867] dump_stack+0x11/0x1b [ 601.063223][T20867] should_fail+0x23c/0x250 [ 601.068067][T20867] ? __list_lru_init+0x352/0x6d0 [ 601.073003][T20867] __should_failslab+0x81/0x90 [ 601.077767][T20867] should_failslab+0x5/0x20 [ 601.082394][T20867] kmem_cache_alloc_trace+0x52/0x350 [ 601.087686][T20867] ? __list_lru_init+0x352/0x6d0 [ 601.092689][T20867] __list_lru_init+0x352/0x6d0 [ 601.097450][T20867] alloc_super+0x490/0x520 [ 601.101898][T20867] ? mount_bdev+0x290/0x290 [ 601.106403][T20867] sget+0x189/0x370 [ 601.110208][T20867] ? test_bdev_super+0x30/0x30 22:17:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 88) [ 601.114971][T20867] mount_bdev+0xd3/0x290 [ 601.119256][T20867] ? vfat_mount+0x40/0x40 [ 601.123584][T20867] ? tsan.module_ctor+0x10/0x10 [ 601.128464][T20867] vfat_mount+0x2d/0x40 [ 601.132616][T20867] legacy_get_tree+0x70/0xc0 [ 601.137207][T20867] vfs_get_tree+0x4a/0x1a0 [ 601.141627][T20867] path_mount+0x11cf/0x1c40 [ 601.146178][T20867] ? kmem_cache_free+0x65/0x110 [ 601.151126][T20867] __se_sys_mount+0x24b/0x2f0 [ 601.155807][T20867] __x64_sys_mount+0x63/0x70 [ 601.160463][T20867] do_syscall_64+0x44/0xd0 [ 601.164895][T20867] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 601.170795][T20867] RIP: 0033:0x7fa83371d02a [ 601.175213][T20867] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 601.195695][T20867] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 601.204110][T20867] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 601.212082][T20867] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 601.220051][T20867] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 601.228064][T20867] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 601.236078][T20867] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 601.244360][T20867] [ 601.253434][T20866] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:09 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 60) [ 601.253468][T20870] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 601.264008][T20868] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 601.322273][T20866] loop2: detected capacity change from 0 to 264192 [ 601.328390][T20870] loop4: detected capacity change from 0 to 78 [ 601.329170][T20868] loop3: detected capacity change from 0 to 98304 [ 601.341818][T20866] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 601.346901][T20870] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 601.363496][T20868] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 601.397556][T20873] loop5: detected capacity change from 0 to 4096 [ 601.415172][T20873] FAULT_INJECTION: forcing a failure. [ 601.415172][T20873] name failslab, interval 1, probability 0, space 0, times 0 [ 601.427838][T20873] CPU: 1 PID: 20873 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 601.436604][T20873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 601.446657][T20873] Call Trace: [ 601.449935][T20873] [ 601.452859][T20873] dump_stack_lvl+0xd6/0x122 [ 601.457453][T20873] dump_stack+0x11/0x1b [ 601.461602][T20873] should_fail+0x23c/0x250 [ 601.466053][T20873] ? __list_lru_init+0x352/0x6d0 [ 601.471026][T20873] __should_failslab+0x81/0x90 [ 601.475843][T20873] should_failslab+0x5/0x20 [ 601.480346][T20873] kmem_cache_alloc_trace+0x52/0x350 [ 601.485635][T20873] ? __list_lru_init+0x352/0x6d0 [ 601.490566][T20873] __list_lru_init+0x352/0x6d0 [ 601.495326][T20873] alloc_super+0x4bf/0x520 [ 601.499739][T20873] ? mount_bdev+0x290/0x290 [ 601.504261][T20873] sget+0x189/0x370 [ 601.508071][T20873] ? test_bdev_super+0x30/0x30 [ 601.512837][T20873] mount_bdev+0xd3/0x290 [ 601.517079][T20873] ? ext4_mount+0x40/0x40 [ 601.521401][T20873] ? ext4_errno_to_code+0x110/0x110 [ 601.526601][T20873] ext4_mount+0x2d/0x40 [ 601.530886][T20873] legacy_get_tree+0x70/0xc0 [ 601.535684][T20873] vfs_get_tree+0x4a/0x1a0 [ 601.540131][T20873] path_mount+0x11cf/0x1c40 [ 601.544638][T20873] ? kmem_cache_free+0x65/0x110 [ 601.549494][T20873] __se_sys_mount+0x24b/0x2f0 [ 601.554231][T20873] ? __this_cpu_preempt_check+0x18/0x20 [ 601.559803][T20873] __x64_sys_mount+0x63/0x70 [ 601.564433][T20873] do_syscall_64+0x44/0xd0 [ 601.568889][T20873] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 601.574877][T20873] RIP: 0033:0x7f7ca8c3202a [ 601.579357][T20873] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 601.598986][T20873] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 601.607546][T20873] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 601.615514][T20873] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 601.623483][T20873] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 601.631478][T20873] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 601.639441][T20873] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 22:17:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) 22:17:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb603, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:09 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x40000000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 601.647525][T20873] 22:17:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 89) [ 601.789354][T20877] loop0: detected capacity change from 0 to 6 [ 601.795658][T20877] FAULT_INJECTION: forcing a failure. [ 601.795658][T20877] name failslab, interval 1, probability 0, space 0, times 0 [ 601.808272][T20877] CPU: 0 PID: 20877 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 601.817038][T20877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 601.827091][T20877] Call Trace: [ 601.830369][T20877] [ 601.833357][T20877] dump_stack_lvl+0xd6/0x122 [ 601.837956][T20877] dump_stack+0x11/0x1b [ 601.842208][T20877] should_fail+0x23c/0x250 [ 601.846643][T20877] ? __list_lru_init+0x352/0x6d0 [ 601.851611][T20877] __should_failslab+0x81/0x90 [ 601.856377][T20877] should_failslab+0x5/0x20 [ 601.860905][T20877] kmem_cache_alloc_trace+0x52/0x350 [ 601.866276][T20877] ? __list_lru_init+0x352/0x6d0 [ 601.871222][T20877] __list_lru_init+0x352/0x6d0 [ 601.876056][T20877] alloc_super+0x490/0x520 [ 601.880475][T20877] ? mount_bdev+0x290/0x290 [ 601.884997][T20877] sget+0x189/0x370 [ 601.888859][T20877] ? test_bdev_super+0x30/0x30 [ 601.893628][T20877] mount_bdev+0xd3/0x290 [ 601.897871][T20877] ? vfat_mount+0x40/0x40 [ 601.902215][T20877] ? tsan.module_ctor+0x10/0x10 [ 601.907076][T20877] vfat_mount+0x2d/0x40 [ 601.911298][T20877] legacy_get_tree+0x70/0xc0 [ 601.915957][T20877] vfs_get_tree+0x4a/0x1a0 [ 601.920386][T20877] path_mount+0x11cf/0x1c40 [ 601.924950][T20877] ? kmem_cache_free+0x65/0x110 [ 601.930067][T20877] __se_sys_mount+0x24b/0x2f0 [ 601.934757][T20877] __x64_sys_mount+0x63/0x70 [ 601.939409][T20877] do_syscall_64+0x44/0xd0 [ 601.943879][T20877] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 601.950053][T20877] RIP: 0033:0x7fa83371d02a [ 601.954519][T20877] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 601.974204][T20877] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 601.984013][T20877] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 601.991990][T20877] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 601.999969][T20877] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 602.007939][T20877] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 602.012025][T20885] loop4: detected capacity change from 0 to 91 [ 602.015908][T20877] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 602.015930][T20877] [ 602.034804][T20883] loop3: detected capacity change from 0 to 131072 [ 602.044201][T20885] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 602.063757][T20883] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 602.081494][T20886] loop5: detected capacity change from 0 to 4096 22:17:10 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 61) [ 602.081568][T20887] loop2: detected capacity change from 0 to 264192 [ 602.101318][T20885] loop4: detected capacity change from 0 to 91 [ 602.103582][T20883] loop3: detected capacity change from 0 to 131072 [ 602.109252][T20885] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 602.124995][T20886] FAULT_INJECTION: forcing a failure. [ 602.124995][T20886] name failslab, interval 1, probability 0, space 0, times 0 [ 602.128864][T20883] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 602.137699][T20886] CPU: 0 PID: 20886 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 602.148185][T20887] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 602.156798][T20886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 602.156811][T20886] Call Trace: [ 602.156817][T20886] [ 602.184402][T20886] dump_stack_lvl+0xd6/0x122 [ 602.189169][T20886] dump_stack+0x11/0x1b [ 602.193368][T20886] should_fail+0x23c/0x250 [ 602.197848][T20886] ? __list_lru_init+0x352/0x6d0 [ 602.202782][T20886] __should_failslab+0x81/0x90 [ 602.207544][T20886] should_failslab+0x5/0x20 [ 602.212042][T20886] kmem_cache_alloc_trace+0x52/0x350 [ 602.217312][T20886] ? __list_lru_init+0x352/0x6d0 [ 602.222234][T20886] __list_lru_init+0x352/0x6d0 [ 602.227075][T20886] alloc_super+0x4bf/0x520 [ 602.231600][T20886] ? mount_bdev+0x290/0x290 [ 602.236087][T20886] sget+0x189/0x370 [ 602.239879][T20886] ? test_bdev_super+0x30/0x30 [ 602.244657][T20886] mount_bdev+0xd3/0x290 [ 602.248882][T20886] ? ext4_mount+0x40/0x40 [ 602.253887][T20886] ? ext4_errno_to_code+0x110/0x110 [ 602.259150][T20886] ext4_mount+0x2d/0x40 [ 602.263292][T20886] legacy_get_tree+0x70/0xc0 [ 602.267932][T20886] vfs_get_tree+0x4a/0x1a0 [ 602.272359][T20886] path_mount+0x11cf/0x1c40 [ 602.276899][T20886] ? kmem_cache_free+0x65/0x110 [ 602.281788][T20886] __se_sys_mount+0x24b/0x2f0 [ 602.286452][T20886] ? __this_cpu_preempt_check+0x18/0x20 [ 602.292025][T20886] __x64_sys_mount+0x63/0x70 [ 602.296597][T20886] do_syscall_64+0x44/0xd0 [ 602.301038][T20886] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 602.306949][T20886] RIP: 0033:0x7f7ca8c3202a [ 602.311416][T20886] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 602.331098][T20886] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 602.339495][T20886] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 602.347469][T20886] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 602.355426][T20886] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 602.363379][T20886] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 602.371356][T20886] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 602.379444][T20886] 22:17:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc305, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 602.401930][T20891] loop0: detected capacity change from 0 to 6 [ 602.408284][T20891] FAULT_INJECTION: forcing a failure. [ 602.408284][T20891] name failslab, interval 1, probability 0, space 0, times 0 [ 602.420994][T20891] CPU: 0 PID: 20891 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 602.429737][T20891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 602.435919][T20887] loop2: detected capacity change from 0 to 264192 [ 602.439787][T20891] Call Trace: [ 602.439796][T20891] [ 602.439803][T20891] dump_stack_lvl+0xd6/0x122 [ 602.439827][T20891] dump_stack+0x11/0x1b [ 602.450445][T20887] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 602.452534][T20891] should_fail+0x23c/0x250 [ 602.452609][T20891] ? __list_lru_init+0x352/0x6d0 [ 602.452627][T20891] __should_failslab+0x81/0x90 [ 602.485585][T20891] should_failslab+0x5/0x20 [ 602.490143][T20891] kmem_cache_alloc_trace+0x52/0x350 [ 602.495527][T20891] ? __list_lru_init+0x352/0x6d0 [ 602.500471][T20891] __list_lru_init+0x352/0x6d0 [ 602.505337][T20891] alloc_super+0x490/0x520 [ 602.509765][T20891] ? mount_bdev+0x290/0x290 [ 602.514314][T20891] sget+0x189/0x370 [ 602.518126][T20891] ? test_bdev_super+0x30/0x30 [ 602.522896][T20891] mount_bdev+0xd3/0x290 [ 602.527140][T20891] ? vfat_mount+0x40/0x40 [ 602.531483][T20891] ? tsan.module_ctor+0x10/0x10 [ 602.536336][T20891] vfat_mount+0x2d/0x40 [ 602.536986][T20893] loop4: detected capacity change from 0 to 97 [ 602.540492][T20891] legacy_get_tree+0x70/0xc0 [ 602.540513][T20891] vfs_get_tree+0x4a/0x1a0 [ 602.553793][T20893] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 602.555640][T20891] path_mount+0x11cf/0x1c40 [ 602.555664][T20891] ? kmem_cache_free+0x65/0x110 [ 602.575174][T20891] __se_sys_mount+0x24b/0x2f0 [ 602.579835][T20891] __x64_sys_mount+0x63/0x70 [ 602.584461][T20891] do_syscall_64+0x44/0xd0 [ 602.588858][T20891] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 602.594811][T20891] RIP: 0033:0x7fa83371d02a [ 602.599271][T20891] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 602.618982][T20891] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 602.627419][T20891] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 602.635456][T20891] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 602.643412][T20891] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 22:17:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 90) 22:17:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200c0000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 602.651365][T20891] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 602.659325][T20891] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 602.667314][T20891] 22:17:10 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 62) 22:17:11 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x42000000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:17:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 602.714407][T20893] loop4: detected capacity change from 0 to 97 [ 602.725449][T20893] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 602.784866][T20898] loop5: detected capacity change from 0 to 4096 [ 602.784866][T20899] loop3: detected capacity change from 0 to 163840 [ 602.802221][T20899] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 602.816118][T20898] FAULT_INJECTION: forcing a failure. [ 602.816118][T20898] name failslab, interval 1, probability 0, space 0, times 0 [ 602.828796][T20898] CPU: 0 PID: 20898 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 602.837555][T20898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 602.847641][T20898] Call Trace: [ 602.850914][T20898] [ 602.853840][T20898] dump_stack_lvl+0xd6/0x122 [ 602.858434][T20898] dump_stack+0x11/0x1b [ 602.862587][T20898] should_fail+0x23c/0x250 [ 602.867017][T20898] ? __list_lru_init+0x352/0x6d0 [ 602.871963][T20898] __should_failslab+0x81/0x90 [ 602.876817][T20898] should_failslab+0x5/0x20 [ 602.881322][T20898] kmem_cache_alloc_trace+0x52/0x350 [ 602.886603][T20898] ? __list_lru_init+0x352/0x6d0 [ 602.891540][T20898] __list_lru_init+0x352/0x6d0 [ 602.896307][T20898] alloc_super+0x4bf/0x520 [ 602.900751][T20898] ? mount_bdev+0x290/0x290 [ 602.905418][T20898] sget+0x189/0x370 [ 602.909223][T20898] ? test_bdev_super+0x30/0x30 [ 602.913984][T20898] mount_bdev+0xd3/0x290 [ 602.918278][T20898] ? ext4_mount+0x40/0x40 [ 602.922608][T20898] ? ext4_errno_to_code+0x110/0x110 [ 602.927826][T20898] ext4_mount+0x2d/0x40 [ 602.931984][T20898] legacy_get_tree+0x70/0xc0 [ 602.936574][T20898] vfs_get_tree+0x4a/0x1a0 [ 602.940996][T20898] path_mount+0x11cf/0x1c40 [ 602.945536][T20898] ? kmem_cache_free+0x65/0x110 [ 602.950388][T20898] __se_sys_mount+0x24b/0x2f0 [ 602.955062][T20898] ? __this_cpu_preempt_check+0x18/0x20 [ 602.960628][T20898] __x64_sys_mount+0x63/0x70 [ 602.965310][T20898] do_syscall_64+0x44/0xd0 [ 602.969733][T20898] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 602.975751][T20898] RIP: 0033:0x7f7ca8c3202a [ 602.980215][T20898] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 602.999459][T20904] loop4: detected capacity change from 0 to 118 [ 602.999910][T20898] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 602.999933][T20898] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 603.016757][T20904] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 603.022688][T20898] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 603.022704][T20898] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 603.048797][T20898] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 603.056767][T20898] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 603.064745][T20898] 22:17:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 91) [ 603.085851][T20899] loop3: detected capacity change from 0 to 163840 [ 603.085890][T20904] loop4: detected capacity change from 0 to 118 [ 603.094824][T20899] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 603.110653][T20904] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfeff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 603.156191][T20906] loop2: detected capacity change from 0 to 264192 [ 603.172247][T20907] loop0: detected capacity change from 0 to 6 [ 603.180620][T20907] FAULT_INJECTION: forcing a failure. [ 603.180620][T20907] name failslab, interval 1, probability 0, space 0, times 0 [ 603.183427][T20906] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 603.193372][T20907] CPU: 0 PID: 20907 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 603.193396][T20907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 603.193407][T20907] Call Trace: [ 603.193413][T20907] [ 603.193421][T20907] dump_stack_lvl+0xd6/0x122 [ 603.233290][T20907] dump_stack+0x11/0x1b [ 603.237480][T20907] should_fail+0x23c/0x250 [ 603.242028][T20907] ? __list_lru_init+0x352/0x6d0 [ 603.246963][T20907] __should_failslab+0x81/0x90 [ 603.251743][T20907] should_failslab+0x5/0x20 [ 603.256247][T20907] kmem_cache_alloc_trace+0x52/0x350 [ 603.261537][T20907] ? __list_lru_init+0x352/0x6d0 [ 603.266509][T20907] __list_lru_init+0x352/0x6d0 [ 603.271274][T20907] alloc_super+0x490/0x520 [ 603.275689][T20907] ? mount_bdev+0x290/0x290 [ 603.280192][T20907] sget+0x189/0x370 [ 603.284072][T20907] ? test_bdev_super+0x30/0x30 [ 603.288864][T20907] mount_bdev+0xd3/0x290 [ 603.293113][T20907] ? vfat_mount+0x40/0x40 [ 603.296733][T20911] loop4: detected capacity change from 0 to 127 [ 603.297441][T20907] ? tsan.module_ctor+0x10/0x10 [ 603.297466][T20907] vfat_mount+0x2d/0x40 [ 603.297486][T20907] legacy_get_tree+0x70/0xc0 [ 603.297532][T20907] vfs_get_tree+0x4a/0x1a0 [ 603.312328][T20911] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 603.312888][T20907] path_mount+0x11cf/0x1c40 [ 603.312910][T20907] ? kmem_cache_free+0x65/0x110 [ 603.341339][T20907] __se_sys_mount+0x24b/0x2f0 [ 603.346105][T20907] __x64_sys_mount+0x63/0x70 [ 603.350725][T20907] do_syscall_64+0x44/0xd0 [ 603.355210][T20907] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 603.361111][T20907] RIP: 0033:0x7fa83371d02a [ 603.365521][T20907] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 603.385127][T20907] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 603.393538][T20907] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 603.401624][T20907] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 603.409588][T20907] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 603.417567][T20907] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 603.425629][T20907] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 603.433601][T20907] [ 603.438604][T20912] loop5: detected capacity change from 0 to 4096 [ 603.454854][T20911] loop4: detected capacity change from 0 to 127 [ 603.455679][T20912] FAULT_INJECTION: forcing a failure. [ 603.455679][T20912] name failslab, interval 1, probability 0, space 0, times 0 [ 603.466036][T20911] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 603.473760][T20912] CPU: 0 PID: 20912 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 603.473786][T20912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 603.486638][T20906] loop2: detected capacity change from 0 to 264192 [ 603.493168][T20912] Call Trace: [ 603.493177][T20912] [ 603.493183][T20912] dump_stack_lvl+0xd6/0x122 [ 603.520530][T20912] dump_stack+0x11/0x1b [ 603.524689][T20912] should_fail+0x23c/0x250 [ 603.528407][T20906] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 603.529183][T20912] ? __list_lru_init+0x352/0x6d0 [ 603.529203][T20912] __should_failslab+0x81/0x90 [ 603.529224][T20912] should_failslab+0x5/0x20 [ 603.529244][T20912] kmem_cache_alloc_trace+0x52/0x350 [ 603.559220][T20912] ? __list_lru_init+0x352/0x6d0 [ 603.564204][T20912] __list_lru_init+0x352/0x6d0 [ 603.568962][T20912] alloc_super+0x4bf/0x520 [ 603.573515][T20912] ? mount_bdev+0x290/0x290 [ 603.578020][T20912] sget+0x189/0x370 [ 603.581825][T20912] ? test_bdev_super+0x30/0x30 [ 603.586720][T20912] mount_bdev+0xd3/0x290 [ 603.591034][T20912] ? ext4_mount+0x40/0x40 [ 603.595364][T20912] ? ext4_errno_to_code+0x110/0x110 [ 603.600565][T20912] ext4_mount+0x2d/0x40 [ 603.604716][T20912] legacy_get_tree+0x70/0xc0 [ 603.609300][T20912] vfs_get_tree+0x4a/0x1a0 [ 603.613771][T20912] path_mount+0x11cf/0x1c40 [ 603.618264][T20912] ? kmem_cache_free+0x65/0x110 [ 603.623117][T20912] __se_sys_mount+0x24b/0x2f0 [ 603.627965][T20912] ? __this_cpu_preempt_check+0x18/0x20 [ 603.633519][T20912] __x64_sys_mount+0x63/0x70 [ 603.638107][T20912] do_syscall_64+0x44/0xd0 [ 603.642531][T20912] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 603.648429][T20912] RIP: 0033:0x7f7ca8c3202a [ 603.652843][T20912] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 603.672447][T20912] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 603.680914][T20912] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 603.688948][T20912] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 603.697034][T20912] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 22:17:11 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 63) [ 603.705003][T20912] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 603.713117][T20912] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 603.721105][T20912] 22:17:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) 22:17:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 92) [ 603.751597][T20915] loop3: detected capacity change from 0 to 196608 [ 603.772238][T20915] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6040000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 603.829881][T20915] loop3: detected capacity change from 0 to 196608 [ 603.837535][T20915] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 603.907427][T20919] loop0: detected capacity change from 0 to 6 [ 603.913962][T20919] FAULT_INJECTION: forcing a failure. [ 603.913962][T20919] name failslab, interval 1, probability 0, space 0, times 0 [ 603.926752][T20919] CPU: 0 PID: 20919 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 603.935517][T20919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 603.945625][T20919] Call Trace: [ 603.948899][T20919] [ 603.951826][T20919] dump_stack_lvl+0xd6/0x122 [ 603.956561][T20919] dump_stack+0x11/0x1b [ 603.960722][T20919] should_fail+0x23c/0x250 [ 603.965137][T20919] ? __list_lru_init+0x352/0x6d0 [ 603.970066][T20919] __should_failslab+0x81/0x90 [ 603.974830][T20919] should_failslab+0x5/0x20 [ 603.979388][T20919] kmem_cache_alloc_trace+0x52/0x350 [ 603.984668][T20919] ? __list_lru_init+0x352/0x6d0 [ 603.990037][T20919] __list_lru_init+0x352/0x6d0 [ 603.994879][T20919] alloc_super+0x490/0x520 [ 603.999294][T20919] ? mount_bdev+0x290/0x290 [ 604.003790][T20919] sget+0x189/0x370 [ 604.007595][T20919] ? test_bdev_super+0x30/0x30 [ 604.012390][T20919] mount_bdev+0xd3/0x290 [ 604.016699][T20919] ? vfat_mount+0x40/0x40 [ 604.021058][T20919] ? tsan.module_ctor+0x10/0x10 [ 604.025910][T20919] vfat_mount+0x2d/0x40 [ 604.030064][T20919] legacy_get_tree+0x70/0xc0 [ 604.034654][T20919] vfs_get_tree+0x4a/0x1a0 [ 604.039068][T20919] path_mount+0x11cf/0x1c40 [ 604.043632][T20919] ? kmem_cache_free+0x65/0x110 [ 604.048535][T20919] __se_sys_mount+0x24b/0x2f0 [ 604.053219][T20919] __x64_sys_mount+0x63/0x70 [ 604.057867][T20919] do_syscall_64+0x44/0xd0 [ 604.062282][T20919] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 604.068257][T20919] RIP: 0033:0x7fa83371d02a [ 604.072664][T20919] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 604.082248][T20923] loop2: detected capacity change from 0 to 264192 [ 604.092297][T20919] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 604.092320][T20919] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 604.092377][T20919] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 604.123311][T20919] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 604.129324][T20923] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 604.131279][T20919] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 604.131295][T20919] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 22:17:12 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x64000000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 604.131312][T20919] [ 604.164823][T20922] loop4: detected capacity change from 0 to 127 [ 604.186056][T20923] loop2: detected capacity change from 0 to 264192 [ 604.193666][T20923] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:12 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 64) [ 604.206632][T20922] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 604.220676][T20925] loop5: detected capacity change from 0 to 4096 [ 604.243741][T20925] FAULT_INJECTION: forcing a failure. [ 604.243741][T20925] name failslab, interval 1, probability 0, space 0, times 0 [ 604.244784][T20922] loop4: detected capacity change from 0 to 127 [ 604.256589][T20925] CPU: 0 PID: 20925 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 604.271575][T20925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 604.281634][T20925] Call Trace: [ 604.285091][T20925] [ 604.287867][T20922] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 604.288075][T20925] dump_stack_lvl+0xd6/0x122 [ 604.302887][T20925] dump_stack+0x11/0x1b 22:17:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 604.307088][T20925] should_fail+0x23c/0x250 [ 604.311534][T20925] ? __list_lru_init+0x352/0x6d0 [ 604.316467][T20925] __should_failslab+0x81/0x90 [ 604.321266][T20925] should_failslab+0x5/0x20 [ 604.325819][T20925] kmem_cache_alloc_trace+0x52/0x350 [ 604.331111][T20925] ? __list_lru_init+0x352/0x6d0 [ 604.336043][T20925] __list_lru_init+0x352/0x6d0 [ 604.340848][T20925] alloc_super+0x4bf/0x520 [ 604.345429][T20925] ? mount_bdev+0x290/0x290 [ 604.350031][T20925] sget+0x189/0x370 [ 604.353934][T20925] ? test_bdev_super+0x30/0x30 [ 604.358734][T20925] mount_bdev+0xd3/0x290 [ 604.363011][T20925] ? ext4_mount+0x40/0x40 [ 604.367444][T20925] ? ext4_errno_to_code+0x110/0x110 [ 604.372667][T20925] ext4_mount+0x2d/0x40 [ 604.376881][T20925] legacy_get_tree+0x70/0xc0 [ 604.381532][T20925] vfs_get_tree+0x4a/0x1a0 [ 604.385947][T20925] path_mount+0x11cf/0x1c40 [ 604.390450][T20925] ? kmem_cache_free+0x65/0x110 [ 604.395298][T20925] __se_sys_mount+0x24b/0x2f0 [ 604.400049][T20925] ? __this_cpu_preempt_check+0x18/0x20 [ 604.405610][T20925] __x64_sys_mount+0x63/0x70 [ 604.410222][T20925] do_syscall_64+0x44/0xd0 [ 604.414641][T20925] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 604.420532][T20925] RIP: 0033:0x7f7ca8c3202a [ 604.425090][T20925] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 604.443080][T20932] loop2: detected capacity change from 0 to 264192 [ 604.444836][T20925] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 604.452116][T20931] loop0: detected capacity change from 0 to 6 [ 604.459742][T20925] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 604.459757][T20925] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 604.459769][T20925] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 604.459780][T20925] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 604.459792][T20925] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 604.471965][T20931] FAULT_INJECTION: forcing a failure. [ 604.471965][T20931] name failslab, interval 1, probability 0, space 0, times 0 [ 604.473853][T20925] [ 604.474779][T20926] loop3: detected capacity change from 0 to 197120 [ 604.482044][T20931] CPU: 1 PID: 20931 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 604.536785][T20931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 604.546882][T20931] Call Trace: [ 604.550153][T20931] [ 604.553113][T20931] dump_stack_lvl+0xd6/0x122 [ 604.557963][T20931] dump_stack+0x11/0x1b [ 604.562112][T20931] should_fail+0x23c/0x250 [ 604.566532][T20931] ? __list_lru_init+0x352/0x6d0 [ 604.571462][T20931] __should_failslab+0x81/0x90 [ 604.576284][T20931] should_failslab+0x5/0x20 [ 604.580787][T20931] kmem_cache_alloc_trace+0x52/0x350 [ 604.586069][T20931] ? __list_lru_init+0x352/0x6d0 [ 604.591004][T20931] __list_lru_init+0x352/0x6d0 [ 604.595803][T20931] alloc_super+0x490/0x520 [ 604.600275][T20931] ? mount_bdev+0x290/0x290 [ 604.604774][T20931] sget+0x189/0x370 [ 604.608720][T20931] ? test_bdev_super+0x30/0x30 [ 604.613643][T20931] mount_bdev+0xd3/0x290 [ 604.617884][T20931] ? vfat_mount+0x40/0x40 [ 604.622244][T20931] ? tsan.module_ctor+0x10/0x10 [ 604.627096][T20931] vfat_mount+0x2d/0x40 [ 604.631247][T20931] legacy_get_tree+0x70/0xc0 [ 604.635961][T20931] vfs_get_tree+0x4a/0x1a0 [ 604.640373][T20931] path_mount+0x11cf/0x1c40 [ 604.645010][T20931] ? kmem_cache_free+0x65/0x110 [ 604.649940][T20931] __se_sys_mount+0x24b/0x2f0 [ 604.654644][T20931] __x64_sys_mount+0x63/0x70 [ 604.659222][T20931] do_syscall_64+0x44/0xd0 [ 604.663713][T20931] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 604.669605][T20931] RIP: 0033:0x7fa83371d02a [ 604.674014][T20931] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 604.693784][T20931] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 604.702263][T20931] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 604.710353][T20931] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 604.718470][T20931] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 604.726437][T20931] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 604.734511][T20931] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 604.742499][T20931] 22:17:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 93) 22:17:13 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 65) 22:17:13 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x69010000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 604.752562][T20926] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 604.762947][T20932] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 604.841385][T20932] loop2: detected capacity change from 0 to 264192 [ 604.841455][T20926] loop3: detected capacity change from 0 to 197120 [ 604.841518][T20932] ================================================================== [ 604.841542][T20932] BUG: KCSAN: data-race in data_push_tail / number [ 604.841565][T20932] [ 604.841571][T20932] write to 0xffffffff86da44d7 of 1 bytes by task 20926 on cpu 0: [ 604.841584][T20932] number+0x846/0xb60 [ 604.841601][T20932] vsnprintf+0xb6d/0xed0 [ 604.841617][T20932] vscnprintf+0x29/0x80 [ 604.841634][T20932] vprintk_store+0x638/0xbb0 [ 604.841650][T20932] vprintk_emit+0xac/0x3c0 [ 604.841666][T20932] vprintk_default+0x22/0x30 [ 604.841682][T20932] vprintk+0x7f/0x90 [ 604.841714][T20932] _printk+0x76/0x97 [ 604.841728][T20932] set_capacity_and_notify+0x17c/0x1e0 [ 604.841750][T20932] loop_configure+0xd30/0xf30 [ 604.841770][T20932] lo_ioctl+0x583/0x1270 [ 604.841786][T20932] blkdev_ioctl+0x20e/0x440 [ 604.841804][T20932] __se_sys_ioctl+0xcb/0x140 [ 604.841826][T20932] __x64_sys_ioctl+0x3f/0x50 [ 604.841865][T20932] do_syscall_64+0x44/0xd0 [ 604.841894][T20932] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 604.841918][T20932] [ 604.841924][T20932] read to 0xffffffff86da44d0 of 8 bytes by task 20932 on cpu 1: [ 604.841940][T20932] data_push_tail+0x138/0x470 [ 604.841960][T20932] data_alloc+0xbc/0x2b0 [ 604.841978][T20932] prb_reserve+0x920/0xbf0 [ 604.841995][T20932] vprintk_store+0x560/0xbb0 [ 604.842010][T20932] vprintk_emit+0xac/0x3c0 [ 604.842026][T20932] vprintk_default+0x22/0x30 [ 604.842044][T20932] vprintk+0x7f/0x90 [ 604.842063][T20932] _printk+0x76/0x97 [ 604.842077][T20932] set_capacity_and_notify+0x17c/0x1e0 [ 604.842097][T20932] loop_configure+0xd30/0xf30 [ 604.842116][T20932] lo_ioctl+0x583/0x1270 [ 604.842132][T20932] blkdev_ioctl+0x20e/0x440 [ 604.842151][T20932] __se_sys_ioctl+0xcb/0x140 [ 604.842173][T20932] __x64_sys_ioctl+0x3f/0x50 [ 604.842194][T20932] do_syscall_64+0x44/0xd0 [ 604.842212][T20932] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 604.842233][T20932] [ 604.842236][T20932] value changed: 0x000000010000186a -> 0x00206d6f72662065 [ 604.842248][T20932] [ 604.842251][T20932] Reported by Kernel Concurrency Sanitizer on: [ 604.842259][T20932] CPU: 1 PID: 20932 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 604.842280][T20932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 604.842291][T20932] ================================================================== [ 604.869346][T20926] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 604.873420][T20932] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 605.231810][T20940] loop4: detected capacity change from 0 to 127 [ 605.261900][T20940] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 605.299093][T20944] loop5: detected capacity change from 0 to 4096 [ 605.306497][T20940] loop4: detected capacity change from 0 to 127 [ 605.313542][T20943] loop0: detected capacity change from 0 to 6 [ 605.322719][T20943] FAULT_INJECTION: forcing a failure. [ 605.322719][T20943] name failslab, interval 1, probability 0, space 0, times 0 [ 605.335369][T20943] CPU: 0 PID: 20943 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 605.344226][T20943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 605.354494][T20943] Call Trace: [ 605.357769][T20943] [ 605.360696][T20943] dump_stack_lvl+0xd6/0x122 [ 605.365298][T20943] dump_stack+0x11/0x1b [ 605.367581][T20940] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 605.369465][T20943] should_fail+0x23c/0x250 [ 605.369487][T20943] ? __list_lru_init+0x352/0x6d0 [ 605.388969][T20943] __should_failslab+0x81/0x90 [ 605.393771][T20943] should_failslab+0x5/0x20 [ 605.398318][T20943] kmem_cache_alloc_trace+0x52/0x350 [ 605.403712][T20943] ? __list_lru_init+0x352/0x6d0 [ 605.408656][T20943] __list_lru_init+0x352/0x6d0 [ 605.413543][T20943] alloc_super+0x490/0x520 [ 605.417960][T20943] ? mount_bdev+0x290/0x290 [ 605.422495][T20943] sget+0x189/0x370 [ 605.426301][T20943] ? test_bdev_super+0x30/0x30 [ 605.431157][T20943] mount_bdev+0xd3/0x290 [ 605.435971][T20943] ? vfat_mount+0x40/0x40 [ 605.440370][T20943] ? tsan.module_ctor+0x10/0x10 [ 605.445229][T20943] vfat_mount+0x2d/0x40 [ 605.449535][T20943] legacy_get_tree+0x70/0xc0 [ 605.454130][T20943] vfs_get_tree+0x4a/0x1a0 [ 605.458594][T20943] path_mount+0x11cf/0x1c40 [ 605.463114][T20943] ? kmem_cache_free+0x65/0x110 [ 605.467966][T20943] __se_sys_mount+0x24b/0x2f0 [ 605.472705][T20943] __x64_sys_mount+0x63/0x70 [ 605.477319][T20943] do_syscall_64+0x44/0xd0 [ 605.481799][T20943] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 605.487730][T20943] RIP: 0033:0x7fa83371d02a [ 605.492138][T20943] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 605.511748][T20943] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 605.520178][T20943] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 605.528146][T20943] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 605.536114][T20943] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 605.544088][T20943] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 605.552058][T20943] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 605.560041][T20943] [ 605.563680][T20946] loop3: detected capacity change from 0 to 229376 [ 605.580253][T20944] FAULT_INJECTION: forcing a failure. [ 605.580253][T20944] name failslab, interval 1, probability 0, space 0, times 0 [ 605.584158][T20946] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 605.593172][T20944] CPU: 0 PID: 20944 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 605.612079][T20944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 605.622145][T20944] Call Trace: [ 605.625567][T20944] [ 605.628562][T20944] dump_stack_lvl+0xd6/0x122 [ 605.633191][T20944] dump_stack+0x11/0x1b [ 605.637369][T20944] should_fail+0x23c/0x250 [ 605.641802][T20944] ? ext4_fill_super+0x3d/0x78f0 [ 605.646854][T20944] __should_failslab+0x81/0x90 [ 605.651637][T20944] should_failslab+0x5/0x20 [ 605.656140][T20944] __kmalloc_track_caller+0x6d/0x370 [ 605.661449][T20944] ? bdev_name+0x1e1/0x240 [ 605.665963][T20944] kstrdup+0x31/0x70 [ 605.669858][T20944] ext4_fill_super+0x3d/0x78f0 [ 605.674632][T20944] ? vsnprintf+0xe8f/0xed0 [ 605.679153][T20944] ? snprintf+0x83/0xb0 [ 605.683316][T20944] ? set_blocksize+0x197/0x270 [ 605.688122][T20944] mount_bdev+0x1e8/0x290 [ 605.692459][T20944] ? ext4_mount+0x40/0x40 [ 605.696805][T20944] ? ext4_errno_to_code+0x110/0x110 [ 605.702050][T20944] ext4_mount+0x2d/0x40 [ 605.706249][T20944] legacy_get_tree+0x70/0xc0 [ 605.710950][T20944] vfs_get_tree+0x4a/0x1a0 [ 605.715428][T20944] path_mount+0x11cf/0x1c40 [ 605.719972][T20944] ? kmem_cache_free+0x65/0x110 [ 605.724829][T20944] __se_sys_mount+0x24b/0x2f0 [ 605.729506][T20944] ? __this_cpu_preempt_check+0x18/0x20 [ 605.735111][T20944] __x64_sys_mount+0x63/0x70 [ 605.739709][T20944] do_syscall_64+0x44/0xd0 [ 605.744152][T20944] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 605.750070][T20944] RIP: 0033:0x7f7ca8c3202a [ 605.754484][T20944] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 605.774092][T20944] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 605.782627][T20944] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 605.790595][T20944] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 22:17:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:14 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 66) [ 605.798593][T20944] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 605.806560][T20944] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 605.814532][T20944] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 605.822537][T20944] [ 605.827697][T20950] loop2: detected capacity change from 0 to 264192 22:17:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 94) [ 605.852906][T20950] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 605.856065][T20946] loop3: detected capacity change from 0 to 229376 [ 605.873239][T20946] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 605.889677][T20950] loop2: detected capacity change from 0 to 264192 22:17:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 605.896784][T20950] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 606.022777][T20953] loop4: detected capacity change from 0 to 1024 [ 606.041283][T20953] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 606.063825][T20956] loop0: detected capacity change from 0 to 6 [ 606.063855][T20958] loop5: detected capacity change from 0 to 4096 [ 606.071901][T20956] FAULT_INJECTION: forcing a failure. [ 606.071901][T20956] name failslab, interval 1, probability 0, space 0, times 0 [ 606.088951][T20956] CPU: 1 PID: 20956 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 606.097708][T20956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 606.107759][T20956] Call Trace: [ 606.111031][T20956] [ 606.113955][T20956] dump_stack_lvl+0xd6/0x122 [ 606.118648][T20956] dump_stack+0x11/0x1b [ 606.122834][T20956] should_fail+0x23c/0x250 [ 606.127253][T20956] __should_failslab+0x81/0x90 [ 606.132237][T20956] should_failslab+0x5/0x20 [ 606.136745][T20956] kmem_cache_alloc_node_trace+0x61/0x310 [ 606.142516][T20956] ? should_fail+0xd6/0x250 [ 606.147064][T20956] ? __kmalloc_node+0x30/0x40 [ 606.151786][T20956] __kmalloc_node+0x30/0x40 [ 606.156289][T20956] kvmalloc_node+0x81/0x110 [ 606.160818][T20956] __list_lru_init+0x2f7/0x6d0 [ 606.165758][T20956] alloc_super+0x4bf/0x520 [ 606.170174][T20956] ? mount_bdev+0x290/0x290 [ 606.174742][T20956] sget+0x189/0x370 [ 606.178550][T20956] ? test_bdev_super+0x30/0x30 [ 606.183331][T20956] mount_bdev+0xd3/0x290 [ 606.187585][T20956] ? vfat_mount+0x40/0x40 [ 606.191911][T20956] ? tsan.module_ctor+0x10/0x10 [ 606.196769][T20956] vfat_mount+0x2d/0x40 [ 606.200993][T20956] legacy_get_tree+0x70/0xc0 [ 606.205580][T20956] vfs_get_tree+0x4a/0x1a0 [ 606.210001][T20956] path_mount+0x11cf/0x1c40 [ 606.214505][T20956] ? kmem_cache_free+0x65/0x110 [ 606.219423][T20956] __se_sys_mount+0x24b/0x2f0 [ 606.224211][T20956] __x64_sys_mount+0x63/0x70 [ 606.228804][T20956] do_syscall_64+0x44/0xd0 [ 606.233401][T20956] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 606.239297][T20956] RIP: 0033:0x7fa83371d02a [ 606.243712][T20956] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 606.263385][T20956] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 606.271853][T20956] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 606.279875][T20956] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 606.287842][T20956] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 606.295815][T20956] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 606.303785][T20956] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 606.312282][T20956] [ 606.323165][T20958] FAULT_INJECTION: forcing a failure. [ 606.323165][T20958] name failslab, interval 1, probability 0, space 0, times 0 [ 606.335892][T20958] CPU: 0 PID: 20958 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 606.344651][T20958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 606.354768][T20958] Call Trace: [ 606.358046][T20958] [ 606.360983][T20958] dump_stack_lvl+0xd6/0x122 [ 606.365572][T20958] dump_stack+0x11/0x1b [ 606.369768][T20958] should_fail+0x23c/0x250 [ 606.374189][T20958] ? ext4_fill_super+0x62/0x78f0 [ 606.379125][T20958] __should_failslab+0x81/0x90 [ 606.383890][T20958] should_failslab+0x5/0x20 [ 606.388392][T20958] kmem_cache_alloc_trace+0x52/0x350 [ 606.393726][T20958] ext4_fill_super+0x62/0x78f0 [ 606.398500][T20958] ? vsnprintf+0xe8f/0xed0 [ 606.402913][T20958] ? snprintf+0x83/0xb0 [ 606.407074][T20958] ? set_blocksize+0x197/0x270 [ 606.411838][T20958] mount_bdev+0x1e8/0x290 [ 606.416218][T20958] ? ext4_mount+0x40/0x40 [ 606.420541][T20958] ? ext4_errno_to_code+0x110/0x110 [ 606.425757][T20958] ext4_mount+0x2d/0x40 [ 606.429944][T20958] legacy_get_tree+0x70/0xc0 [ 606.434519][T20958] vfs_get_tree+0x4a/0x1a0 [ 606.438922][T20958] path_mount+0x11cf/0x1c40 [ 606.443424][T20958] ? kmem_cache_free+0x65/0x110 [ 606.448264][T20958] __se_sys_mount+0x24b/0x2f0 [ 606.452926][T20958] ? __this_cpu_preempt_check+0x18/0x20 [ 606.458527][T20958] __x64_sys_mount+0x63/0x70 [ 606.463209][T20958] do_syscall_64+0x44/0xd0 [ 606.467679][T20958] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 606.473630][T20958] RIP: 0033:0x7f7ca8c3202a [ 606.478056][T20958] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 606.497656][T20958] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 606.506051][T20958] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 606.514102][T20958] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 22:17:14 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x7f000000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 606.522134][T20958] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 606.530117][T20958] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 606.538186][T20958] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 606.546325][T20958] [ 606.549835][T20961] loop3: detected capacity change from 0 to 262144 22:17:14 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 67) 22:17:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 95) [ 606.572535][T20961] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 606.587120][T20953] loop4: detected capacity change from 0 to 1024 [ 606.596707][T20962] loop2: detected capacity change from 0 to 264192 [ 606.596793][T20953] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80040, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 606.618928][T20962] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 606.641953][T20961] loop3: detected capacity change from 0 to 262144 [ 606.654301][T20961] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 606.667839][T20962] loop2: detected capacity change from 0 to 264192 [ 606.674888][T20962] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) 22:17:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 606.821081][T20967] loop5: detected capacity change from 0 to 4096 [ 606.841205][T20967] FAULT_INJECTION: forcing a failure. [ 606.841205][T20967] name failslab, interval 1, probability 0, space 0, times 0 [ 606.841831][T20969] loop0: detected capacity change from 0 to 6 [ 606.853936][T20967] CPU: 0 PID: 20967 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 606.860531][T20969] FAULT_INJECTION: forcing a failure. [ 606.860531][T20969] name failslab, interval 1, probability 0, space 0, times 0 [ 606.868776][T20967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 606.868790][T20967] Call Trace: [ 606.868796][T20967] [ 606.897612][T20967] dump_stack_lvl+0xd6/0x122 [ 606.902221][T20967] dump_stack+0x11/0x1b [ 606.906365][T20967] should_fail+0x23c/0x250 [ 606.910814][T20967] ? ext4_fill_super+0x1f0/0x78f0 [ 606.915839][T20967] __should_failslab+0x81/0x90 [ 606.920591][T20967] should_failslab+0x5/0x20 [ 606.925082][T20967] kmem_cache_alloc_trace+0x52/0x350 [ 606.930376][T20967] ? ext4_fill_super+0x62/0x78f0 [ 606.935326][T20967] ext4_fill_super+0x1f0/0x78f0 [ 606.940167][T20967] ? vsnprintf+0xe8f/0xed0 [ 606.944614][T20967] ? snprintf+0x83/0xb0 [ 606.948797][T20967] ? set_blocksize+0x197/0x270 [ 606.953582][T20967] mount_bdev+0x1e8/0x290 [ 606.957906][T20967] ? ext4_mount+0x40/0x40 [ 606.962289][T20967] ? ext4_errno_to_code+0x110/0x110 [ 606.967488][T20967] ext4_mount+0x2d/0x40 [ 606.971648][T20967] legacy_get_tree+0x70/0xc0 [ 606.976499][T20967] vfs_get_tree+0x4a/0x1a0 [ 606.980986][T20967] path_mount+0x11cf/0x1c40 [ 606.985474][T20967] ? kmem_cache_free+0x65/0x110 [ 606.990324][T20967] __se_sys_mount+0x24b/0x2f0 [ 606.994983][T20967] ? __this_cpu_preempt_check+0x18/0x20 [ 607.000517][T20967] __x64_sys_mount+0x63/0x70 [ 607.005125][T20967] do_syscall_64+0x44/0xd0 [ 607.009527][T20967] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 607.015406][T20967] RIP: 0033:0x7f7ca8c3202a [ 607.019805][T20967] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 607.039412][T20967] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 607.047818][T20967] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 607.055781][T20967] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 607.063848][T20967] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 607.072008][T20967] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 607.080015][T20967] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 607.087981][T20967] [ 607.090984][T20969] CPU: 1 PID: 20969 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 607.099782][T20969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.109837][T20969] Call Trace: [ 607.113108][T20969] [ 607.116032][T20969] dump_stack_lvl+0xd6/0x122 [ 607.120697][T20969] dump_stack+0x11/0x1b [ 607.124850][T20969] should_fail+0x23c/0x250 [ 607.129309][T20969] ? __list_lru_init+0x352/0x6d0 [ 607.134243][T20969] __should_failslab+0x81/0x90 [ 607.139005][T20969] should_failslab+0x5/0x20 [ 607.143569][T20969] kmem_cache_alloc_trace+0x52/0x350 [ 607.148865][T20969] ? __kmalloc_node+0x30/0x40 [ 607.153556][T20969] __list_lru_init+0x352/0x6d0 [ 607.158319][T20969] alloc_super+0x4bf/0x520 [ 607.162866][T20969] ? mount_bdev+0x290/0x290 [ 607.167367][T20969] sget+0x189/0x370 [ 607.171285][T20969] ? test_bdev_super+0x30/0x30 [ 607.176050][T20969] mount_bdev+0xd3/0x290 [ 607.180288][T20969] ? vfat_mount+0x40/0x40 [ 607.184695][T20969] ? tsan.module_ctor+0x10/0x10 [ 607.189545][T20969] vfat_mount+0x2d/0x40 [ 607.193703][T20969] legacy_get_tree+0x70/0xc0 [ 607.198385][T20969] vfs_get_tree+0x4a/0x1a0 [ 607.202807][T20969] path_mount+0x11cf/0x1c40 [ 607.207383][T20969] ? kmem_cache_free+0x65/0x110 [ 607.212238][T20969] __se_sys_mount+0x24b/0x2f0 [ 607.216985][T20969] __x64_sys_mount+0x63/0x70 [ 607.221572][T20969] do_syscall_64+0x44/0xd0 [ 607.226000][T20969] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 607.231893][T20969] RIP: 0033:0x7fa83371d02a [ 607.236370][T20969] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 607.255996][T20969] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 607.264433][T20969] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 607.272399][T20969] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 607.280379][T20969] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 607.288348][T20969] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 607.296317][T20969] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 607.304290][T20969] 22:17:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 96) 22:17:15 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 68) [ 607.327848][T20972] loop4: detected capacity change from 0 to 1024 [ 607.346694][T20972] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 607.379923][T20975] loop2: detected capacity change from 0 to 264192 [ 607.380110][T20976] loop3: detected capacity change from 0 to 264192 [ 607.398584][T20972] loop4: detected capacity change from 0 to 1024 [ 607.405443][T20972] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 607.417093][T20975] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 607.430631][T20976] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 607.462731][T20978] loop5: detected capacity change from 0 to 4096 [ 607.470740][T20976] loop3: detected capacity change from 0 to 264192 22:17:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 607.476657][T20978] FAULT_INJECTION: forcing a failure. [ 607.476657][T20978] name failslab, interval 1, probability 0, space 0, times 0 [ 607.485974][T20975] loop2: detected capacity change from 0 to 264192 [ 607.489901][T20978] CPU: 1 PID: 20978 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 607.498523][T20975] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 607.505210][T20978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.505224][T20978] Call Trace: [ 607.505230][T20978] [ 607.505237][T20978] dump_stack_lvl+0xd6/0x122 [ 607.521160][T20976] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 607.525544][T20978] dump_stack+0x11/0x1b [ 607.550758][T20978] should_fail+0x23c/0x250 [ 607.555233][T20978] ? mempool_alloc_slab+0x16/0x20 [ 607.560364][T20978] __should_failslab+0x81/0x90 [ 607.565290][T20978] should_failslab+0x5/0x20 [ 607.569865][T20978] kmem_cache_alloc+0x4f/0x320 [ 607.574614][T20978] mempool_alloc_slab+0x16/0x20 [ 607.579476][T20978] ? mempool_free+0x130/0x130 [ 607.584154][T20978] mempool_alloc+0x9d/0x310 [ 607.588671][T20978] bio_alloc_bioset+0xcc/0x560 [ 607.593559][T20978] ? __find_get_block+0x8b4/0x9b0 [ 607.598841][T20978] submit_bh_wbc+0x133/0x320 [ 607.603422][T20978] ? __getblk_gfp+0x493/0x530 [ 607.608083][T20978] submit_bh+0x21/0x30 [ 607.612152][T20978] ? __wait_on_buffer+0x60/0x60 [ 607.616989][T20978] ext4_read_bh+0xf1/0x170 [ 607.621424][T20978] ext4_sb_bread_unmovable+0xf7/0x1a0 [ 607.626855][T20978] ext4_fill_super+0x427/0x78f0 [ 607.631763][T20978] ? vsnprintf+0xe8f/0xed0 [ 607.636218][T20978] ? snprintf+0x83/0xb0 [ 607.640369][T20978] ? set_blocksize+0x197/0x270 [ 607.650083][T20978] mount_bdev+0x1e8/0x290 [ 607.654409][T20978] ? ext4_mount+0x40/0x40 [ 607.658730][T20978] ? ext4_errno_to_code+0x110/0x110 [ 607.663921][T20978] ext4_mount+0x2d/0x40 [ 607.668066][T20978] legacy_get_tree+0x70/0xc0 [ 607.672639][T20978] vfs_get_tree+0x4a/0x1a0 [ 607.677042][T20978] path_mount+0x11cf/0x1c40 [ 607.681532][T20978] ? kmem_cache_free+0x65/0x110 [ 607.686377][T20978] __se_sys_mount+0x24b/0x2f0 [ 607.691041][T20978] ? __this_cpu_preempt_check+0x18/0x20 [ 607.696635][T20978] __x64_sys_mount+0x63/0x70 [ 607.701205][T20978] do_syscall_64+0x44/0xd0 [ 607.705663][T20978] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 607.711612][T20978] RIP: 0033:0x7f7ca8c3202a [ 607.716136][T20978] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 607.735720][T20978] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 607.744139][T20978] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 607.752191][T20978] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 607.760190][T20978] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 607.768320][T20978] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 22:17:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) 22:17:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:16 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0x96020000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 607.776331][T20978] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 607.784303][T20978] [ 607.791481][T20978] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 607.800790][T20978] EXT4-fs (loop5): group descriptors corrupted! 22:17:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 97) [ 607.922421][T20982] loop0: detected capacity change from 0 to 6 [ 607.928809][T20982] FAULT_INJECTION: forcing a failure. [ 607.928809][T20982] name failslab, interval 1, probability 0, space 0, times 0 [ 607.941478][T20982] CPU: 1 PID: 20982 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 607.950261][T20982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.960306][T20982] Call Trace: [ 607.963581][T20982] [ 607.966569][T20982] dump_stack_lvl+0xd6/0x122 [ 607.971165][T20982] dump_stack+0x11/0x1b [ 607.975391][T20982] should_fail+0x23c/0x250 [ 607.979810][T20982] ? __list_lru_init+0x352/0x6d0 [ 607.985177][T20982] __should_failslab+0x81/0x90 [ 607.989937][T20982] should_failslab+0x5/0x20 [ 607.994439][T20982] kmem_cache_alloc_trace+0x52/0x350 [ 607.999809][T20982] ? __list_lru_init+0x352/0x6d0 [ 608.004852][T20982] __list_lru_init+0x352/0x6d0 [ 608.009623][T20982] alloc_super+0x4bf/0x520 [ 608.014139][T20982] ? mount_bdev+0x290/0x290 [ 608.018644][T20982] sget+0x189/0x370 [ 608.022446][T20982] ? test_bdev_super+0x30/0x30 [ 608.027233][T20982] mount_bdev+0xd3/0x290 [ 608.031478][T20982] ? vfat_mount+0x40/0x40 [ 608.035807][T20982] ? tsan.module_ctor+0x10/0x10 [ 608.040663][T20982] vfat_mount+0x2d/0x40 [ 608.044812][T20982] legacy_get_tree+0x70/0xc0 [ 608.049400][T20982] vfs_get_tree+0x4a/0x1a0 [ 608.053885][T20982] path_mount+0x11cf/0x1c40 [ 608.058462][T20982] ? kmem_cache_free+0x65/0x110 [ 608.063364][T20982] __se_sys_mount+0x24b/0x2f0 [ 608.068057][T20982] __x64_sys_mount+0x63/0x70 [ 608.072650][T20982] do_syscall_64+0x44/0xd0 [ 608.077062][T20982] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 608.082956][T20982] RIP: 0033:0x7fa83371d02a [ 608.087366][T20982] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 608.107133][T20982] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:17:16 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 69) [ 608.115548][T20982] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 608.123518][T20982] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 608.131571][T20982] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 608.139589][T20982] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 608.147560][T20982] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 608.155580][T20982] [ 608.295865][T20989] loop4: detected capacity change from 0 to 8192 [ 608.302818][T20988] loop2: detected capacity change from 0 to 264192 [ 608.313650][T20990] loop3: detected capacity change from 0 to 264192 [ 608.320647][T20989] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 608.333701][T20988] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 608.348431][T20990] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 608.363142][T20992] loop5: detected capacity change from 0 to 4096 [ 608.375372][T20989] loop4: detected capacity change from 0 to 8192 [ 608.382208][T20989] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 608.383189][T20992] FAULT_INJECTION: forcing a failure. [ 608.383189][T20992] name failslab, interval 1, probability 0, space 0, times 0 [ 608.405036][T20992] CPU: 1 PID: 20992 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 608.413849][T20992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 608.423976][T20992] Call Trace: [ 608.427280][T20992] [ 608.430206][T20992] dump_stack_lvl+0xd6/0x122 [ 608.434829][T20992] dump_stack+0x11/0x1b [ 608.439018][T20992] should_fail+0x23c/0x250 [ 608.443447][T20992] __should_failslab+0x81/0x90 [ 608.448601][T20992] should_failslab+0x5/0x20 [ 608.453105][T20992] kmem_cache_alloc_node+0x61/0x2d0 [ 608.458413][T20992] ? create_task_io_context+0x36/0x1e0 [ 608.463880][T20992] ? xas_create+0xabc/0xb10 [ 608.468392][T20992] create_task_io_context+0x36/0x1e0 [ 608.473685][T20992] submit_bio_checks+0x828/0x8e0 [ 608.478669][T20992] ? __rcu_read_unlock+0x5c/0x290 [ 608.483697][T20992] blk_mq_submit_bio+0x2e1/0x1470 [ 608.488783][T20992] ? kmem_cache_alloc+0x221/0x320 [ 608.493890][T20992] ? mempool_alloc_slab+0x16/0x20 [ 608.498953][T20992] __submit_bio+0x131/0x340 [ 608.503457][T20992] ? mempool_free+0x130/0x130 [ 608.508141][T20992] submit_bio_noacct+0x418/0x4e0 [ 608.513089][T20992] submit_bio+0x10c/0x180 [ 608.517467][T20992] submit_bh_wbc+0x2db/0x320 [ 608.522062][T20992] submit_bh+0x21/0x30 [ 608.526131][T20992] ? __wait_on_buffer+0x60/0x60 [ 608.531051][T20992] ext4_read_bh+0xf1/0x170 [ 608.535485][T20992] ext4_sb_bread_unmovable+0xf7/0x1a0 [ 608.540912][T20992] ext4_fill_super+0x427/0x78f0 [ 608.545787][T20992] ? vsnprintf+0xe8f/0xed0 [ 608.550292][T20992] ? snprintf+0x83/0xb0 [ 608.554450][T20992] ? set_blocksize+0x197/0x270 [ 608.559328][T20992] mount_bdev+0x1e8/0x290 [ 608.563707][T20992] ? ext4_mount+0x40/0x40 [ 608.568080][T20992] ? ext4_errno_to_code+0x110/0x110 [ 608.573328][T20992] ext4_mount+0x2d/0x40 [ 608.577488][T20992] legacy_get_tree+0x70/0xc0 [ 608.582077][T20992] vfs_get_tree+0x4a/0x1a0 [ 608.586503][T20992] path_mount+0x11cf/0x1c40 [ 608.591008][T20992] ? kmem_cache_free+0x65/0x110 [ 608.595937][T20992] __se_sys_mount+0x24b/0x2f0 [ 608.600674][T20992] ? __this_cpu_preempt_check+0x18/0x20 [ 608.606335][T20992] __x64_sys_mount+0x63/0x70 [ 608.610927][T20992] do_syscall_64+0x44/0xd0 [ 608.615360][T20992] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 608.621320][T20992] RIP: 0033:0x7f7ca8c3202a [ 608.625726][T20992] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 608.645485][T20992] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 608.653934][T20992] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 608.661946][T20992] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 608.670000][T20992] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 608.678083][T20992] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 608.686151][T20992] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 608.694247][T20992] 22:17:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 608.703933][T20992] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 608.715066][T20992] EXT4-fs (loop5): group descriptors corrupted! [ 608.731502][T20990] loop3: detected capacity change from 0 to 264192 [ 608.739244][T20988] loop2: detected capacity change from 0 to 264192 [ 608.747111][T20988] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 608.759973][T20995] loop0: detected capacity change from 0 to 6 [ 608.766274][T20990] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 608.776965][T20995] FAULT_INJECTION: forcing a failure. [ 608.776965][T20995] name failslab, interval 1, probability 0, space 0, times 0 [ 608.790102][T20995] CPU: 1 PID: 20995 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 608.798901][T20995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 608.809030][T20995] Call Trace: [ 608.812368][T20995] [ 608.815287][T20995] dump_stack_lvl+0xd6/0x122 [ 608.819868][T20995] dump_stack+0x11/0x1b [ 608.824085][T20995] should_fail+0x23c/0x250 [ 608.828486][T20995] ? __list_lru_init+0x352/0x6d0 [ 608.833408][T20995] __should_failslab+0x81/0x90 [ 608.838211][T20995] should_failslab+0x5/0x20 [ 608.842766][T20995] kmem_cache_alloc_trace+0x52/0x350 [ 608.848046][T20995] ? __list_lru_init+0x352/0x6d0 [ 608.852968][T20995] __list_lru_init+0x352/0x6d0 [ 608.857716][T20995] alloc_super+0x4bf/0x520 [ 608.862208][T20995] ? mount_bdev+0x290/0x290 [ 608.866699][T20995] sget+0x189/0x370 [ 608.870492][T20995] ? test_bdev_super+0x30/0x30 [ 608.875249][T20995] mount_bdev+0xd3/0x290 [ 608.879576][T20995] ? vfat_mount+0x40/0x40 [ 608.883892][T20995] ? tsan.module_ctor+0x10/0x10 [ 608.888843][T20995] vfat_mount+0x2d/0x40 [ 608.892983][T20995] legacy_get_tree+0x70/0xc0 [ 608.897606][T20995] vfs_get_tree+0x4a/0x1a0 [ 608.902006][T20995] path_mount+0x11cf/0x1c40 [ 608.906663][T20995] ? kmem_cache_free+0x65/0x110 [ 608.911534][T20995] __se_sys_mount+0x24b/0x2f0 [ 608.916227][T20995] __x64_sys_mount+0x63/0x70 [ 608.920801][T20995] do_syscall_64+0x44/0xd0 [ 608.925206][T20995] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 608.931139][T20995] RIP: 0033:0x7fa83371d02a [ 608.935543][T20995] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 608.955693][T20995] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 608.964316][T20995] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 608.972321][T20995] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 608.980375][T20995] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 608.988417][T20995] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 608.996375][T20995] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 22:17:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 609.004682][T20995] 22:17:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 609.085856][T20998] loop4: detected capacity change from 0 to 32768 [ 609.103701][T20998] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 98) 22:17:17 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 70) [ 609.148703][T20998] loop4: detected capacity change from 0 to 32768 [ 609.161448][T20998] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 609.182138][T21001] loop2: detected capacity change from 0 to 264192 22:17:17 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0xe2020000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:17:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 609.201190][T21004] loop3: detected capacity change from 0 to 264192 [ 609.213782][T21001] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 609.230648][T21004] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 609.247245][T21001] loop2: detected capacity change from 0 to 264192 [ 609.254536][T21001] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 609.279291][T21004] loop3: detected capacity change from 0 to 264192 [ 609.286280][T21004] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 609.397134][T21009] loop5: detected capacity change from 0 to 4096 [ 609.407722][T21008] loop0: detected capacity change from 0 to 6 [ 609.414719][T21009] FAULT_INJECTION: forcing a failure. [ 609.414719][T21009] name failslab, interval 1, probability 0, space 0, times 0 [ 609.418373][T21008] FAULT_INJECTION: forcing a failure. [ 609.418373][T21008] name failslab, interval 1, probability 0, space 0, times 0 [ 609.427360][T21009] CPU: 1 PID: 21009 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 609.448637][T21009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 609.458677][T21009] Call Trace: [ 609.461939][T21009] [ 609.464852][T21009] dump_stack_lvl+0xd6/0x122 [ 609.469431][T21009] dump_stack+0x11/0x1b [ 609.473603][T21009] should_fail+0x23c/0x250 [ 609.478005][T21009] __should_failslab+0x81/0x90 [ 609.482758][T21009] should_failslab+0x5/0x20 [ 609.487246][T21009] kmem_cache_alloc_node+0x61/0x2d0 [ 609.492430][T21009] ? create_task_io_context+0x36/0x1e0 [ 609.497994][T21009] ? xas_create+0xabc/0xb10 [ 609.502871][T21009] create_task_io_context+0x36/0x1e0 [ 609.508244][T21009] submit_bio_checks+0x828/0x8e0 [ 609.513212][T21009] ? __rcu_read_unlock+0x5c/0x290 [ 609.518238][T21009] blk_mq_submit_bio+0x2e1/0x1470 [ 609.523265][T21009] ? kmem_cache_alloc+0x221/0x320 [ 609.528329][T21009] ? mempool_alloc_slab+0x16/0x20 [ 609.533394][T21009] __submit_bio+0x131/0x340 [ 609.537878][T21009] ? mempool_free+0x130/0x130 [ 609.542611][T21009] submit_bio_noacct+0x418/0x4e0 [ 609.547585][T21009] submit_bio+0x10c/0x180 [ 609.551995][T21009] submit_bh_wbc+0x2db/0x320 [ 609.556581][T21009] submit_bh+0x21/0x30 [ 609.560714][T21009] ? __wait_on_buffer+0x60/0x60 [ 609.565546][T21009] ext4_read_bh+0xf1/0x170 [ 609.570007][T21009] ext4_sb_bread_unmovable+0xf7/0x1a0 [ 609.575367][T21009] ext4_fill_super+0x427/0x78f0 [ 609.580209][T21009] ? vsnprintf+0xe8f/0xed0 [ 609.584721][T21009] ? snprintf+0x83/0xb0 [ 609.588864][T21009] ? set_blocksize+0x197/0x270 [ 609.593795][T21009] mount_bdev+0x1e8/0x290 [ 609.598111][T21009] ? ext4_mount+0x40/0x40 [ 609.602435][T21009] ? ext4_errno_to_code+0x110/0x110 [ 609.607638][T21009] ext4_mount+0x2d/0x40 [ 609.611862][T21009] legacy_get_tree+0x70/0xc0 [ 609.616447][T21009] vfs_get_tree+0x4a/0x1a0 [ 609.620883][T21009] path_mount+0x11cf/0x1c40 [ 609.625391][T21009] ? kmem_cache_free+0x65/0x110 [ 609.630228][T21009] __se_sys_mount+0x24b/0x2f0 [ 609.634891][T21009] ? __this_cpu_preempt_check+0x18/0x20 [ 609.640433][T21009] __x64_sys_mount+0x63/0x70 [ 609.645035][T21009] do_syscall_64+0x44/0xd0 [ 609.649440][T21009] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 609.655345][T21009] RIP: 0033:0x7f7ca8c3202a [ 609.659809][T21009] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 609.679446][T21009] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 609.687846][T21009] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 609.695800][T21009] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 609.703757][T21009] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 609.711732][T21009] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 609.719689][T21009] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 609.727737][T21009] [ 609.730749][T21008] CPU: 0 PID: 21008 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 609.739513][T21008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 609.749657][T21008] Call Trace: [ 609.752927][T21008] [ 609.755894][T21008] dump_stack_lvl+0xd6/0x122 [ 609.760488][T21008] dump_stack+0x11/0x1b [ 609.764639][T21008] should_fail+0x23c/0x250 [ 609.769050][T21008] ? __list_lru_init+0x352/0x6d0 [ 609.773981][T21008] __should_failslab+0x81/0x90 [ 609.778821][T21008] should_failslab+0x5/0x20 [ 609.783351][T21008] kmem_cache_alloc_trace+0x52/0x350 [ 609.788669][T21008] ? __list_lru_init+0x352/0x6d0 [ 609.793618][T21008] __list_lru_init+0x352/0x6d0 [ 609.798383][T21008] alloc_super+0x4bf/0x520 [ 609.802798][T21008] ? mount_bdev+0x290/0x290 [ 609.807320][T21008] sget+0x189/0x370 [ 609.811128][T21008] ? test_bdev_super+0x30/0x30 [ 609.815924][T21008] mount_bdev+0xd3/0x290 [ 609.820249][T21008] ? vfat_mount+0x40/0x40 [ 609.824609][T21008] ? tsan.module_ctor+0x10/0x10 [ 609.829536][T21008] vfat_mount+0x2d/0x40 [ 609.833702][T21008] legacy_get_tree+0x70/0xc0 [ 609.838305][T21008] vfs_get_tree+0x4a/0x1a0 [ 609.842724][T21008] path_mount+0x11cf/0x1c40 [ 609.847225][T21008] ? kmem_cache_free+0x65/0x110 [ 609.852078][T21008] __se_sys_mount+0x24b/0x2f0 [ 609.856759][T21008] __x64_sys_mount+0x63/0x70 [ 609.861469][T21008] do_syscall_64+0x44/0xd0 [ 609.865910][T21008] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 609.871911][T21008] RIP: 0033:0x7fa83371d02a [ 609.876357][T21008] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 609.883685][T21018] loop3: detected capacity change from 0 to 264192 [ 609.896223][T21008] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 609.896246][T21008] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 609.896257][T21008] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 609.926262][T21018] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 609.927423][T21008] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 22:17:18 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0xfc000000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 609.927439][T21008] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 609.927464][T21008] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 609.927480][T21008] [ 609.932702][T21016] loop4: detected capacity change from 0 to 65536 [ 609.983510][T21018] loop3: detected capacity change from 0 to 264192 22:17:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 609.992452][T21018] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 610.002964][T21009] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 610.012238][T21009] EXT4-fs (loop5): group descriptors corrupted! [ 610.019817][T21016] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 610.041542][T21019] loop2: detected capacity change from 0 to 264192 22:17:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 99) 22:17:18 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 71) 22:17:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2040000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 610.054647][T21016] loop4: detected capacity change from 0 to 65536 [ 610.064366][T21016] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 610.079534][T21019] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 610.119501][T21019] loop2: detected capacity change from 0 to 264192 [ 610.126374][T21019] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 610.228753][T21027] loop3: detected capacity change from 0 to 264192 [ 610.229044][T21026] loop0: detected capacity change from 0 to 6 [ 610.235862][T21028] loop5: detected capacity change from 0 to 4096 [ 610.250027][T21026] FAULT_INJECTION: forcing a failure. [ 610.250027][T21026] name failslab, interval 1, probability 0, space 0, times 0 [ 610.262731][T21026] CPU: 1 PID: 21026 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 610.271493][T21026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 610.281670][T21026] Call Trace: [ 610.284946][T21026] [ 610.287877][T21026] dump_stack_lvl+0xd6/0x122 [ 610.292547][T21026] dump_stack+0x11/0x1b [ 610.296702][T21026] should_fail+0x23c/0x250 [ 610.301152][T21026] ? __list_lru_init+0x352/0x6d0 [ 610.306085][T21026] __should_failslab+0x81/0x90 [ 610.310928][T21026] should_failslab+0x5/0x20 [ 610.315457][T21026] kmem_cache_alloc_trace+0x52/0x350 [ 610.320746][T21026] ? __list_lru_init+0x352/0x6d0 [ 610.325725][T21026] __list_lru_init+0x352/0x6d0 [ 610.330487][T21026] alloc_super+0x4bf/0x520 [ 610.334957][T21026] ? mount_bdev+0x290/0x290 [ 610.339475][T21026] sget+0x189/0x370 [ 610.343342][T21026] ? test_bdev_super+0x30/0x30 [ 610.348102][T21026] mount_bdev+0xd3/0x290 [ 610.352348][T21026] ? vfat_mount+0x40/0x40 [ 610.356774][T21026] ? tsan.module_ctor+0x10/0x10 [ 610.361647][T21026] vfat_mount+0x2d/0x40 [ 610.365821][T21026] legacy_get_tree+0x70/0xc0 [ 610.370476][T21026] vfs_get_tree+0x4a/0x1a0 [ 610.375022][T21026] path_mount+0x11cf/0x1c40 [ 610.379601][T21026] ? kmem_cache_free+0x65/0x110 [ 610.384523][T21026] __se_sys_mount+0x24b/0x2f0 [ 610.389199][T21026] __x64_sys_mount+0x63/0x70 [ 610.393816][T21026] do_syscall_64+0x44/0xd0 [ 610.398239][T21026] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 610.404138][T21026] RIP: 0033:0x7fa83371d02a [ 610.408627][T21026] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 610.428241][T21026] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 610.436755][T21026] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 610.445159][T21026] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 610.453123][T21026] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 610.461104][T21026] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 610.469069][T21026] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 610.477136][T21026] [ 610.486594][T21027] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 610.486617][T21028] FAULT_INJECTION: forcing a failure. [ 610.486617][T21028] name failslab, interval 1, probability 0, space 0, times 0 [ 610.509756][T21028] CPU: 0 PID: 21028 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 610.519472][T21028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 610.529522][T21028] Call Trace: [ 610.532816][T21028] [ 610.535737][T21028] dump_stack_lvl+0xd6/0x122 [ 610.540335][T21028] dump_stack+0x11/0x1b [ 610.544514][T21028] should_fail+0x23c/0x250 [ 610.548930][T21028] ? mempool_alloc_slab+0x16/0x20 [ 610.554016][T21028] __should_failslab+0x81/0x90 [ 610.558871][T21028] should_failslab+0x5/0x20 [ 610.563434][T21028] kmem_cache_alloc+0x4f/0x320 [ 610.568233][T21028] mempool_alloc_slab+0x16/0x20 [ 610.573168][T21028] ? mempool_free+0x130/0x130 [ 610.577929][T21028] mempool_alloc+0x9d/0x310 [ 610.582446][T21028] bio_alloc_bioset+0xcc/0x560 [ 610.587221][T21028] ? __find_get_block+0x8b4/0x9b0 [ 610.592253][T21028] submit_bh_wbc+0x133/0x320 [ 610.596850][T21028] ? __getblk_gfp+0x493/0x530 [ 610.601562][T21028] submit_bh+0x21/0x30 [ 610.605626][T21028] ? __wait_on_buffer+0x60/0x60 [ 610.610474][T21028] ext4_read_bh+0xf1/0x170 [ 610.614926][T21028] ext4_sb_bread_unmovable+0xf7/0x1a0 [ 610.620402][T21028] ext4_fill_super+0x22c4/0x78f0 [ 610.625475][T21028] ? vsnprintf+0xe8f/0xed0 [ 610.629954][T21028] ? snprintf+0x83/0xb0 [ 610.634103][T21028] ? set_blocksize+0x197/0x270 [ 610.638861][T21028] mount_bdev+0x1e8/0x290 [ 610.643190][T21028] ? ext4_mount+0x40/0x40 [ 610.647618][T21028] ? ext4_errno_to_code+0x110/0x110 [ 610.652819][T21028] ext4_mount+0x2d/0x40 [ 610.656972][T21028] legacy_get_tree+0x70/0xc0 [ 610.661669][T21028] vfs_get_tree+0x4a/0x1a0 [ 610.666094][T21028] path_mount+0x11cf/0x1c40 [ 610.670729][T21028] ? kmem_cache_free+0x65/0x110 [ 610.675584][T21028] __se_sys_mount+0x24b/0x2f0 [ 610.680294][T21028] ? __this_cpu_preempt_check+0x18/0x20 [ 610.686030][T21028] __x64_sys_mount+0x63/0x70 [ 610.691358][T21028] do_syscall_64+0x44/0xd0 [ 610.695787][T21028] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 610.701722][T21028] RIP: 0033:0x7f7ca8c3202a [ 610.706147][T21028] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 610.717940][T21031] loop4: detected capacity change from 0 to 66048 [ 610.725752][T21028] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 610.725775][T21028] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a [ 610.725787][T21028] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 610.725803][T21028] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 610.758076][T21031] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 610.765229][T21028] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 610.765245][T21028] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 610.791322][T21028] [ 610.803726][T21028] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 610.813096][T21028] EXT4-fs (loop5): group descriptors corrupted! 22:17:19 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 72) 22:17:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 100) 22:17:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 610.834726][T21027] loop3: detected capacity change from 0 to 264192 [ 610.844243][T21031] loop4: detected capacity change from 0 to 66048 [ 610.853853][T21027] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 610.864600][T21031] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 610.919854][T21033] loop2: detected capacity change from 0 to 264192 [ 610.941042][T21033] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:19 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0xfe000000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:17:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="202e0000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 610.979248][T21033] loop2: detected capacity change from 0 to 264192 [ 610.986124][T21033] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 611.080993][T21042] loop3: detected capacity change from 0 to 264192 [ 611.089046][T21041] loop0: detected capacity change from 0 to 6 [ 611.096897][T21041] FAULT_INJECTION: forcing a failure. [ 611.096897][T21041] name failslab, interval 1, probability 0, space 0, times 0 [ 611.096981][T21044] loop4: detected capacity change from 0 to 98304 [ 611.109588][T21041] CPU: 0 PID: 21041 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 611.124720][T21041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 611.134819][T21041] Call Trace: [ 611.138088][T21041] [ 611.141007][T21041] dump_stack_lvl+0xd6/0x122 [ 611.145711][T21041] dump_stack+0x11/0x1b [ 611.149863][T21041] should_fail+0x23c/0x250 [ 611.154274][T21041] ? __list_lru_init+0x352/0x6d0 [ 611.159214][T21041] __should_failslab+0x81/0x90 [ 611.163978][T21041] should_failslab+0x5/0x20 [ 611.168511][T21041] kmem_cache_alloc_trace+0x52/0x350 [ 611.173795][T21041] ? __list_lru_init+0x352/0x6d0 [ 611.178749][T21041] __list_lru_init+0x352/0x6d0 [ 611.183557][T21041] alloc_super+0x4bf/0x520 [ 611.188094][T21041] ? mount_bdev+0x290/0x290 [ 611.192597][T21041] sget+0x189/0x370 [ 611.196412][T21041] ? test_bdev_super+0x30/0x30 [ 611.201175][T21041] mount_bdev+0xd3/0x290 [ 611.205439][T21041] ? vfat_mount+0x40/0x40 [ 611.209795][T21041] ? tsan.module_ctor+0x10/0x10 [ 611.214646][T21041] vfat_mount+0x2d/0x40 [ 611.218871][T21041] legacy_get_tree+0x70/0xc0 [ 611.223623][T21041] vfs_get_tree+0x4a/0x1a0 [ 611.228070][T21041] path_mount+0x11cf/0x1c40 [ 611.232655][T21041] ? kmem_cache_free+0x65/0x110 [ 611.237528][T21041] __se_sys_mount+0x24b/0x2f0 [ 611.242208][T21041] __x64_sys_mount+0x63/0x70 [ 611.246861][T21041] do_syscall_64+0x44/0xd0 [ 611.251277][T21041] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 611.257304][T21041] RIP: 0033:0x7fa83371d02a [ 611.261717][T21041] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 611.281478][T21041] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 611.289897][T21041] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 611.297871][T21041] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 611.305849][T21041] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 611.313886][T21041] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 611.321852][T21041] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 611.329839][T21041] [ 611.340419][T21044] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 611.340728][T21045] loop5: detected capacity change from 0 to 4096 [ 611.352368][T21042] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 611.383328][T21045] FAULT_INJECTION: forcing a failure. [ 611.383328][T21045] name failslab, interval 1, probability 0, space 0, times 0 [ 611.396093][T21045] CPU: 0 PID: 21045 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0 [ 611.404900][T21045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 611.415073][T21045] Call Trace: [ 611.418350][T21045] [ 611.421299][T21045] dump_stack_lvl+0xd6/0x122 [ 611.425898][T21045] dump_stack+0x11/0x1b [ 611.430147][T21045] should_fail+0x23c/0x250 [ 611.434571][T21045] __should_failslab+0x81/0x90 [ 611.439357][T21045] should_failslab+0x5/0x20 [ 611.443867][T21045] kmem_cache_alloc_node_trace+0x61/0x310 [ 611.449628][T21045] ? bit_waitqueue+0x30/0x30 [ 611.454246][T21045] ? __kmalloc_node+0x30/0x40 [ 611.459015][T21045] __kmalloc_node+0x30/0x40 [ 611.463579][T21045] kvmalloc_node+0x81/0x110 [ 611.468127][T21045] ext4_fill_super+0x3193/0x78f0 [ 611.473076][T21045] ? snprintf+0x83/0xb0 [ 611.477240][T21045] mount_bdev+0x1e8/0x290 [ 611.481620][T21045] ? ext4_mount+0x40/0x40 [ 611.486052][T21045] ? ext4_errno_to_code+0x110/0x110 [ 611.491313][T21045] ext4_mount+0x2d/0x40 [ 611.495554][T21045] legacy_get_tree+0x70/0xc0 [ 611.500145][T21045] vfs_get_tree+0x4a/0x1a0 [ 611.504729][T21045] path_mount+0x11cf/0x1c40 [ 611.509232][T21045] ? kmem_cache_free+0x65/0x110 [ 611.514180][T21045] __se_sys_mount+0x24b/0x2f0 [ 611.518929][T21045] ? __this_cpu_preempt_check+0x18/0x20 [ 611.524483][T21045] __x64_sys_mount+0x63/0x70 [ 611.529104][T21045] do_syscall_64+0x44/0xd0 [ 611.533522][T21045] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 611.539498][T21045] RIP: 0033:0x7f7ca8c3202a [ 611.543918][T21045] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 611.563815][T21045] RSP: 002b:00007f7ca83a6fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 611.572238][T21045] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7ca8c3202a 22:17:19 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 73) [ 611.580207][T21045] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7ca83a7000 [ 611.588304][T21045] RBP: 00007f7ca83a7040 R08: 00007f7ca83a7040 R09: 0000000020000000 [ 611.596274][T21045] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 611.604325][T21045] R13: 0000000020000100 R14: 00007f7ca83a7000 R15: 00000000200000c0 [ 611.612294][T21045] [ 611.615385][T21045] EXT4-fs (loop5): not enough memory 22:17:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 611.632010][T21044] loop4: detected capacity change from 0 to 98304 [ 611.642591][T21042] loop3: detected capacity change from 0 to 264192 [ 611.658151][T21044] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 611.670752][T21042] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 611.695600][T21053] loop2: detected capacity change from 0 to 264192 [ 611.706854][T21052] loop0: detected capacity change from 0 to 6 [ 611.713789][T21052] FAULT_INJECTION: forcing a failure. [ 611.713789][T21052] name failslab, interval 1, probability 0, space 0, times 0 [ 611.720997][T21053] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 611.726420][T21052] CPU: 0 PID: 21052 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 611.745379][T21052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 611.755437][T21052] Call Trace: [ 611.758713][T21052] [ 611.761739][T21052] dump_stack_lvl+0xd6/0x122 [ 611.766421][T21052] dump_stack+0x11/0x1b [ 611.770586][T21052] should_fail+0x23c/0x250 [ 611.775075][T21052] ? __list_lru_init+0x352/0x6d0 [ 611.780089][T21052] __should_failslab+0x81/0x90 [ 611.784942][T21052] should_failslab+0x5/0x20 [ 611.789442][T21052] kmem_cache_alloc_trace+0x52/0x350 [ 611.794723][T21052] ? __list_lru_init+0x352/0x6d0 [ 611.799658][T21052] __list_lru_init+0x352/0x6d0 [ 611.804418][T21052] alloc_super+0x4bf/0x520 [ 611.808906][T21052] ? mount_bdev+0x290/0x290 [ 611.813413][T21052] sget+0x189/0x370 [ 611.817307][T21052] ? test_bdev_super+0x30/0x30 [ 611.822123][T21052] mount_bdev+0xd3/0x290 [ 611.826367][T21052] ? vfat_mount+0x40/0x40 [ 611.830702][T21052] ? tsan.module_ctor+0x10/0x10 [ 611.835556][T21052] vfat_mount+0x2d/0x40 [ 611.839719][T21052] legacy_get_tree+0x70/0xc0 [ 611.844377][T21052] vfs_get_tree+0x4a/0x1a0 [ 611.848794][T21052] path_mount+0x11cf/0x1c40 [ 611.853307][T21052] ? kmem_cache_free+0x65/0x110 [ 611.858159][T21052] __se_sys_mount+0x24b/0x2f0 [ 611.862857][T21052] __x64_sys_mount+0x63/0x70 [ 611.867446][T21052] do_syscall_64+0x44/0xd0 [ 611.871862][T21052] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 611.877802][T21052] RIP: 0033:0x7fa83371d02a [ 611.882220][T21052] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 611.901835][T21052] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 611.910251][T21052] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 611.918229][T21052] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 611.926227][T21052] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 611.934233][T21052] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 22:17:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 611.942200][T21052] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 611.950182][T21052] [ 611.985033][T21053] loop2: detected capacity change from 0 to 264192 22:17:20 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 74) [ 611.992579][T21057] loop4: detected capacity change from 0 to 131072 [ 611.992921][T21058] loop5: detected capacity change from 0 to 4096 [ 612.007390][T21060] loop3: detected capacity change from 0 to 264192 [ 612.009755][T21053] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 612.024978][T21057] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 612.038703][T21060] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 612.051074][T21058] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 612.060340][T21058] EXT4-fs (loop5): group descriptors corrupted! [ 612.072420][T21057] loop4: detected capacity change from 0 to 131072 [ 612.079608][T21057] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200002, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 612.120539][T21060] loop3: detected capacity change from 0 to 264192 [ 612.138612][T21060] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 612.184414][T21062] loop0: detected capacity change from 0 to 6 [ 612.192246][T21062] FAULT_INJECTION: forcing a failure. [ 612.192246][T21062] name failslab, interval 1, probability 0, space 0, times 0 [ 612.205002][T21062] CPU: 0 PID: 21062 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 612.213765][T21062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.224047][T21062] Call Trace: [ 612.227320][T21062] [ 612.230243][T21062] dump_stack_lvl+0xd6/0x122 [ 612.234853][T21062] dump_stack+0x11/0x1b [ 612.239009][T21062] should_fail+0x23c/0x250 [ 612.243427][T21062] ? __list_lru_init+0x352/0x6d0 [ 612.248418][T21062] __should_failslab+0x81/0x90 [ 612.253179][T21062] should_failslab+0x5/0x20 [ 612.257685][T21062] kmem_cache_alloc_trace+0x52/0x350 [ 612.262980][T21062] ? __list_lru_init+0x352/0x6d0 [ 612.268070][T21062] __list_lru_init+0x352/0x6d0 [ 612.272849][T21062] alloc_super+0x4bf/0x520 [ 612.277294][T21062] ? mount_bdev+0x290/0x290 [ 612.281921][T21062] sget+0x189/0x370 [ 612.285733][T21062] ? test_bdev_super+0x30/0x30 [ 612.290557][T21062] mount_bdev+0xd3/0x290 [ 612.294868][T21062] ? vfat_mount+0x40/0x40 [ 612.299197][T21062] ? tsan.module_ctor+0x10/0x10 [ 612.304209][T21062] vfat_mount+0x2d/0x40 [ 612.309144][T21062] legacy_get_tree+0x70/0xc0 [ 612.313730][T21062] vfs_get_tree+0x4a/0x1a0 [ 612.318296][T21062] path_mount+0x11cf/0x1c40 [ 612.322822][T21062] ? kmem_cache_free+0x65/0x110 [ 612.327682][T21062] __se_sys_mount+0x24b/0x2f0 22:17:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 612.332353][T21062] __x64_sys_mount+0x63/0x70 [ 612.336937][T21062] do_syscall_64+0x44/0xd0 [ 612.341433][T21062] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 612.347406][T21062] RIP: 0033:0x7fa83371d02a [ 612.351873][T21062] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 612.371478][T21062] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:17:20 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0xfeffffff, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 612.380048][T21062] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 612.388023][T21062] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 612.396073][T21062] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 612.404128][T21062] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 612.412103][T21062] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 612.420206][T21062] 22:17:20 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 75) [ 612.460932][T21070] loop3: detected capacity change from 0 to 264192 [ 612.461233][T21071] loop4: detected capacity change from 0 to 163840 [ 612.474760][T21072] loop5: detected capacity change from 0 to 4096 [ 612.482048][T21073] loop2: detected capacity change from 0 to 264192 [ 612.490563][T21070] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 612.506361][T21071] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 612.506405][T21072] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 612.517000][T21073] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 612.526246][T21072] EXT4-fs (loop5): group descriptors corrupted! [ 612.563360][T21072] loop5: detected capacity change from 0 to 4096 [ 612.573461][T21072] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 612.582932][T21072] EXT4-fs (loop5): group descriptors corrupted! [ 612.590910][T21070] loop3: detected capacity change from 0 to 264192 [ 612.598360][T21070] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200003, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 22:17:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x11000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) [ 612.599043][T21073] loop2: detected capacity change from 0 to 264192 [ 612.615396][T21071] loop4: detected capacity change from 0 to 163840 [ 612.629004][T21073] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 612.637828][T21071] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 612.748865][T21077] loop0: detected capacity change from 0 to 6 [ 612.756011][T21077] FAULT_INJECTION: forcing a failure. [ 612.756011][T21077] name failslab, interval 1, probability 0, space 0, times 0 [ 612.768701][T21077] CPU: 1 PID: 21077 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 612.777548][T21077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.787594][T21077] Call Trace: [ 612.790867][T21077] [ 612.793790][T21077] dump_stack_lvl+0xd6/0x122 [ 612.798453][T21077] dump_stack+0x11/0x1b [ 612.802603][T21077] should_fail+0x23c/0x250 [ 612.807059][T21077] ? __list_lru_init+0x352/0x6d0 [ 612.812003][T21077] __should_failslab+0x81/0x90 [ 612.816769][T21077] should_failslab+0x5/0x20 [ 612.821333][T21077] kmem_cache_alloc_trace+0x52/0x350 [ 612.826618][T21077] ? __list_lru_init+0x352/0x6d0 [ 612.831575][T21077] __list_lru_init+0x352/0x6d0 [ 612.836334][T21077] alloc_super+0x4bf/0x520 [ 612.840821][T21077] ? mount_bdev+0x290/0x290 [ 612.845380][T21077] sget+0x189/0x370 [ 612.849181][T21077] ? test_bdev_super+0x30/0x30 [ 612.853973][T21077] mount_bdev+0xd3/0x290 [ 612.858277][T21077] ? vfat_mount+0x40/0x40 [ 612.862623][T21077] ? tsan.module_ctor+0x10/0x10 [ 612.867601][T21077] vfat_mount+0x2d/0x40 [ 612.871818][T21077] legacy_get_tree+0x70/0xc0 [ 612.876489][T21077] vfs_get_tree+0x4a/0x1a0 [ 612.880928][T21077] path_mount+0x11cf/0x1c40 [ 612.885431][T21077] ? kmem_cache_free+0x65/0x110 [ 612.890454][T21077] __se_sys_mount+0x24b/0x2f0 [ 612.895134][T21077] __x64_sys_mount+0x63/0x70 [ 612.899803][T21077] do_syscall_64+0x44/0xd0 [ 612.904274][T21077] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 612.910218][T21077] RIP: 0033:0x7fa83371d02a [ 612.914631][T21077] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 612.934410][T21077] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:17:21 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 76) [ 612.942895][T21077] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 612.950866][T21077] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 612.958934][T21077] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 612.966908][T21077] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 612.974931][T21077] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 612.982907][T21077] [ 613.072586][T21082] loop5: detected capacity change from 0 to 4096 [ 613.123750][T21085] loop3: detected capacity change from 0 to 264192 [ 613.131217][T21082] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 613.140494][T21082] EXT4-fs (loop5): group descriptors corrupted! [ 613.167978][T21086] loop2: detected capacity change from 0 to 264192 [ 613.169309][T21087] loop4: detected capacity change from 0 to 196608 [ 613.181549][T21085] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 613.196799][T21086] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 613.210608][T21087] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 613.222803][T21082] loop5: detected capacity change from 0 to 4096 [ 613.230995][T21085] loop3: detected capacity change from 0 to 264192 [ 613.238154][T21082] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 613.247414][T21082] EXT4-fs (loop5): group descriptors corrupted! [ 613.255444][T21085] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 613.269724][T21086] loop2: detected capacity change from 0 to 264192 [ 613.279662][T21086] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 613.300667][T21089] loop0: detected capacity change from 0 to 6 [ 613.306968][T21089] FAULT_INJECTION: forcing a failure. [ 613.306968][T21089] name failslab, interval 1, probability 0, space 0, times 0 [ 613.319709][T21089] CPU: 1 PID: 21089 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 613.328470][T21089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.338517][T21089] Call Trace: [ 613.341845][T21089] [ 613.344840][T21089] dump_stack_lvl+0xd6/0x122 [ 613.349517][T21089] dump_stack+0x11/0x1b [ 613.353701][T21089] should_fail+0x23c/0x250 [ 613.358377][T21089] ? __list_lru_init+0x352/0x6d0 [ 613.363314][T21089] __should_failslab+0x81/0x90 [ 613.368076][T21089] should_failslab+0x5/0x20 [ 613.372580][T21089] kmem_cache_alloc_trace+0x52/0x350 [ 613.377910][T21089] ? __list_lru_init+0x352/0x6d0 [ 613.382861][T21089] __list_lru_init+0x352/0x6d0 [ 613.387673][T21089] alloc_super+0x4bf/0x520 [ 613.392095][T21089] ? mount_bdev+0x290/0x290 [ 613.396623][T21089] sget+0x189/0x370 [ 613.400531][T21089] ? test_bdev_super+0x30/0x30 [ 613.405302][T21089] mount_bdev+0xd3/0x290 [ 613.409629][T21089] ? vfat_mount+0x40/0x40 [ 613.413963][T21089] ? tsan.module_ctor+0x10/0x10 [ 613.418831][T21089] vfat_mount+0x2d/0x40 [ 613.422986][T21089] legacy_get_tree+0x70/0xc0 [ 613.427639][T21089] vfs_get_tree+0x4a/0x1a0 [ 613.432203][T21089] path_mount+0x11cf/0x1c40 [ 613.436730][T21089] ? kmem_cache_free+0x65/0x110 [ 613.441657][T21089] __se_sys_mount+0x24b/0x2f0 [ 613.446443][T21089] __x64_sys_mount+0x63/0x70 [ 613.451094][T21089] do_syscall_64+0x44/0xd0 [ 613.455581][T21089] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 613.461545][T21089] RIP: 0033:0x7fa83371d02a [ 613.465959][T21089] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 613.485572][T21089] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 613.494115][T21089] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 613.502086][T21089] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 613.510054][T21089] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 22:17:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 22:17:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x12000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) 22:17:21 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0xff600000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:17:21 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 77) 22:17:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6040000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 613.518022][T21089] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 613.526087][T21089] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 613.534128][T21089] [ 613.545472][T21087] loop4: detected capacity change from 0 to 196608 [ 613.553187][T21087] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 613.669834][T21098] loop5: detected capacity change from 0 to 4096 [ 613.688395][T21100] loop3: detected capacity change from 0 to 264192 [ 613.695533][T21098] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 613.696298][T21101] loop2: detected capacity change from 0 to 264192 [ 613.705120][T21098] EXT4-fs (loop5): group descriptors corrupted! [ 613.725898][T21102] loop4: detected capacity change from 0 to 197120 [ 613.736697][T21099] loop0: detected capacity change from 0 to 6 [ 613.743036][T21100] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 613.745268][T21099] FAULT_INJECTION: forcing a failure. [ 613.745268][T21099] name failslab, interval 1, probability 0, space 0, times 0 [ 613.753389][T21101] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 613.765865][T21099] CPU: 1 PID: 21099 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 613.784769][T21099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.794821][T21099] Call Trace: [ 613.798095][T21099] [ 613.801032][T21099] dump_stack_lvl+0xd6/0x122 [ 613.805637][T21099] dump_stack+0x11/0x1b [ 613.809793][T21099] should_fail+0x23c/0x250 [ 613.814200][T21099] ? fat_fill_super+0x88/0x2af0 [ 613.819135][T21099] __should_failslab+0x81/0x90 [ 613.823904][T21099] should_failslab+0x5/0x20 [ 613.828416][T21099] kmem_cache_alloc_trace+0x52/0x350 [ 613.833714][T21099] ? string+0x1f9/0x210 [ 613.837871][T21099] ? vfat_fill_super+0x40/0x40 [ 613.842657][T21099] fat_fill_super+0x88/0x2af0 [ 613.847483][T21099] ? pointer+0x5aa/0x830 [ 613.851723][T21099] ? format_decode+0x60b/0x8a0 [ 613.856667][T21099] ? vsnprintf+0xe8f/0xed0 [ 613.861148][T21099] ? snprintf+0x83/0xb0 [ 613.865309][T21099] ? set_blocksize+0x197/0x270 [ 613.870071][T21099] vfat_fill_super+0x2c/0x40 [ 613.874681][T21099] mount_bdev+0x1e8/0x290 [ 613.879055][T21099] ? vfat_mount+0x40/0x40 [ 613.883380][T21099] ? tsan.module_ctor+0x10/0x10 [ 613.888231][T21099] vfat_mount+0x2d/0x40 [ 613.892475][T21099] legacy_get_tree+0x70/0xc0 [ 613.897065][T21099] vfs_get_tree+0x4a/0x1a0 [ 613.901548][T21099] path_mount+0x11cf/0x1c40 [ 613.906058][T21099] ? kmem_cache_free+0x65/0x110 [ 613.910959][T21099] __se_sys_mount+0x24b/0x2f0 [ 613.915642][T21099] __x64_sys_mount+0x63/0x70 [ 613.920225][T21099] do_syscall_64+0x44/0xd0 [ 613.924642][T21099] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 613.930560][T21099] RIP: 0033:0x7fa83371d02a [ 613.934968][T21099] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 613.955391][T21099] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 613.963800][T21099] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 613.971761][T21099] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 613.979728][T21099] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 613.987688][T21099] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 613.995647][T21099] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 614.003615][T21099] [ 614.011530][T21102] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:22 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 78) [ 614.025184][T21098] loop5: detected capacity change from 0 to 4096 [ 614.035891][T21101] loop2: detected capacity change from 0 to 264192 [ 614.037492][T21100] loop3: detected capacity change from 0 to 264192 [ 614.050497][T21101] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 614.061331][T21100] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:22 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0xffff8000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 22:17:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580)) 22:17:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200005, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 22:17:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) [ 614.072836][T21098] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 614.082218][T21098] EXT4-fs (loop5): group descriptors corrupted! [ 614.093704][T21102] loop4: detected capacity change from 0 to 197120 [ 614.102540][T21102] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 614.291169][T21111] loop0: detected capacity change from 0 to 6 [ 614.299216][T21111] FAULT_INJECTION: forcing a failure. [ 614.299216][T21111] name failslab, interval 1, probability 0, space 0, times 0 [ 614.308488][T21116] loop4: detected capacity change from 0 to 229376 [ 614.311887][T21111] CPU: 0 PID: 21111 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 614.324546][T21117] loop3: detected capacity change from 0 to 264192 [ 614.327041][T21111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.343623][T21111] Call Trace: [ 614.344972][T21116] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 614.347012][T21111] [ 614.347021][T21111] dump_stack_lvl+0xd6/0x122 [ 614.347045][T21111] dump_stack+0x11/0x1b [ 614.347063][T21111] should_fail+0x23c/0x250 [ 614.364086][T21117] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 614.364695][T21111] ? mempool_alloc_slab+0x16/0x20 [ 614.385684][T21121] loop5: detected capacity change from 0 to 4096 [ 614.388349][T21111] __should_failslab+0x81/0x90 [ 614.388376][T21111] should_failslab+0x5/0x20 [ 614.403919][T21111] kmem_cache_alloc+0x4f/0x320 [ 614.408704][T21111] mempool_alloc_slab+0x16/0x20 [ 614.413619][T21111] ? mempool_free+0x130/0x130 [ 614.418322][T21111] mempool_alloc+0x9d/0x310 [ 614.422814][T21111] bio_alloc_bioset+0xcc/0x560 [ 614.427562][T21111] ? __getblk_gfp+0x493/0x530 [ 614.432225][T21111] submit_bh_wbc+0x133/0x320 [ 614.436807][T21111] __bread_gfp+0x110/0x220 [ 614.441227][T21111] fat_fill_super+0xece/0x2af0 [ 614.445995][T21111] vfat_fill_super+0x2c/0x40 [ 614.450570][T21111] mount_bdev+0x1e8/0x290 [ 614.454890][T21111] ? vfat_mount+0x40/0x40 [ 614.459206][T21111] ? tsan.module_ctor+0x10/0x10 [ 614.464045][T21111] vfat_mount+0x2d/0x40 [ 614.468187][T21111] legacy_get_tree+0x70/0xc0 [ 614.472789][T21111] vfs_get_tree+0x4a/0x1a0 [ 614.477189][T21111] path_mount+0x11cf/0x1c40 [ 614.481739][T21111] ? kmem_cache_free+0x65/0x110 [ 614.486577][T21111] __se_sys_mount+0x24b/0x2f0 [ 614.491286][T21111] __x64_sys_mount+0x63/0x70 [ 614.495879][T21111] do_syscall_64+0x44/0xd0 [ 614.500282][T21111] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 614.506510][T21111] RIP: 0033:0x7fa83371d02a [ 614.510905][T21111] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 614.531107][T21111] RSP: 002b:00007fa832e91fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 614.539882][T21111] RAX: ffffffffffffffda RBX: 0000000020000500 RCX: 00007fa83371d02a [ 614.547911][T21111] RDX: 0000000020000000 RSI: 00000000200001c0 RDI: 00007fa832e92000 [ 614.555868][T21111] RBP: 00007fa832e92040 R08: 00007fa832e92040 R09: 0000000020000000 [ 614.563822][T21111] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 614.571841][T21111] R13: 00000000200001c0 R14: 00007fa832e92000 R15: 0000000020010d00 [ 614.579822][T21111] 22:17:22 executing program 1: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x2171, &(0x7f00000003c0)={0x0, 0xffffc000, 0x6}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 614.589152][T21111] FAT-fs (loop0): Directory bread(block 6) failed [ 614.591855][T21115] loop2: detected capacity change from 0 to 264192 [ 614.602314][T21121] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 614.611693][T21121] EXT4-fs (loop5): group descriptors corrupted! [ 614.622828][T21116] loop4: detected capacity change from 0 to 229376 [ 614.623832][T21117] loop3: detected capacity change from 0 to 264192 [ 614.636348][T21117] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 614.648012][T21115] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 614.648325][T21116] EXT4-fs (loop4): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 614.678534][T21121] loop5: detected capacity change from 0 to 4096 22:17:22 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) (fail_nth: 79) 22:17:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f0000000580)) 22:17:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200006, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 614.685415][T21121] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (46507!=0) [ 614.694742][T21121] EXT4-fs (loop5): group descriptors corrupted! [ 614.719730][T21115] loop2: detected capacity change from 0 to 264192 [ 614.727597][T21115] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 22:17:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="206c0000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000000580))